cb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'ifb0\x00'}) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r4, 0x28, &(0x7f0000000440)}, 0x10) 09:05:13 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000080)="0ee26b38f7dc59", 0x0}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair(0x18, 0x0, 0x1, &(0x7f0000000300)) openat$cgroup_int(r1, &(0x7f0000000280)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x80, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'\\r0\x01\x00', 0x1132}) r3 = socket$kcm(0x2b, 0x1, 0x0) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) 09:05:13 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000080)="0ee26b38f7dc59", 0x0}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair(0x18, 0x0, 0x1, &(0x7f0000000300)) openat$cgroup_int(r1, &(0x7f0000000280)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x80, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'\\r0\x01\x00', 0x1132}) r3 = socket$kcm(0x2b, 0x1, 0x0) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) 09:05:13 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000340)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'ifb0\x00'}) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r4, 0x28, &(0x7f0000000440)}, 0x10) 09:05:13 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000340)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'ifb0\x00'}) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r4, 0x28, &(0x7f0000000440)}, 0x10) [ 331.772719][T17286] device nr0 entered promiscuous mode [ 332.541048][T17311] device nr0 entered promiscuous mode [ 332.548476][T17314] device nr0 entered promiscuous mode [ 332.619534][T17321] device nr0 entered promiscuous mode 09:05:14 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000080)="0ee26b38f7dc59", 0x0}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair(0x18, 0x0, 0x1, &(0x7f0000000300)) openat$cgroup_int(r1, &(0x7f0000000280)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x80, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'\\r0\x01\x00', 0x1132}) r3 = socket$kcm(0x2b, 0x1, 0x0) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) 09:05:14 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000080)="0ee26b38f7dc59", 0x0}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair(0x18, 0x0, 0x1, &(0x7f0000000300)) openat$cgroup_int(r1, &(0x7f0000000280)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x80, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'\\r0\x01\x00', 0x1132}) r3 = socket$kcm(0x2b, 0x1, 0x0) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) 09:05:14 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000080)="0ee26b38f7dc59", 0x0}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair(0x18, 0x0, 0x1, &(0x7f0000000300)) openat$cgroup_int(r1, &(0x7f0000000280)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x80, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'\\r0\x01\x00', 0x1132}) r3 = socket$kcm(0x2b, 0x1, 0x0) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) 09:05:15 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000080)="0ee26b38f7dc59", 0x0}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair(0x18, 0x0, 0x1, &(0x7f0000000300)) openat$cgroup_int(r1, &(0x7f0000000280)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x80, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'\\r0\x01\x00', 0x1132}) r3 = socket$kcm(0x2b, 0x1, 0x0) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) 09:05:15 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0x2f00000000000000, 0x43400) socket$kcm(0x10, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) 09:05:15 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0x2f00000000000000, 0x43400) socket$kcm(0x10, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) 09:05:15 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000080)="0ee26b38f7dc59", 0x0}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair(0x18, 0x0, 0x1, &(0x7f0000000300)) openat$cgroup_int(r1, &(0x7f0000000280)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x80, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'\\r0\x01\x00', 0x1132}) r3 = socket$kcm(0x2b, 0x1, 0x0) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) 09:05:15 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000080)="0ee26b38f7dc59", 0x0}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair(0x18, 0x0, 0x1, &(0x7f0000000300)) openat$cgroup_int(r1, &(0x7f0000000280)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x80, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'\\r0\x01\x00', 0x1132}) r3 = socket$kcm(0x2b, 0x1, 0x0) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) 09:05:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f00000004c0)='threaded\x00', 0x9) write$cgroup_int(r1, &(0x7f0000000200), 0x26000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) 09:05:15 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000080)="0ee26b38f7dc59", 0x0}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair(0x18, 0x0, 0x1, &(0x7f0000000300)) openat$cgroup_int(r1, &(0x7f0000000280)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x80, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'\\r0\x01\x00', 0x1132}) r3 = socket$kcm(0x2b, 0x1, 0x0) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) 09:05:15 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0x2f00000000000000, 0x43400) socket$kcm(0x10, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) [ 334.190566][ T27] audit: type=1804 audit(1558947915.886:70): pid=17367 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir947165897/syzkaller.VhXD6o/312/memory.events" dev="sda1" ino=16995 res=1 09:05:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f00000004c0)='threaded\x00', 0x9) write$cgroup_int(r1, &(0x7f0000000200), 0x26000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) 09:05:16 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0x2f00000000000000, 0x43400) socket$kcm(0x10, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) [ 334.518128][ T27] audit: type=1804 audit(1558947916.216:71): pid=17381 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir947165897/syzkaller.VhXD6o/313/memory.events" dev="sda1" ino=17170 res=1 09:05:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f00000004c0)='threaded\x00', 0x9) write$cgroup_int(r1, &(0x7f0000000200), 0x26000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) 09:05:16 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000080)="0ee26b38f7dc59", 0x0}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair(0x18, 0x0, 0x1, &(0x7f0000000300)) openat$cgroup_int(r1, &(0x7f0000000280)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x80, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'\\r0\x01\x00', 0x1132}) r3 = socket$kcm(0x2b, 0x1, 0x0) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) 09:05:16 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0x2f00000000000000, 0x43400) socket$kcm(0x10, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) [ 334.891185][ T27] audit: type=1804 audit(1558947916.586:72): pid=17394 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir947165897/syzkaller.VhXD6o/314/memory.events" dev="sda1" ino=17169 res=1 09:05:16 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0x2f00000000000000, 0x43400) socket$kcm(0x10, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) 09:05:16 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000080)="0ee26b38f7dc59", 0x0}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair(0x18, 0x0, 0x1, &(0x7f0000000300)) openat$cgroup_int(r1, &(0x7f0000000280)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x80, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'\\r0\x01\x00', 0x1132}) r3 = socket$kcm(0x2b, 0x1, 0x0) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) 09:05:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xffffffff000fffea, 0xffffffff000fffea}, {0x600}}, 0x0, 0x100002}, 0x76) 09:05:16 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)={0x7, 0x4, 0x0, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000000480)={0x0, 0x11f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x8, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x3, 0x4, 0x1f, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240b23dd, 0x0, 0x7296e59, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x9, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x400000001) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x39bf, 0x1, 0x0, 0xe6e, 0x0, 0x0, 0x1600, 0x8, 0x0, 0x200, 0x10001, 0x8, 0x3, 0x3, 0xffffffffffffff01, 0x2ac, 0x0, 0x9, 0x40, 0x7e8, 0x0, 0x0, 0xfff000, 0x1, 0x100000001, 0x7, 0x0, 0x0, 0x5, 0x20, 0x0, 0x3, 0xd9e4, 0x1ff, 0x7f, 0x5f5, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x6}, 0x800, 0x0, 0x0, 0x0, 0x1, 0x5, 0x2}, 0x0, 0xd, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000280)=r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xff', 0x4000) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 09:05:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xffffffff000fffea, 0xffffffff000fffea}, {0x600}}, 0x0, 0x100002}, 0x76) 09:05:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x64}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 09:05:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f01030000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x73}, 0x0) sendmsg$kcm(r0, 0x0, 0x4000000) 09:05:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xffffffff000fffea, 0xffffffff000fffea}, {0x600}}, 0x0, 0x100002}, 0x76) 09:05:17 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)={0x7, 0x4, 0x0, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000000480)={0x0, 0x11f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x8, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x3, 0x4, 0x1f, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240b23dd, 0x0, 0x7296e59, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x9, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x400000001) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x39bf, 0x1, 0x0, 0xe6e, 0x0, 0x0, 0x1600, 0x8, 0x0, 0x200, 0x10001, 0x8, 0x3, 0x3, 0xffffffffffffff01, 0x2ac, 0x0, 0x9, 0x40, 0x7e8, 0x0, 0x0, 0xfff000, 0x1, 0x100000001, 0x7, 0x0, 0x0, 0x5, 0x20, 0x0, 0x3, 0xd9e4, 0x1ff, 0x7f, 0x5f5, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x6}, 0x800, 0x0, 0x0, 0x0, 0x1, 0x5, 0x2}, 0x0, 0xd, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000280)=r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xff', 0x4000) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 09:05:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xffffffff000fffea, 0xffffffff000fffea}, {0x600}}, 0x0, 0x100002}, 0x76) 09:05:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x64}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 09:05:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)={0x7, 0x4, 0x0, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000000480)={0x0, 0x11f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x8, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x3, 0x4, 0x1f, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240b23dd, 0x0, 0x7296e59, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x9, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x400000001) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x39bf, 0x1, 0x0, 0xe6e, 0x0, 0x0, 0x1600, 0x8, 0x0, 0x200, 0x10001, 0x8, 0x3, 0x3, 0xffffffffffffff01, 0x2ac, 0x0, 0x9, 0x40, 0x7e8, 0x0, 0x0, 0xfff000, 0x1, 0x100000001, 0x7, 0x0, 0x0, 0x5, 0x20, 0x0, 0x3, 0xd9e4, 0x1ff, 0x7f, 0x5f5, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x6}, 0x800, 0x0, 0x0, 0x0, 0x1, 0x5, 0x2}, 0x0, 0xd, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000280)=r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xff', 0x4000) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 09:05:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x64}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 09:05:17 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)={0x7, 0x4, 0x0, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000000480)={0x0, 0x11f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x8, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x3, 0x4, 0x1f, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240b23dd, 0x0, 0x7296e59, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x9, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x400000001) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x39bf, 0x1, 0x0, 0xe6e, 0x0, 0x0, 0x1600, 0x8, 0x0, 0x200, 0x10001, 0x8, 0x3, 0x3, 0xffffffffffffff01, 0x2ac, 0x0, 0x9, 0x40, 0x7e8, 0x0, 0x0, 0xfff000, 0x1, 0x100000001, 0x7, 0x0, 0x0, 0x5, 0x20, 0x0, 0x3, 0xd9e4, 0x1ff, 0x7f, 0x5f5, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x6}, 0x800, 0x0, 0x0, 0x0, 0x1, 0x5, 0x2}, 0x0, 0xd, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000280)=r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xff', 0x4000) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 09:05:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f01030000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x73}, 0x0) sendmsg$kcm(r0, 0x0, 0x4000000) 09:05:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f01030000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x73}, 0x0) sendmsg$kcm(r0, 0x0, 0x4000000) 09:05:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x64}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 09:05:18 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)={0x7, 0x4, 0x0, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000000480)={0x0, 0x11f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x8, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x3, 0x4, 0x1f, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240b23dd, 0x0, 0x7296e59, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x9, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x400000001) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x39bf, 0x1, 0x0, 0xe6e, 0x0, 0x0, 0x1600, 0x8, 0x0, 0x200, 0x10001, 0x8, 0x3, 0x3, 0xffffffffffffff01, 0x2ac, 0x0, 0x9, 0x40, 0x7e8, 0x0, 0x0, 0xfff000, 0x1, 0x100000001, 0x7, 0x0, 0x0, 0x5, 0x20, 0x0, 0x3, 0xd9e4, 0x1ff, 0x7f, 0x5f5, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x6}, 0x800, 0x0, 0x0, 0x0, 0x1, 0x5, 0x2}, 0x0, 0xd, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000280)=r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xff', 0x4000) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 09:05:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)={0x7, 0x4, 0x0, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000000480)={0x0, 0x11f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x8, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x3, 0x4, 0x1f, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240b23dd, 0x0, 0x7296e59, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x9, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x400000001) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x39bf, 0x1, 0x0, 0xe6e, 0x0, 0x0, 0x1600, 0x8, 0x0, 0x200, 0x10001, 0x8, 0x3, 0x3, 0xffffffffffffff01, 0x2ac, 0x0, 0x9, 0x40, 0x7e8, 0x0, 0x0, 0xfff000, 0x1, 0x100000001, 0x7, 0x0, 0x0, 0x5, 0x20, 0x0, 0x3, 0xd9e4, 0x1ff, 0x7f, 0x5f5, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x6}, 0x800, 0x0, 0x0, 0x0, 0x1, 0x5, 0x2}, 0x0, 0xd, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000280)=r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xff', 0x4000) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 09:05:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)={0x7, 0x4, 0x0, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000000480)={0x0, 0x11f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x8, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x3, 0x4, 0x1f, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240b23dd, 0x0, 0x7296e59, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x9, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x400000001) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x39bf, 0x1, 0x0, 0xe6e, 0x0, 0x0, 0x1600, 0x8, 0x0, 0x200, 0x10001, 0x8, 0x3, 0x3, 0xffffffffffffff01, 0x2ac, 0x0, 0x9, 0x40, 0x7e8, 0x0, 0x0, 0xfff000, 0x1, 0x100000001, 0x7, 0x0, 0x0, 0x5, 0x20, 0x0, 0x3, 0xd9e4, 0x1ff, 0x7f, 0x5f5, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x6}, 0x800, 0x0, 0x0, 0x0, 0x1, 0x5, 0x2}, 0x0, 0xd, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000280)=r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xff', 0x4000) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 09:05:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)={0x7, 0x4, 0x0, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000000480)={0x0, 0x11f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x8, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x3, 0x4, 0x1f, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240b23dd, 0x0, 0x7296e59, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x9, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x400000001) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x39bf, 0x1, 0x0, 0xe6e, 0x0, 0x0, 0x1600, 0x8, 0x0, 0x200, 0x10001, 0x8, 0x3, 0x3, 0xffffffffffffff01, 0x2ac, 0x0, 0x9, 0x40, 0x7e8, 0x0, 0x0, 0xfff000, 0x1, 0x100000001, 0x7, 0x0, 0x0, 0x5, 0x20, 0x0, 0x3, 0xd9e4, 0x1ff, 0x7f, 0x5f5, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x6}, 0x800, 0x0, 0x0, 0x0, 0x1, 0x5, 0x2}, 0x0, 0xd, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000280)=r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xff', 0x4000) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 09:05:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f01030000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x73}, 0x0) sendmsg$kcm(r0, 0x0, 0x4000000) 09:05:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f01030000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x73}, 0x0) sendmsg$kcm(r0, 0x0, 0x4000000) 09:05:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)={0x7, 0x4, 0x0, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000000480)={0x0, 0x11f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x8, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x3, 0x4, 0x1f, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240b23dd, 0x0, 0x7296e59, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x9, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x400000001) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x39bf, 0x1, 0x0, 0xe6e, 0x0, 0x0, 0x1600, 0x8, 0x0, 0x200, 0x10001, 0x8, 0x3, 0x3, 0xffffffffffffff01, 0x2ac, 0x0, 0x9, 0x40, 0x7e8, 0x0, 0x0, 0xfff000, 0x1, 0x100000001, 0x7, 0x0, 0x0, 0x5, 0x20, 0x0, 0x3, 0xd9e4, 0x1ff, 0x7f, 0x5f5, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x6}, 0x800, 0x0, 0x0, 0x0, 0x1, 0x5, 0x2}, 0x0, 0xd, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000280)=r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xff', 0x4000) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 09:05:18 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)={0x7, 0x4, 0x0, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000000480)={0x0, 0x11f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x8, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x3, 0x4, 0x1f, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240b23dd, 0x0, 0x7296e59, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x9, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x400000001) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x39bf, 0x1, 0x0, 0xe6e, 0x0, 0x0, 0x1600, 0x8, 0x0, 0x200, 0x10001, 0x8, 0x3, 0x3, 0xffffffffffffff01, 0x2ac, 0x0, 0x9, 0x40, 0x7e8, 0x0, 0x0, 0xfff000, 0x1, 0x100000001, 0x7, 0x0, 0x0, 0x5, 0x20, 0x0, 0x3, 0xd9e4, 0x1ff, 0x7f, 0x5f5, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x6}, 0x800, 0x0, 0x0, 0x0, 0x1, 0x5, 0x2}, 0x0, 0xd, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000280)=r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xff', 0x4000) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 09:05:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)={0x7, 0x4, 0x0, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000000480)={0x0, 0x11f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x8, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x3, 0x4, 0x1f, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240b23dd, 0x0, 0x7296e59, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x9, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x400000001) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x39bf, 0x1, 0x0, 0xe6e, 0x0, 0x0, 0x1600, 0x8, 0x0, 0x200, 0x10001, 0x8, 0x3, 0x3, 0xffffffffffffff01, 0x2ac, 0x0, 0x9, 0x40, 0x7e8, 0x0, 0x0, 0xfff000, 0x1, 0x100000001, 0x7, 0x0, 0x0, 0x5, 0x20, 0x0, 0x3, 0xd9e4, 0x1ff, 0x7f, 0x5f5, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x6}, 0x800, 0x0, 0x0, 0x0, 0x1, 0x5, 0x2}, 0x0, 0xd, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000280)=r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xff', 0x4000) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 09:05:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)={0x7, 0x4, 0x0, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000000480)={0x0, 0x11f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x8, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x3, 0x4, 0x1f, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240b23dd, 0x0, 0x7296e59, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x9, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x400000001) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x39bf, 0x1, 0x0, 0xe6e, 0x0, 0x0, 0x1600, 0x8, 0x0, 0x200, 0x10001, 0x8, 0x3, 0x3, 0xffffffffffffff01, 0x2ac, 0x0, 0x9, 0x40, 0x7e8, 0x0, 0x0, 0xfff000, 0x1, 0x100000001, 0x7, 0x0, 0x0, 0x5, 0x20, 0x0, 0x3, 0xd9e4, 0x1ff, 0x7f, 0x5f5, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x6}, 0x800, 0x0, 0x0, 0x0, 0x1, 0x5, 0x2}, 0x0, 0xd, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000280)=r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xff', 0x4000) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 09:05:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f01030000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x73}, 0x0) sendmsg$kcm(r0, 0x0, 0x4000000) 09:05:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f01030000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x73}, 0x0) sendmsg$kcm(r0, 0x0, 0x4000000) 09:05:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)={0x7, 0x4, 0x0, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000000480)={0x0, 0x11f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x8, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x3, 0x4, 0x1f, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240b23dd, 0x0, 0x7296e59, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x9, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x400000001) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x39bf, 0x1, 0x0, 0xe6e, 0x0, 0x0, 0x1600, 0x8, 0x0, 0x200, 0x10001, 0x8, 0x3, 0x3, 0xffffffffffffff01, 0x2ac, 0x0, 0x9, 0x40, 0x7e8, 0x0, 0x0, 0xfff000, 0x1, 0x100000001, 0x7, 0x0, 0x0, 0x5, 0x20, 0x0, 0x3, 0xd9e4, 0x1ff, 0x7f, 0x5f5, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x6}, 0x800, 0x0, 0x0, 0x0, 0x1, 0x5, 0x2}, 0x0, 0xd, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000280)=r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xff', 0x4000) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 09:05:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000015580)={0xc, 0x4, 0x4, 0x2}, 0x3c) 09:05:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)={0x7, 0x4, 0x0, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000000480)={0x0, 0x11f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x8, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x3, 0x4, 0x1f, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240b23dd, 0x0, 0x7296e59, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x9, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x400000001) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x39bf, 0x1, 0x0, 0xe6e, 0x0, 0x0, 0x1600, 0x8, 0x0, 0x200, 0x10001, 0x8, 0x3, 0x3, 0xffffffffffffff01, 0x2ac, 0x0, 0x9, 0x40, 0x7e8, 0x0, 0x0, 0xfff000, 0x1, 0x100000001, 0x7, 0x0, 0x0, 0x5, 0x20, 0x0, 0x3, 0xd9e4, 0x1ff, 0x7f, 0x5f5, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x6}, 0x800, 0x0, 0x0, 0x0, 0x1, 0x5, 0x2}, 0x0, 0xd, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000280)=r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xff', 0x4000) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 09:05:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000015580)={0xc, 0x4, 0x4, 0x2}, 0x3c) 09:05:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)={0x7, 0x4, 0x0, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000000480)={0x0, 0x11f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x8, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x3, 0x4, 0x1f, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240b23dd, 0x0, 0x7296e59, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x9, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x400000001) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x39bf, 0x1, 0x0, 0xe6e, 0x0, 0x0, 0x1600, 0x8, 0x0, 0x200, 0x10001, 0x8, 0x3, 0x3, 0xffffffffffffff01, 0x2ac, 0x0, 0x9, 0x40, 0x7e8, 0x0, 0x0, 0xfff000, 0x1, 0x100000001, 0x7, 0x0, 0x0, 0x5, 0x20, 0x0, 0x3, 0xd9e4, 0x1ff, 0x7f, 0x5f5, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x6}, 0x800, 0x0, 0x0, 0x0, 0x1, 0x5, 0x2}, 0x0, 0xd, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000280)=r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xff', 0x4000) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 09:05:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000001580)='&@[\x00') 09:05:19 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f000000e4c0)={0x11, 0x4, 0x0, 0x1}, 0x3c) 09:05:20 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000015580)={0xc, 0x4, 0x4, 0x2}, 0x3c) 09:05:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) close(r0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x7}, 0x80, 0x0}, 0x20004040) setsockopt$sock_attach_bpf(r0, 0x29, 0x32, &(0x7f0000000280), 0xcc) 09:05:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f000000e4c0)={0x11, 0x4, 0x0, 0x1}, 0x3c) 09:05:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000001580)='&@[\x00') 09:05:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)={0x7, 0x4, 0x0, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000000480)={0x0, 0x11f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x8, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x3, 0x4, 0x1f, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240b23dd, 0x0, 0x7296e59, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x9, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x400000001) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x39bf, 0x1, 0x0, 0xe6e, 0x0, 0x0, 0x1600, 0x8, 0x0, 0x200, 0x10001, 0x8, 0x3, 0x3, 0xffffffffffffff01, 0x2ac, 0x0, 0x9, 0x40, 0x7e8, 0x0, 0x0, 0xfff000, 0x1, 0x100000001, 0x7, 0x0, 0x0, 0x5, 0x20, 0x0, 0x3, 0xd9e4, 0x1ff, 0x7f, 0x5f5, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x6}, 0x800, 0x0, 0x0, 0x0, 0x1, 0x5, 0x2}, 0x0, 0xd, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000280)=r2) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xff', 0x4000) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 09:05:20 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000015580)={0xc, 0x4, 0x4, 0x2}, 0x3c) 09:05:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000001580)='&@[\x00') 09:05:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f000000e4c0)={0x11, 0x4, 0x0, 0x1}, 0x3c) 09:05:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) close(r0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x7}, 0x80, 0x0}, 0x20004040) setsockopt$sock_attach_bpf(r0, 0x29, 0x32, &(0x7f0000000280), 0xcc) 09:05:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000001580)='&@[\x00') 09:05:20 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) close(r0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x7}, 0x80, 0x0}, 0x20004040) setsockopt$sock_attach_bpf(r0, 0x29, 0x32, &(0x7f0000000280), 0xcc) 09:05:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000001580)='&@[\x00') 09:05:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f000000e4c0)={0x11, 0x4, 0x0, 0x1}, 0x3c) 09:05:20 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) close(r0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x7}, 0x80, 0x0}, 0x20004040) setsockopt$sock_attach_bpf(r0, 0x29, 0x32, &(0x7f0000000280), 0xcc) 09:05:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000001580)='&@[\x00') 09:05:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) close(r0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x7}, 0x80, 0x0}, 0x20004040) setsockopt$sock_attach_bpf(r0, 0x29, 0x32, &(0x7f0000000280), 0xcc) 09:05:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000001580)='&@[\x00') 09:05:20 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) close(r0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x7}, 0x80, 0x0}, 0x20004040) setsockopt$sock_attach_bpf(r0, 0x29, 0x32, &(0x7f0000000280), 0xcc) 09:05:21 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000001580)='&@[\x00') 09:05:21 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) close(r0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x7}, 0x80, 0x0}, 0x20004040) setsockopt$sock_attach_bpf(r0, 0x29, 0x32, &(0x7f0000000280), 0xcc) 09:05:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x3c}, [@ldst={0x7, 0x3, 0x0, 0xa0c91}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) 09:05:21 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000001580)='&@[\x00') 09:05:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) close(r0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x7}, 0x80, 0x0}, 0x20004040) setsockopt$sock_attach_bpf(r0, 0x29, 0x32, &(0x7f0000000280), 0xcc) 09:05:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x3c}, [@ldst={0x7, 0x3, 0x0, 0xa0c91}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) 09:05:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) close(r0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x7}, 0x80, 0x0}, 0x20004040) setsockopt$sock_attach_bpf(r0, 0x29, 0x32, &(0x7f0000000280), 0xcc) 09:05:21 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) close(r0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x7}, 0x80, 0x0}, 0x20004040) setsockopt$sock_attach_bpf(r0, 0x29, 0x32, &(0x7f0000000280), 0xcc) 09:05:21 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000001580)='&@[\x00') 09:05:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="230000005a00817491bc655067d7aee4050c00000f00020001000000acecf0a3fcffff", 0x23}], 0x1}, 0x0) 09:05:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x3c}, [@ldst={0x7, 0x3, 0x0, 0xa0c91}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) 09:05:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) [ 339.937180][T17639] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:05:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x3c}, [@ldst={0x7, 0x3, 0x0, 0xa0c91}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) 09:05:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="230000005a00817491bc655067d7aee4050c00000f00020001000000acecf0a3fcffff", 0x23}], 0x1}, 0x0) 09:05:21 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8981, &(0x7f0000000700)={'bond0\x00', @broadcast}) 09:05:21 executing program 2: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x2000) 09:05:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 09:05:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2000000000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x100000000, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) sendmsg$kcm(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="76e2d061a5f4d389bfb97f6e9952f50b188bb5c0a5f980d67876897727b16063f4ad15", 0x23}], 0x1}, 0x90) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(0x0, 0xfffff7fffffffffc) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x8}, 0x3c) socket$kcm(0x10, 0x0, 0x4) [ 340.250000][T17661] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:05:22 executing program 4: socketpair(0xa, 0x3, 0xff, &(0x7f0000000080)) 09:05:22 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8981, &(0x7f0000000700)={'bond0\x00', @broadcast}) 09:05:22 executing program 2: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x2000) 09:05:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="230000005a00817491bc655067d7aee4050c00000f00020001000000acecf0a3fcffff", 0x23}], 0x1}, 0x0) 09:05:22 executing program 4: socketpair(0xa, 0x3, 0xff, &(0x7f0000000080)) 09:05:22 executing program 2: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x2000) 09:05:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 09:05:22 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8981, &(0x7f0000000700)={'bond0\x00', @broadcast}) [ 340.711000][T17686] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:05:22 executing program 4: socketpair(0xa, 0x3, 0xff, &(0x7f0000000080)) 09:05:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="230000005a00817491bc655067d7aee4050c00000f00020001000000acecf0a3fcffff", 0x23}], 0x1}, 0x0) 09:05:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2000000000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x100000000, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) sendmsg$kcm(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="76e2d061a5f4d389bfb97f6e9952f50b188bb5c0a5f980d67876897727b16063f4ad15", 0x23}], 0x1}, 0x90) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(0x0, 0xfffff7fffffffffc) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x8}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 09:05:22 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8981, &(0x7f0000000700)={'bond0\x00', @broadcast}) [ 340.932522][ C0] net_ratelimit: 18 callbacks suppressed [ 340.932532][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 340.944058][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:05:22 executing program 4: socketpair(0xa, 0x3, 0xff, &(0x7f0000000080)) 09:05:22 executing program 2: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x2000) 09:05:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) [ 341.087841][T17706] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 09:05:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2000000000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x100000000, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) sendmsg$kcm(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="76e2d061a5f4d389bfb97f6e9952f50b188bb5c0a5f980d67876897727b16063f4ad15", 0x23}], 0x1}, 0x90) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(0x0, 0xfffff7fffffffffc) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x8}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 09:05:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2000000000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x100000000, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) sendmsg$kcm(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="76e2d061a5f4d389bfb97f6e9952f50b188bb5c0a5f980d67876897727b16063f4ad15", 0x23}], 0x1}, 0x90) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(0x0, 0xfffff7fffffffffc) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x8}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 09:05:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) sendmsg(r0, &(0x7f0000001b00)={&(0x7f0000000280)=@in={0x2, 0x4e21, @local}, 0x80, 0x0}, 0x0) 09:05:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x3, 0x1, 0xfff, 0x0}, 0x20) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000380)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(r2, &(0x7f00000003c0)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x0, 0x0, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 09:05:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x13, 0x0, 0x0) 09:05:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2000000000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x100000000, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) sendmsg$kcm(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="76e2d061a5f4d389bfb97f6e9952f50b188bb5c0a5f980d67876897727b16063f4ad15", 0x23}], 0x1}, 0x90) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(0x0, 0xfffff7fffffffffc) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x8}, 0x3c) socket$kcm(0x10, 0x0, 0x4) [ 341.679648][ T27] audit: type=1804 audit(1558947923.376:73): pid=17741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir568139360/syzkaller.42TqY9/317/memory.events" dev="sda1" ino=17198 res=1 09:05:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x13, 0x0, 0x0) 09:05:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) sendmsg(r0, &(0x7f0000001b00)={&(0x7f0000000280)=@in={0x2, 0x4e21, @local}, 0x80, 0x0}, 0x0) 09:05:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x13, 0x0, 0x0) 09:05:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x13, 0x0, 0x0) 09:05:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2000000000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x100000000, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) sendmsg$kcm(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="76e2d061a5f4d389bfb97f6e9952f50b188bb5c0a5f980d67876897727b16063f4ad15", 0x23}], 0x1}, 0x90) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(0x0, 0xfffff7fffffffffc) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x8}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 09:05:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2000000000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x100000000, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) sendmsg$kcm(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="76e2d061a5f4d389bfb97f6e9952f50b188bb5c0a5f980d67876897727b16063f4ad15", 0x23}], 0x1}, 0x90) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(0x0, 0xfffff7fffffffffc) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x8}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 09:05:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) sendmsg(r0, &(0x7f0000001b00)={&(0x7f0000000280)=@in={0x2, 0x4e21, @local}, 0x80, 0x0}, 0x0) 09:05:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) sendmsg(r0, &(0x7f0000001b00)={&(0x7f0000000280)=@in={0x2, 0x4e21, @local}, 0x80, 0x0}, 0x0) 09:05:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2000000000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x100000000, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) sendmsg$kcm(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="76e2d061a5f4d389bfb97f6e9952f50b188bb5c0a5f980d67876897727b16063f4ad15", 0x23}], 0x1}, 0x90) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(0x0, 0xfffff7fffffffffc) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x8}, 0x3c) socket$kcm(0x10, 0x0, 0x4) [ 342.627716][ T27] audit: type=1804 audit(1558947924.326:74): pid=17732 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir568139360/syzkaller.42TqY9/317/memory.events" dev="sda1" ino=17198 res=1 [ 342.760213][ T27] audit: type=1804 audit(1558947924.436:75): pid=17741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir568139360/syzkaller.42TqY9/317/memory.events" dev="sda1" ino=17198 res=1 [ 342.869074][ T27] audit: type=1804 audit(1558947924.456:76): pid=17741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir568139360/syzkaller.42TqY9/317/memory.events" dev="sda1" ino=17198 res=1 09:05:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x3, 0x1, 0xfff, 0x0}, 0x20) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000380)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(r2, &(0x7f00000003c0)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x0, 0x0, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 09:05:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) sendmsg(r0, &(0x7f0000001b00)={&(0x7f0000000280)=@in={0x2, 0x4e21, @local}, 0x80, 0x0}, 0x0) 09:05:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) sendmsg(r0, &(0x7f0000001b00)={&(0x7f0000000280)=@in={0x2, 0x4e21, @local}, 0x80, 0x0}, 0x0) [ 343.340639][ T27] audit: type=1804 audit(1558947925.026:77): pid=17796 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir568139360/syzkaller.42TqY9/318/memory.events" dev="sda1" ino=17186 res=1 09:05:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2000000000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x100000000, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) sendmsg$kcm(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="76e2d061a5f4d389bfb97f6e9952f50b188bb5c0a5f980d67876897727b16063f4ad15", 0x23}], 0x1}, 0x90) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(0x0, 0xfffff7fffffffffc) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x8}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 09:05:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2000000000000002, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x100000000, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) sendmsg$kcm(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="76e2d061a5f4d389bfb97f6e9952f50b188bb5c0a5f980d67876897727b16063f4ad15", 0x23}], 0x1}, 0x90) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(0x0, 0xfffff7fffffffffc) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x8}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 09:05:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x3, 0x1, 0xfff, 0x0}, 0x20) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000380)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(r2, &(0x7f00000003c0)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x0, 0x0, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 09:05:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x3, 0x1, 0xfff, 0x0}, 0x20) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000380)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(r2, &(0x7f00000003c0)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x0, 0x0, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 09:05:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) sendmsg(r0, &(0x7f0000001b00)={&(0x7f0000000280)=@in={0x2, 0x4e21, @local}, 0x80, 0x0}, 0x0) [ 343.916919][ T27] audit: type=1804 audit(1558947925.616:78): pid=17810 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir947165897/syzkaller.VhXD6o/333/memory.events" dev="sda1" ino=17202 res=1 [ 344.064892][ T27] audit: type=1804 audit(1558947925.646:79): pid=17811 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir994138026/syzkaller.1BHl5u/339/memory.events" dev="sda1" ino=17203 res=1 09:05:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x3, 0x1, 0xfff, 0x0}, 0x20) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000380)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(r2, &(0x7f00000003c0)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x0, 0x0, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 09:05:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x3, 0x1, 0xfff, 0x0}, 0x20) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000380)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(r2, &(0x7f00000003c0)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x0, 0x0, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 09:05:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x3, 0x1, 0xfff, 0x0}, 0x20) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000380)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(r2, &(0x7f00000003c0)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x0, 0x0, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 09:05:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) sendmsg(r0, &(0x7f0000001b00)={&(0x7f0000000280)=@in={0x2, 0x4e21, @local}, 0x80, 0x0}, 0x0) [ 344.999376][ T27] audit: type=1804 audit(1558947926.696:80): pid=17823 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir045763080/syzkaller.t8AHE4/337/memory.events" dev="sda1" ino=17204 res=1 [ 345.154839][ T27] audit: type=1804 audit(1558947926.726:81): pid=17826 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir756836571/syzkaller.GjiGtM/326/memory.events" dev="sda1" ino=16547 res=1 09:05:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) sendmsg(r0, &(0x7f0000001b00)={&(0x7f0000000280)=@in={0x2, 0x4e21, @local}, 0x80, 0x0}, 0x0) 09:05:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x3, 0x1, 0xfff, 0x0}, 0x20) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000380)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(r2, &(0x7f00000003c0)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x0, 0x0, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 09:05:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x3, 0x1, 0xfff, 0x0}, 0x20) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000380)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(r2, &(0x7f00000003c0)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x0, 0x0, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) [ 345.336506][ T27] audit: type=1804 audit(1558947926.906:82): pid=17831 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir568139360/syzkaller.42TqY9/319/memory.events" dev="sda1" ino=16545 res=1 09:05:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) sendmsg(r0, &(0x7f0000001b00)={&(0x7f0000000280)=@in={0x2, 0x4e21, @local}, 0x80, 0x0}, 0x0) 09:05:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x3, 0x1, 0xfff, 0x0}, 0x20) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000380)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(r2, &(0x7f00000003c0)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x0, 0x0, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 09:05:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) sendmsg(r0, &(0x7f0000001b00)={&(0x7f0000000280)=@in={0x2, 0x4e21, @local}, 0x80, 0x0}, 0x0) 09:05:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x3, 0x1, 0xfff, 0x0}, 0x20) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000380)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(r2, &(0x7f00000003c0)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x0, 0x0, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 09:05:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x3, 0x1, 0xfff, 0x0}, 0x20) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000380)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(r2, &(0x7f00000003c0)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x0, 0x0, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) [ 346.764927][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 346.764944][ T27] audit: type=1804 audit(1558947928.456:85): pid=17858 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir756836571/syzkaller.GjiGtM/327/memory.events" dev="sda1" ino=16530 res=1 09:05:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x3, 0x1, 0xfff, 0x0}, 0x20) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000380)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(r2, &(0x7f00000003c0)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x0, 0x0, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) [ 346.892879][ T27] audit: type=1804 audit(1558947928.486:86): pid=17861 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir045763080/syzkaller.t8AHE4/338/memory.events" dev="sda1" ino=17214 res=1 09:05:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) sendmsg(r0, &(0x7f0000001b00)={&(0x7f0000000280)=@in={0x2, 0x4e21, @local}, 0x80, 0x0}, 0x0) [ 347.112814][ T27] audit: type=1804 audit(1558947928.806:87): pid=17865 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir568139360/syzkaller.42TqY9/320/memory.events" dev="sda1" ino=17206 res=1 09:05:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) sendmsg(r0, &(0x7f0000001b00)={&(0x7f0000000280)=@in={0x2, 0x4e21, @local}, 0x80, 0x0}, 0x0) [ 347.300558][ T27] audit: type=1804 audit(1558947928.996:88): pid=17869 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir947165897/syzkaller.VhXD6o/335/memory.events" dev="sda1" ino=16818 res=1 09:05:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x3, 0x1, 0xfff, 0x0}, 0x20) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000380)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(r2, &(0x7f00000003c0)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x0, 0x0, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) [ 347.949020][ T27] audit: type=1804 audit(1558947929.636:89): pid=17882 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir994138026/syzkaller.1BHl5u/341/memory.events" dev="sda1" ino=17209 res=1 09:05:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x13, 0x0, 0x0) 09:05:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x3, 0x1, 0xfff, 0x0}, 0x20) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000380)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(r2, &(0x7f00000003c0)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x0, 0x0, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 09:05:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x13, 0x0, 0x0) 09:05:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x3, 0x1, 0xfff, 0x0}, 0x20) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000380)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(r2, &(0x7f00000003c0)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x0, 0x0, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 09:05:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x13, 0x0, 0x0) [ 348.718484][ T27] audit: type=1804 audit(1558947930.416:90): pid=17889 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir045763080/syzkaller.t8AHE4/339/memory.events" dev="sda1" ino=17200 res=1 09:05:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) close(r0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x0, 0x8}, 0x80, 0x0}, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) 09:05:30 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f0000000080)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='gre0\x00') 09:05:30 executing program 4: perf_event_open(&(0x7f00000007c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000002600050f0012e0713c444d240400fc00100002400a000000053582c137153e370900040002000000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) 09:05:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) close(r0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x0, 0x8}, 0x80, 0x0}, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) [ 349.091917][ T27] audit: type=1804 audit(1558947930.776:91): pid=17898 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir756836571/syzkaller.GjiGtM/328/memory.events" dev="sda1" ino=16485 res=1 09:05:30 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f0000000080)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='gre0\x00') 09:05:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) close(r0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x0, 0x8}, 0x80, 0x0}, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) 09:05:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) close(r0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x0, 0x8}, 0x80, 0x0}, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) 09:05:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) close(r0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x0, 0x8}, 0x80, 0x0}, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) 09:05:31 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f0000000080)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='gre0\x00') 09:05:31 executing program 4: perf_event_open(&(0x7f00000007c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000002600050f0012e0713c444d240400fc00100002400a000000053582c137153e370900040002000000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) 09:05:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) close(r0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x0, 0x8}, 0x80, 0x0}, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) 09:05:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) close(r0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x0, 0x8}, 0x80, 0x0}, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) 09:05:31 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f0000000080)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='gre0\x00') 09:05:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) close(r0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x0, 0x8}, 0x80, 0x0}, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) 09:05:31 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x2, 0x3, 0x9, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r1 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x12, &(0x7f0000000040)=r1, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 09:05:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xe4ffffff, 0xf}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) 09:05:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) close(r0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x0, 0x8}, 0x80, 0x0}, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) 09:05:31 executing program 0: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x20) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000002ac0)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x1000000000000002}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x3d}, {0x16}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) 09:05:31 executing program 4: perf_event_open(&(0x7f00000007c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000002600050f0012e0713c444d240400fc00100002400a000000053582c137153e370900040002000000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) 09:05:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3f00000000000000, 0x0, 0x29, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xfeffffff, 0xe, 0x0, &(0x7f0000000100)="24f9e9a6bae9516cc92c4a17c9a9", 0x0, 0x3f00}, 0x28) 09:05:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xe4ffffff, 0xf}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) 09:05:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) close(r0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x0, 0x8}, 0x80, 0x0}, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) 09:05:32 executing program 4: perf_event_open(&(0x7f00000007c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000002600050f0012e0713c444d240400fc00100002400a000000053582c137153e370900040002000000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) 09:05:32 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x2, 0x3, 0x9, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r1 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x12, &(0x7f0000000040)=r1, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 09:05:32 executing program 0: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x20) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000002ac0)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x1000000000000002}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x3d}, {0x16}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) 09:05:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xe4ffffff, 0xf}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) 09:05:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3f00000000000000, 0x0, 0x29, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xfeffffff, 0xe, 0x0, &(0x7f0000000100)="24f9e9a6bae9516cc92c4a17c9a9", 0x0, 0x3f00}, 0x28) 09:05:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3f00000000000000, 0x0, 0x29, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xfeffffff, 0xe, 0x0, &(0x7f0000000100)="24f9e9a6bae9516cc92c4a17c9a9", 0x0, 0x3f00}, 0x28) 09:05:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3f00000000000000, 0x0, 0x29, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xfeffffff, 0xe, 0x0, &(0x7f0000000100)="24f9e9a6bae9516cc92c4a17c9a9", 0x0, 0x3f00}, 0x28) 09:05:32 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x2, 0x3, 0x9, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r1 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x12, &(0x7f0000000040)=r1, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 09:05:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xe4ffffff, 0xf}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) 09:05:32 executing program 0: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x20) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000002ac0)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x1000000000000002}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x3d}, {0x16}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) 09:05:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3f00000000000000, 0x0, 0x29, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xfeffffff, 0xe, 0x0, &(0x7f0000000100)="24f9e9a6bae9516cc92c4a17c9a9", 0x0, 0x3f00}, 0x28) 09:05:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3f00000000000000, 0x0, 0x29, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xfeffffff, 0xe, 0x0, &(0x7f0000000100)="24f9e9a6bae9516cc92c4a17c9a9", 0x0, 0x3f00}, 0x28) 09:05:32 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x2, 0x3, 0x9, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r1 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x12, &(0x7f0000000040)=r1, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 09:05:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x2, 0x3, 0x9, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r1 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x12, &(0x7f0000000040)=r1, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 09:05:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3f00000000000000, 0x0, 0x29, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xfeffffff, 0xe, 0x0, &(0x7f0000000100)="24f9e9a6bae9516cc92c4a17c9a9", 0x0, 0x3f00}, 0x28) 09:05:33 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x2, 0x3, 0x9, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r1 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x12, &(0x7f0000000040)=r1, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 09:05:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3f00000000000000, 0x0, 0x29, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xfeffffff, 0xe, 0x0, &(0x7f0000000100)="24f9e9a6bae9516cc92c4a17c9a9", 0x0, 0x3f00}, 0x28) 09:05:33 executing program 0: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x20) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000002ac0)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x1000000000000002}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x3d}, {0x16}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) 09:05:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x2, 0x3, 0x9, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r1 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x12, &(0x7f0000000040)=r1, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 09:05:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3f00000000000000, 0x0, 0x29, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xfeffffff, 0xe, 0x0, &(0x7f0000000100)="24f9e9a6bae9516cc92c4a17c9a9", 0x0, 0x3f00}, 0x28) 09:05:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3f00000000000000, 0x0, 0x29, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0xfeffffff, 0xe, 0x0, &(0x7f0000000100)="24f9e9a6bae9516cc92c4a17c9a9", 0x0, 0x3f00}, 0x28) 09:05:33 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x2, 0x3, 0x9, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r1 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x12, &(0x7f0000000040)=r1, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 09:05:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x2, 0x3, 0x9, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r1 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x12, &(0x7f0000000040)=r1, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 09:05:33 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:33 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe0000000]}}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 09:05:33 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x2, 0x3, 0x9, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r1 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x12, &(0x7f0000000040)=r1, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 09:05:33 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="4c000000120081f87059ae08060c04000200eb10400103fe054e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a0200000046314461e6ffffffffffffff0201c50b182bbe1056", 0x4c}], 0x1}, 0x0) 09:05:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x1, 0x6, 0x8000000001}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77ffff, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x18) 09:05:33 executing program 3: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3800000000000000290000000400000078040401000000c0073510fbff000d4558e3c0b193a8cb7508000000fab771c359190078b8ba8bc7"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 09:05:33 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe0000000]}}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 09:05:34 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="4c000000120081f87059ae08060c04000200eb10400103fe054e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a0200000046314461e6ffffffffffffff0201c50b182bbe1056", 0x4c}], 0x1}, 0x0) 09:05:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x1, 0x6, 0x8000000001}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77ffff, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x18) 09:05:34 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x1, 0x6, 0x8000000001}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77ffff, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x18) 09:05:34 executing program 3: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3800000000000000290000000400000078040401000000c0073510fbff000d4558e3c0b193a8cb7508000000fab771c359190078b8ba8bc7"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 09:05:34 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="4c000000120081f87059ae08060c04000200eb10400103fe054e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a0200000046314461e6ffffffffffffff0201c50b182bbe1056", 0x4c}], 0x1}, 0x0) 09:05:34 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:34 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe0000000]}}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 09:05:34 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x1, 0x6, 0x8000000001}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77ffff, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x18) 09:05:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x1, 0x6, 0x8000000001}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77ffff, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x18) 09:05:34 executing program 3: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3800000000000000290000000400000078040401000000c0073510fbff000d4558e3c0b193a8cb7508000000fab771c359190078b8ba8bc7"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 09:05:34 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="4c000000120081f87059ae08060c04000200eb10400103fe054e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a0200000046314461e6ffffffffffffff0201c50b182bbe1056", 0x4c}], 0x1}, 0x0) 09:05:34 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:34 executing program 3: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3800000000000000290000000400000078040401000000c0073510fbff000d4558e3c0b193a8cb7508000000fab771c359190078b8ba8bc7"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 09:05:34 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe0000000]}}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 09:05:34 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x1, 0x6, 0x8000000001}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77ffff, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x18) 09:05:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x1, 0x6, 0x8000000001}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77ffff, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x18) 09:05:35 executing program 3: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:35 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:35 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:35 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:35 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:35 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:35 executing program 3: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:36 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:36 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:36 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:36 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:36 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:36 executing program 3: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:37 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:37 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:37 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:37 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:37 executing program 0: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3800000000000000290000000400000078040401000000c0073510fbff000d4558e3c0b193a8cb7508000000fab771c359190078b8ba8bc7"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 09:05:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x1, 0x6, 0x8000000001}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77ffff, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x18) 09:05:37 executing program 0: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3800000000000000290000000400000078040401000000c0073510fbff000d4558e3c0b193a8cb7508000000fab771c359190078b8ba8bc7"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 09:05:37 executing program 0: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3800000000000000290000000400000078040401000000c0073510fbff000d4558e3c0b193a8cb7508000000fab771c359190078b8ba8bc7"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 09:05:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x1, 0x6, 0x8000000001}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77ffff, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x18) 09:05:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x1, 0x6, 0x8000000001}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77ffff, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x18) 09:05:37 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:38 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe0000000]}}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 09:05:38 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe0000000]}}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 09:05:38 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe0000000]}}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 09:05:38 executing program 2: socketpair(0x1, 0x0, 0x8000, 0x0) 09:05:38 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='7:2\t'], 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getpid() ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000840)) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000140)=r3) 09:05:38 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe0000000]}}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 09:05:38 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe0000000]}}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 09:05:38 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x2403, 0x0) 09:05:38 executing program 4: socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) getpid() write$cgroup_pid(r0, &(0x7f0000000300), 0xb) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0x7, 0x4) 09:05:38 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe0000000]}}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 09:05:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000031c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000200000002000000002000000000000000100000d0000000000000000020000000000000000000002000000000000"], 0x0, 0x3a}, 0x20) [ 356.932488][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 356.939112][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:05:38 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r0, r2}) sendmsg$kcm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x0) close(r3) 09:05:38 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x2403, 0x0) 09:05:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000031c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000200000002000000002000000000000000100000d0000000000000000020000000000000000000002000000000000"], 0x0, 0x3a}, 0x20) 09:05:38 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='7:2\t'], 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getpid() ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000840)) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000140)=r3) 09:05:38 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='7:2\t'], 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getpid() ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000840)) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000140)=r3) 09:05:38 executing program 4: socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) getpid() write$cgroup_pid(r0, &(0x7f0000000300), 0xb) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0x7, 0x4) 09:05:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000031c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000200000002000000002000000000000000100000d0000000000000000020000000000000000000002000000000000"], 0x0, 0x3a}, 0x20) 09:05:39 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x2403, 0x0) 09:05:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000031c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000200000002000000002000000000000000100000d0000000000000000020000000000000000000002000000000000"], 0x0, 0x3a}, 0x20) 09:05:39 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='7:2\t'], 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getpid() ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000840)) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000140)=r3) 09:05:39 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='7:2\t'], 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getpid() ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000840)) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000140)=r3) 09:05:39 executing program 4: socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) getpid() write$cgroup_pid(r0, &(0x7f0000000300), 0xb) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0x7, 0x4) 09:05:40 executing program 4: socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) getpid() write$cgroup_pid(r0, &(0x7f0000000300), 0xb) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0x7, 0x4) 09:05:40 executing program 5: socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) getpid() write$cgroup_pid(r0, &(0x7f0000000300), 0xb) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0x7, 0x4) 09:05:40 executing program 3: socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) getpid() write$cgroup_pid(r0, &(0x7f0000000300), 0xb) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0x7, 0x4) 09:05:40 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x2403, 0x0) 09:05:40 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='7:2\t'], 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getpid() ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000840)) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000140)=r3) 09:05:40 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='7:2\t'], 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getpid() ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000840)) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000140)=r3) 09:05:40 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='7:2\t'], 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getpid() ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000840)) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000140)=r3) 09:05:40 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='7:2\t'], 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getpid() ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000840)) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000140)=r3) [ 358.612548][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 358.618359][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:05:40 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x2403, 0x0) 09:05:40 executing program 3: socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) getpid() write$cgroup_pid(r0, &(0x7f0000000300), 0xb) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0x7, 0x4) 09:05:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) socket$kcm(0x2, 0x0, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r2, 0x0, 0x5, &(0x7f0000000140)='nr0\x01\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000040)='nr0\x01:\xf2.\xa3\'>\xf8]\x81$?\xfa\xbf1UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa44\xf4\x94\xa8>\xb1\xb1\xa2_&') bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 09:05:40 executing program 5: socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) getpid() write$cgroup_pid(r0, &(0x7f0000000300), 0xb) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0x7, 0x4) 09:05:40 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='7:2\t'], 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getpid() ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000840)) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000140)=r3) 09:05:40 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x2403, 0x0) 09:05:40 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='7:2\t'], 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getpid() ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000840)) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000140)=r3) [ 359.012526][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 359.018714][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 359.056397][T18331] ¿1UM¿ï©¬xôD3A}: renamed from nr0 09:05:40 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x2403, 0x0) 09:05:40 executing program 3: socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) getpid() write$cgroup_pid(r0, &(0x7f0000000300), 0xb) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0x7, 0x4) 09:05:40 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='7:2\t'], 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getpid() ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000840)) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000140)=r3) 09:05:41 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='7:2\t'], 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) getpid() ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000840)) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000140)=r3) 09:05:41 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) socket$kcm(0x2, 0x0, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r2, 0x0, 0x5, &(0x7f0000000140)='nr0\x01\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000040)='nr0\x01:\xf2.\xa3\'>\xf8]\x81$?\xfa\xbf1UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa44\xf4\x94\xa8>\xb1\xb1\xa2_&') bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 09:05:41 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) socket$kcm(0x2, 0x0, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r2, 0x0, 0x5, &(0x7f0000000140)='nr0\x01\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000040)='nr0\x01:\xf2.\xa3\'>\xf8]\x81$?\xfa\xbf1UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa44\xf4\x94\xa8>\xb1\xb1\xa2_&') bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 09:05:41 executing program 5: socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) getpid() write$cgroup_pid(r0, &(0x7f0000000300), 0xb) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0x7, 0x4) [ 359.653622][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 359.659861][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:05:41 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) socket$kcm(0x2, 0x0, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r2, 0x0, 0x5, &(0x7f0000000140)='nr0\x01\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000040)='nr0\x01:\xf2.\xa3\'>\xf8]\x81$?\xfa\xbf1UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa44\xf4\x94\xa8>\xb1\xb1\xa2_&') bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 09:05:41 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x6c}}, 0x0, 0x6e}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x448) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) perf_event_open$cgroup(&(0x7f00000006c0)={0x2, 0x70, 0x3, 0x101, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x8, 0x5, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8cc3, 0x2, 0x7, 0x6, 0x6, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1a2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18, 0x2, 0x0, 0x0, 0x3, 0x0, 0x400}, r1, 0x5, r0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 359.732489][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 359.738314][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:05:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x6b, 0xa, 0x8604}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 359.829007][T18372] ¿1UM¿ï©¬xôD3A}: renamed from nr0 09:05:41 executing program 5: r0 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f20831d200050024584f315f110900000000f0b906de559a0877e618767627", 0x2e}], 0x1}, 0x0) [ 359.991278][T18394] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.5'. [ 360.030570][T18385] ¿1UM¿ï©¬xôD3A}: renamed from nr0 09:05:41 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) socket$kcm(0x2, 0x0, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r2, 0x0, 0x5, &(0x7f0000000140)='nr0\x01\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000040)='nr0\x01:\xf2.\xa3\'>\xf8]\x81$?\xfa\xbf1UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa44\xf4\x94\xa8>\xb1\xb1\xa2_&') bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 09:05:41 executing program 5: r0 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f20831d200050024584f315f110900000000f0b906de559a0877e618767627", 0x2e}], 0x1}, 0x0) 09:05:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x6b, 0xa, 0x8604}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 09:05:41 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) socket$kcm(0x2, 0x0, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r2, 0x0, 0x5, &(0x7f0000000140)='nr0\x01\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000040)='nr0\x01:\xf2.\xa3\'>\xf8]\x81$?\xfa\xbf1UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa44\xf4\x94\xa8>\xb1\xb1\xa2_&') bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 09:05:41 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x6c}}, 0x0, 0x6e}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x448) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) perf_event_open$cgroup(&(0x7f00000006c0)={0x2, 0x70, 0x3, 0x101, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x8, 0x5, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8cc3, 0x2, 0x7, 0x6, 0x6, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1a2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18, 0x2, 0x0, 0x0, 0x3, 0x0, 0x400}, r1, 0x5, r0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 09:05:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) socket$kcm(0x2, 0x0, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r2, 0x0, 0x5, &(0x7f0000000140)='nr0\x01\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000040)='nr0\x01:\xf2.\xa3\'>\xf8]\x81$?\xfa\xbf1UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa44\xf4\x94\xa8>\xb1\xb1\xa2_&') bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) [ 360.293177][T18408] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x6b, 0xa, 0x8604}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 360.407185][T18416] ¿1UM¿ï©¬xôD3A}: renamed from nr0 09:05:42 executing program 5: r0 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f20831d200050024584f315f110900000000f0b906de559a0877e618767627", 0x2e}], 0x1}, 0x0) 09:05:42 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x6c}}, 0x0, 0x6e}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x448) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) perf_event_open$cgroup(&(0x7f00000006c0)={0x2, 0x70, 0x3, 0x101, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x8, 0x5, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8cc3, 0x2, 0x7, 0x6, 0x6, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1a2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18, 0x2, 0x0, 0x0, 0x3, 0x0, 0x400}, r1, 0x5, r0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 09:05:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x6b, 0xa, 0x8604}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 360.555479][T18413] ¿1UM¿ï©¬xôD3A}: renamed from nr0 [ 360.626848][T18430] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:42 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) socket$kcm(0x2, 0x0, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r2, 0x0, 0x5, &(0x7f0000000140)='nr0\x01\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000040)='nr0\x01:\xf2.\xa3\'>\xf8]\x81$?\xfa\xbf1UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa44\xf4\x94\xa8>\xb1\xb1\xa2_&') bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) [ 360.688529][T18424] ¿1UM¿ï©¬xôD3A}: renamed from nr0 09:05:42 executing program 5: r0 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f20831d200050024584f315f110900000000f0b906de559a0877e618767627", 0x2e}], 0x1}, 0x0) 09:05:42 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x6c}}, 0x0, 0x6e}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x448) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) perf_event_open$cgroup(&(0x7f00000006c0)={0x2, 0x70, 0x3, 0x101, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x8, 0x5, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8cc3, 0x2, 0x7, 0x6, 0x6, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1a2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18, 0x2, 0x0, 0x0, 0x3, 0x0, 0x400}, r1, 0x5, r0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 09:05:42 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x6c}}, 0x0, 0x6e}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x448) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) perf_event_open$cgroup(&(0x7f00000006c0)={0x2, 0x70, 0x3, 0x101, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x8, 0x5, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8cc3, 0x2, 0x7, 0x6, 0x6, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1a2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18, 0x2, 0x0, 0x0, 0x3, 0x0, 0x400}, r1, 0x5, r0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 09:05:42 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) socket$kcm(0x2, 0x0, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r2, 0x0, 0x5, &(0x7f0000000140)='nr0\x01\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000040)='nr0\x01:\xf2.\xa3\'>\xf8]\x81$?\xfa\xbf1UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa44\xf4\x94\xa8>\xb1\xb1\xa2_&') bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 09:05:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) socket$kcm(0x2, 0x0, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r2, 0x0, 0x5, &(0x7f0000000140)='nr0\x01\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000040)='nr0\x01:\xf2.\xa3\'>\xf8]\x81$?\xfa\xbf1UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa44\xf4\x94\xa8>\xb1\xb1\xa2_&') bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) [ 360.974406][T18451] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.5'. [ 361.019713][T18455] ¿1UM¿ï©¬xôD3A}: renamed from nr0 09:05:42 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x6c}}, 0x0, 0x6e}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x448) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) perf_event_open$cgroup(&(0x7f00000006c0)={0x2, 0x70, 0x3, 0x101, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x8, 0x5, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8cc3, 0x2, 0x7, 0x6, 0x6, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1a2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18, 0x2, 0x0, 0x0, 0x3, 0x0, 0x400}, r1, 0x5, r0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 09:05:42 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x6c}}, 0x0, 0x6e}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x448) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) perf_event_open$cgroup(&(0x7f00000006c0)={0x2, 0x70, 0x3, 0x101, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x8, 0x5, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8cc3, 0x2, 0x7, 0x6, 0x6, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1a2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18, 0x2, 0x0, 0x0, 0x3, 0x0, 0x400}, r1, 0x5, r0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 09:05:42 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x6c}}, 0x0, 0x6e}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x448) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) perf_event_open$cgroup(&(0x7f00000006c0)={0x2, 0x70, 0x3, 0x101, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x8, 0x5, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8cc3, 0x2, 0x7, 0x6, 0x6, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1a2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18, 0x2, 0x0, 0x0, 0x3, 0x0, 0x400}, r1, 0x5, r0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 09:05:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0xf5ffffff00000000]}, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) [ 361.297086][T18468] ¿1UM¿ï©¬xôD3A}: renamed from nr0 [ 361.425578][T18465] ¿1UM¿ï©¬xôD3A}: renamed from nr0 09:05:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x6c}}, 0x0, 0x6e}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x448) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) perf_event_open$cgroup(&(0x7f00000006c0)={0x2, 0x70, 0x3, 0x101, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x8, 0x5, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8cc3, 0x2, 0x7, 0x6, 0x6, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1a2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18, 0x2, 0x0, 0x0, 0x3, 0x0, 0x400}, r1, 0x5, r0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 09:05:43 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x6c}}, 0x0, 0x6e}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x448) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) perf_event_open$cgroup(&(0x7f00000006c0)={0x2, 0x70, 0x3, 0x101, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x8, 0x5, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8cc3, 0x2, 0x7, 0x6, 0x6, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1a2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18, 0x2, 0x0, 0x0, 0x3, 0x0, 0x400}, r1, 0x5, r0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 09:05:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 09:05:43 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x6c}}, 0x0, 0x6e}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x448) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) perf_event_open$cgroup(&(0x7f00000006c0)={0x2, 0x70, 0x3, 0x101, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x8, 0x5, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8cc3, 0x2, 0x7, 0x6, 0x6, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1a2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18, 0x2, 0x0, 0x0, 0x3, 0x0, 0x400}, r1, 0x5, r0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 09:05:43 executing program 3: socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 09:05:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x6c}}, 0x0, 0x6e}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x448) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) perf_event_open$cgroup(&(0x7f00000006c0)={0x2, 0x70, 0x3, 0x101, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x8, 0x5, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8cc3, 0x2, 0x7, 0x6, 0x6, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1a2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18, 0x2, 0x0, 0x0, 0x3, 0x0, 0x400}, r1, 0x5, r0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 09:05:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 09:05:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 09:05:43 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000300)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x6c}}, 0x0, 0x6e}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() r3 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x448) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) perf_event_open$cgroup(&(0x7f00000006c0)={0x2, 0x70, 0x3, 0x101, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x8, 0x5, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8cc3, 0x2, 0x7, 0x6, 0x6, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1a2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18, 0x2, 0x0, 0x0, 0x3, 0x0, 0x400}, r1, 0x5, r0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 09:05:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 09:05:44 executing program 3: socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 09:05:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0xf5ffffff00000000]}, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 09:05:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 09:05:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0xf5ffffff00000000]}, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 09:05:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 09:05:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 09:05:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0xf5ffffff00000000]}, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 09:05:44 executing program 2: socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 09:05:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0xf5ffffff00000000]}, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 09:05:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 09:05:44 executing program 3: socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 09:05:44 executing program 0: socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 09:05:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 09:05:45 executing program 2: socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 09:05:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0xf5ffffff00000000]}, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 09:05:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 09:05:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0xf5ffffff00000000]}, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 09:05:45 executing program 0: socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 09:05:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 09:05:45 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:05:45 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)=""/1}, 0x18) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) socketpair(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f8, &(0x7f0000000140)='sit0\x00') 09:05:45 executing program 2: socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 09:05:46 executing program 3: socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 09:05:46 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) 09:05:46 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:05:46 executing program 0: socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 09:05:46 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)=""/1}, 0x18) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) socketpair(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f8, &(0x7f0000000140)='sit0\x00') 09:05:46 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:05:46 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) 09:05:46 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)=""/1}, 0x18) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) socketpair(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f8, &(0x7f0000000140)='sit0\x00') 09:05:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) 09:05:46 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:05:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) 09:05:46 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) 09:05:46 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000004c0)) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00@\x00\x00\x00'], 0x8) openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 09:05:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) 09:05:47 executing program 0: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:47 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)=""/1}, 0x18) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) socketpair(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f8, &(0x7f0000000140)='sit0\x00') 09:05:47 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) 09:05:47 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) 09:05:47 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000004c0)) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00@\x00\x00\x00'], 0x8) openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 09:05:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) 09:05:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 09:05:47 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) [ 365.892485][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 365.898289][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:05:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0xfdb9, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 365.972501][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 365.978308][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:05:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000900120111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, 0x0, 0x0) [ 366.089066][T18681] device nr0 entered promiscuous mode 09:05:47 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000004c0)) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00@\x00\x00\x00'], 0x8) openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 09:05:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xe5) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff70) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_pid(r3, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)}], 0x1}, 0x1) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x40000, 0x0) gettid() ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000480)) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) [ 366.163039][T18702] skbuff: bad partial csum: csum=55150/36832 headroom=64 headlen=64997 [ 366.542264][T18712] netlink: 'syz-executor.2': attribute type 274 has an invalid length. [ 366.551020][T18712] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 366.690966][T18681] device nr0 entered promiscuous mode 09:05:48 executing program 0: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:48 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000004c0)) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00@\x00\x00\x00'], 0x8) openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 09:05:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 09:05:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000900120111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 09:05:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xe5) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff70) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_pid(r3, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)}], 0x1}, 0x1) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x40000, 0x0) gettid() ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000480)) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 09:05:48 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0xfdb9, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 366.932523][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 366.938066][T18733] netlink: 'syz-executor.2': attribute type 274 has an invalid length. [ 366.938344][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 366.996906][T18733] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 09:05:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 09:05:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000900120111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 09:05:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 09:05:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0xfdb9, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 367.467761][T18749] device nr0 entered promiscuous mode [ 367.481676][T18754] netlink: 'syz-executor.2': attribute type 274 has an invalid length. 09:05:49 executing program 4: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 367.513183][T18754] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 09:05:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xe5) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff70) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_pid(r3, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)}], 0x1}, 0x1) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x40000, 0x0) gettid() ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000480)) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 09:05:49 executing program 0: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="2e0000001e000507ed0080647e6394f26731d2000900120111404b480f0001000080020000000300f88000f01700", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 09:05:49 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0xfdb9, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 09:05:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0xfdb9, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 368.041679][T18771] device nr0 entered promiscuous mode 09:05:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xe5) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff70) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_pid(r3, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)}], 0x1}, 0x1) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x40000, 0x0) gettid() ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000480)) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) [ 368.151636][T18786] netlink: 'syz-executor.2': attribute type 274 has an invalid length. [ 368.160489][T18784] skbuff: bad partial csum: csum=55150/36832 headroom=64 headlen=64997 [ 368.168969][T18782] skbuff: bad partial csum: csum=55150/36832 headroom=64 headlen=64997 [ 368.177462][T18786] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 09:05:50 executing program 2: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:50 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0xfdb9, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 09:05:50 executing program 4: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0xfdb9, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 368.851080][T18796] device nr0 entered promiscuous mode [ 368.893058][T18804] device nr0 entered promiscuous mode 09:05:50 executing program 5: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 369.271291][T18822] device nr0 entered promiscuous mode [ 369.367201][T18830] device nr0 entered promiscuous mode 09:05:51 executing program 0: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:51 executing program 1: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:51 executing program 3: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:51 executing program 2: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:52 executing program 4: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 370.344648][T18846] device nr0 entered promiscuous mode [ 370.431286][T18851] device nr0 entered promiscuous mode [ 370.569254][T18854] device nr0 entered promiscuous mode 09:05:52 executing program 5: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 370.610526][T18870] device nr0 entered promiscuous mode [ 371.050665][T18880] device nr0 entered promiscuous mode 09:05:53 executing program 0: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:53 executing program 1: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 371.410591][T18890] device nr0 entered promiscuous mode 09:05:53 executing program 3: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:53 executing program 2: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:53 executing program 4: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 372.217334][T18904] device nr0 entered promiscuous mode [ 372.259268][T18906] device nr0 entered promiscuous mode 09:05:54 executing program 5: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 372.457539][T18924] device nr0 entered promiscuous mode [ 372.520930][T18926] device nr0 entered promiscuous mode [ 372.896731][T18940] device nr0 entered promiscuous mode 09:05:55 executing program 0: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:55 executing program 1: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 373.253915][T18950] device nr0 entered promiscuous mode 09:05:55 executing program 3: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:55 executing program 2: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 373.908832][T18964] device nr0 entered promiscuous mode 09:05:55 executing program 4: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 374.034058][T18966] device nr0 entered promiscuous mode [ 374.165796][T18980] device nr0 entered promiscuous mode 09:05:56 executing program 5: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 374.672138][T18993] device nr0 entered promiscuous mode [ 374.857339][T18999] device nr0 entered promiscuous mode 09:05:56 executing program 1: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:56 executing program 0: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 374.953403][T19010] device nr0 entered promiscuous mode 09:05:57 executing program 3: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:57 executing program 2: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 375.796646][T19024] device nr0 entered promiscuous mode 09:05:57 executing program 5: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:57 executing program 4: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 375.982944][T19026] device nr0 entered promiscuous mode [ 376.084393][T19040] device nr0 entered promiscuous mode [ 376.631681][T19056] device nr0 entered promiscuous mode [ 376.817955][T19058] device nr0 entered promiscuous mode [ 376.924900][T19060] device nr0 entered promiscuous mode 09:05:58 executing program 0: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:58 executing program 1: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:59 executing program 3: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:59 executing program 4: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:05:59 executing program 5: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 377.759627][T19081] device nr0 entered promiscuous mode [ 377.855389][T19083] device nr0 entered promiscuous mode 09:05:59 executing program 2: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 378.259666][T19097] device nr0 entered promiscuous mode [ 378.298029][T19107] device nr0 entered promiscuous mode [ 378.538184][T19119] device nr0 entered promiscuous mode 09:06:00 executing program 0: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 378.626204][T19127] device nr0 entered promiscuous mode 09:06:00 executing program 1: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:06:01 executing program 3: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 379.294331][T19137] device nr0 entered promiscuous mode 09:06:01 executing program 4: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 379.467010][T19147] device nr0 entered promiscuous mode 09:06:01 executing program 5: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 379.944028][T19156] device nr0 entered promiscuous mode 09:06:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xe5) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff70) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_pid(r3, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)}], 0x1}, 0x1) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x40000, 0x0) gettid() ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000480)) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) [ 380.313303][T19168] device nr0 entered promiscuous mode 09:06:02 executing program 0: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) [ 380.357315][T19170] device nr0 entered promiscuous mode 09:06:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xe5) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff70) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_pid(r3, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)}], 0x1}, 0x1) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x40000, 0x0) gettid() ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000480)) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 09:06:02 executing program 4: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:06:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xe5) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff70) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_pid(r3, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)}], 0x1}, 0x1) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x40000, 0x0) gettid() ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000480)) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 09:06:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xe5) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff70) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_pid(r3, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)}], 0x1}, 0x1) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x40000, 0x0) gettid() ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000480)) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) [ 381.291597][T19188] device nr0 entered promiscuous mode 09:06:03 executing program 5: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:06:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xe5) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff70) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_pid(r3, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)}], 0x1}, 0x1) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x40000, 0x0) gettid() ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000480)) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) [ 382.078351][T19206] device nr0 entered promiscuous mode 09:06:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xe5) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff70) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_pid(r3, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)}], 0x1}, 0x1) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x40000, 0x0) gettid() ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000480)) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 09:06:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xe5) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff70) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_pid(r3, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)}], 0x1}, 0x1) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x40000, 0x0) gettid() ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000480)) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 09:06:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 09:06:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xe5) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff70) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_pid(r3, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)}], 0x1}, 0x1) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x40000, 0x0) gettid() ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000480)) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) [ 382.383589][T19220] device nr0 entered promiscuous mode 09:06:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 09:06:04 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) socketpair(0xb, 0x3, 0x19f7800000000000, &(0x7f0000000580)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={0xffffffffffffffff, 0x6, 0x1, 0xff, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4df0e00000000000) 09:06:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 09:06:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xe5) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff70) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_pid(r3, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)}], 0x1}, 0x1) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cd4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x40000, 0x0) gettid() ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000480)) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000000c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 09:06:04 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x2}, 0xc) recvmsg(0xffffffffffffffff, &(0x7f0000019a40)={&(0x7f0000017400)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000019980)=[{0x0}, {&(0x7f0000018580)=""/71, 0x47}, {&(0x7f0000018600)=""/250, 0xfa}, {&(0x7f0000018700)=""/233, 0xe9}, {&(0x7f0000018800)=""/87, 0x57}, {0x0}, {&(0x7f0000019880)=""/230, 0xe6}], 0x7, &(0x7f0000019a00)=""/63, 0x3f}, 0x42) bpf$PROG_LOAD(0x5, &(0x7f0000019b00)={0x0, 0xe, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1fb}, [@exit, @exit, @alu={0x4, 0x2000000000, 0xf, 0xa, 0x6, 0x0, 0x4}, @jmp={0x5, 0x100000000, 0xc, 0x7, 0xb, 0x70, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xed}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map={0x18, 0x9, 0x1, 0x0, r0}, @exit]}, &(0x7f0000000140)='syzkaller\x00', 0x40, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r0, 0x8, &(0x7f0000019a80)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000019ac0)={0x5, 0xd, 0x2, 0xfffffffffffffffa}, 0x10}, 0x70) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000000c0)={0x0, 0x70, 0x5c03f7cb, 0x6, 0xffff, 0x0, 0x0, 0x9, 0x6000, 0x4, 0xfffffffffffffff8, 0x5, 0x8, 0x80000000, 0x100000001, 0x32da, 0x0, 0x400, 0x2, 0x8, 0x5d, 0x76, 0x0, 0x401, 0x40, 0x1, 0x3a, 0x7, 0x8, 0x1c04, 0x9, 0x0, 0x0, 0x800, 0x3f, 0x7f, 0x9, 0x7, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x4}, 0x1000, 0x2, 0x6, 0x0, 0xff, 0x7}) socketpair(0x25, 0x5, 0x3, &(0x7f0000000040)) 09:06:04 executing program 5: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000700)=0xe25) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r6 = openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000004c0)={0x3, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x0, 0x100, 0x4, 0x20db}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r8, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dffb798e7e1"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="1814e5c0610d", @ANYRES64=r6, @ANYRES32=r5, @ANYRESHEX=r1, @ANYRESOCT=0x0]], @ANYRES64=r5, @ANYRESDEC=r3, @ANYRESHEX=r6]) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) 09:06:05 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='1:2\t'], 0x4) 09:06:05 executing program 1: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 09:06:05 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x2}, 0xc) recvmsg(0xffffffffffffffff, &(0x7f0000019a40)={&(0x7f0000017400)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000019980)=[{0x0}, {&(0x7f0000018580)=""/71, 0x47}, {&(0x7f0000018600)=""/250, 0xfa}, {&(0x7f0000018700)=""/233, 0xe9}, {&(0x7f0000018800)=""/87, 0x57}, {0x0}, {&(0x7f0000019880)=""/230, 0xe6}], 0x7, &(0x7f0000019a00)=""/63, 0x3f}, 0x42) bpf$PROG_LOAD(0x5, &(0x7f0000019b00)={0x0, 0xe, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1fb}, [@exit, @exit, @alu={0x4, 0x2000000000, 0xf, 0xa, 0x6, 0x0, 0x4}, @jmp={0x5, 0x100000000, 0xc, 0x7, 0xb, 0x70, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xed}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map={0x18, 0x9, 0x1, 0x0, r0}, @exit]}, &(0x7f0000000140)='syzkaller\x00', 0x40, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r0, 0x8, &(0x7f0000019a80)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000019ac0)={0x5, 0xd, 0x2, 0xfffffffffffffffa}, 0x10}, 0x70) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000000c0)={0x0, 0x70, 0x5c03f7cb, 0x6, 0xffff, 0x0, 0x0, 0x9, 0x6000, 0x4, 0xfffffffffffffff8, 0x5, 0x8, 0x80000000, 0x100000001, 0x32da, 0x0, 0x400, 0x2, 0x8, 0x5d, 0x76, 0x0, 0x401, 0x40, 0x1, 0x3a, 0x7, 0x8, 0x1c04, 0x9, 0x0, 0x0, 0x800, 0x3f, 0x7f, 0x9, 0x7, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x4}, 0x1000, 0x2, 0x6, 0x0, 0xff, 0x7}) socketpair(0x25, 0x5, 0x3, &(0x7f0000000040)) [ 383.566849][T19266] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 09:06:05 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='1:2\t'], 0x4) [ 383.637965][T19272] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 383.657009][T19266] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 383.703972][T19272] CPU: 0 PID: 19272 Comm: syz-executor.1 Not tainted 5.2.0-rc1+ #6 [ 383.711928][T19272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.722028][T19272] Call Trace: [ 383.725383][T19272] dump_stack+0x172/0x1f0 [ 383.729725][T19272] dump_header+0x10f/0xb6c [ 383.734154][T19272] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 383.739964][T19272] ? ___ratelimit+0x60/0x595 [ 383.744550][T19272] ? do_raw_spin_unlock+0x57/0x270 [ 383.749661][T19272] oom_kill_process.cold+0x10/0x15 [ 383.754776][T19272] out_of_memory+0x79a/0x1280 [ 383.759459][T19272] ? __sched_text_start+0x8/0x8 [ 383.764312][T19272] ? oom_killer_disable+0x280/0x280 [ 383.769506][T19272] ? cgroup_file_notify+0x140/0x1b0 [ 383.774714][T19272] mem_cgroup_out_of_memory+0x1ca/0x230 [ 383.780258][T19272] ? memcg_event_wake+0x230/0x230 [ 383.785285][T19272] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 383.791085][T19272] ? cgroup_file_notify+0x140/0x1b0 [ 383.796289][T19272] memory_max_write+0x169/0x300 [ 383.801145][T19272] ? mem_cgroup_write+0x360/0x360 [ 383.806169][T19272] ? lock_acquire+0x16f/0x3f0 [ 383.810843][T19272] ? kernfs_fop_write+0x227/0x480 [ 383.815886][T19272] cgroup_file_write+0x241/0x790 [ 383.820824][T19272] ? mem_cgroup_write+0x360/0x360 [ 383.825846][T19272] ? kill_css+0x380/0x380 [ 383.830181][T19272] ? kill_css+0x380/0x380 [ 383.834507][T19272] kernfs_fop_write+0x2b8/0x480 [ 383.839360][T19272] __vfs_write+0x8a/0x110 [ 383.843698][T19272] ? kernfs_fop_open+0xd80/0xd80 [ 383.848636][T19272] vfs_write+0x20c/0x580 [ 383.852890][T19272] ksys_write+0x14f/0x290 [ 383.857219][T19272] ? __ia32_sys_read+0xb0/0xb0 [ 383.862009][T19272] ? do_syscall_64+0x26/0x680 [ 383.866692][T19272] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.872757][T19272] ? do_syscall_64+0x26/0x680 [ 383.877438][T19272] __x64_sys_write+0x73/0xb0 [ 383.882026][T19272] do_syscall_64+0xfd/0x680 [ 383.886560][T19272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.892443][T19272] RIP: 0033:0x459279 [ 383.896333][T19272] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 383.915932][T19272] RSP: 002b:00007f1938e62c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 383.924342][T19272] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 383.932307][T19272] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 383.940277][T19272] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 383.948334][T19272] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1938e636d4 [ 383.956300][T19272] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff 09:06:05 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) socketpair(0xb, 0x3, 0x19f7800000000000, &(0x7f0000000580)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={0xffffffffffffffff, 0x6, 0x1, 0xff, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4df0e00000000000) 09:06:05 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x2}, 0xc) recvmsg(0xffffffffffffffff, &(0x7f0000019a40)={&(0x7f0000017400)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000019980)=[{0x0}, {&(0x7f0000018580)=""/71, 0x47}, {&(0x7f0000018600)=""/250, 0xfa}, {&(0x7f0000018700)=""/233, 0xe9}, {&(0x7f0000018800)=""/87, 0x57}, {0x0}, {&(0x7f0000019880)=""/230, 0xe6}], 0x7, &(0x7f0000019a00)=""/63, 0x3f}, 0x42) bpf$PROG_LOAD(0x5, &(0x7f0000019b00)={0x0, 0xe, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1fb}, [@exit, @exit, @alu={0x4, 0x2000000000, 0xf, 0xa, 0x6, 0x0, 0x4}, @jmp={0x5, 0x100000000, 0xc, 0x7, 0xb, 0x70, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xed}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map={0x18, 0x9, 0x1, 0x0, r0}, @exit]}, &(0x7f0000000140)='syzkaller\x00', 0x40, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r0, 0x8, &(0x7f0000019a80)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000019ac0)={0x5, 0xd, 0x2, 0xfffffffffffffffa}, 0x10}, 0x70) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000000c0)={0x0, 0x70, 0x5c03f7cb, 0x6, 0xffff, 0x0, 0x0, 0x9, 0x6000, 0x4, 0xfffffffffffffff8, 0x5, 0x8, 0x80000000, 0x100000001, 0x32da, 0x0, 0x400, 0x2, 0x8, 0x5d, 0x76, 0x0, 0x401, 0x40, 0x1, 0x3a, 0x7, 0x8, 0x1c04, 0x9, 0x0, 0x0, 0x800, 0x3f, 0x7f, 0x9, 0x7, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x4}, 0x1000, 0x2, 0x6, 0x0, 0xff, 0x7}) socketpair(0x25, 0x5, 0x3, &(0x7f0000000040)) [ 384.040179][T19276] device nr0 entered promiscuous mode [ 384.042646][T19272] memory: usage 9096kB, limit 0kB, failcnt 0 [ 384.062875][T19272] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 384.110325][T19272] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 384.120767][T19272] Memory cgroup stats for /syz1: cache:20KB rss:2292KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2220KB inactive_file:0KB active_file:0KB unevictable:0KB [ 384.161086][T19272] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=19265,uid=0 [ 384.216953][T19272] Memory cgroup out of memory: Killed process 19265 (syz-executor.1) total-vm:72708kB, anon-rss:2152kB, file-rss:34816kB, shmem-rss:0kB [ 384.240405][ T1041] oom_reaper: reaped process 19265 (syz-executor.1), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 09:06:06 executing program 1: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 09:06:06 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x2}, 0xc) recvmsg(0xffffffffffffffff, &(0x7f0000019a40)={&(0x7f0000017400)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000019980)=[{0x0}, {&(0x7f0000018580)=""/71, 0x47}, {&(0x7f0000018600)=""/250, 0xfa}, {&(0x7f0000018700)=""/233, 0xe9}, {&(0x7f0000018800)=""/87, 0x57}, {0x0}, {&(0x7f0000019880)=""/230, 0xe6}], 0x7, &(0x7f0000019a00)=""/63, 0x3f}, 0x42) bpf$PROG_LOAD(0x5, &(0x7f0000019b00)={0x0, 0xe, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1fb}, [@exit, @exit, @alu={0x4, 0x2000000000, 0xf, 0xa, 0x6, 0x0, 0x4}, @jmp={0x5, 0x100000000, 0xc, 0x7, 0xb, 0x70, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xed}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map={0x18, 0x9, 0x1, 0x0, r0}, @exit]}, &(0x7f0000000140)='syzkaller\x00', 0x40, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r0, 0x8, &(0x7f0000019a80)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000019ac0)={0x5, 0xd, 0x2, 0xfffffffffffffffa}, 0x10}, 0x70) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000000c0)={0x0, 0x70, 0x5c03f7cb, 0x6, 0xffff, 0x0, 0x0, 0x9, 0x6000, 0x4, 0xfffffffffffffff8, 0x5, 0x8, 0x80000000, 0x100000001, 0x32da, 0x0, 0x400, 0x2, 0x8, 0x5d, 0x76, 0x0, 0x401, 0x40, 0x1, 0x3a, 0x7, 0x8, 0x1c04, 0x9, 0x0, 0x0, 0x800, 0x3f, 0x7f, 0x9, 0x7, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x4}, 0x1000, 0x2, 0x6, 0x0, 0xff, 0x7}) socketpair(0x25, 0x5, 0x3, &(0x7f0000000040)) [ 384.395754][ T8820] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 384.462664][ T8820] CPU: 0 PID: 8820 Comm: syz-executor.1 Not tainted 5.2.0-rc1+ #6 [ 384.470504][ T8820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.480560][ T8820] Call Trace: [ 384.483861][ T8820] dump_stack+0x172/0x1f0 [ 384.488226][ T8820] dump_header+0x10f/0xb6c [ 384.492657][ T8820] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 384.498476][ T8820] ? ___ratelimit+0x60/0x595 [ 384.503077][ T8820] ? do_raw_spin_unlock+0x57/0x270 [ 384.508200][ T8820] oom_kill_process.cold+0x10/0x15 [ 384.513322][ T8820] out_of_memory+0x79a/0x1280 [ 384.518099][ T8820] ? lock_downgrade+0x880/0x880 [ 384.522960][ T8820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.522995][ T8820] ? oom_killer_disable+0x280/0x280 [ 384.523015][ T8820] ? find_held_lock+0x35/0x130 [ 384.523037][ T8820] mem_cgroup_out_of_memory+0x1ca/0x230 [ 384.523051][ T8820] ? memcg_event_wake+0x230/0x230 [ 384.549894][ T8820] ? do_raw_spin_unlock+0x57/0x270 [ 384.555015][ T8820] ? _raw_spin_unlock+0x2d/0x50 [ 384.555036][ T8820] try_charge+0x102c/0x15c0 [ 384.555049][ T8820] ? find_held_lock+0x35/0x130 [ 384.555075][ T8820] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 384.555091][ T8820] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 384.555104][ T8820] ? find_held_lock+0x35/0x130 [ 384.555121][ T8820] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 384.555150][ T8820] __memcg_kmem_charge_memcg+0x7c/0x130 [ 384.555167][ T8820] ? memcg_kmem_put_cache+0xb0/0xb0 [ 384.555186][ T8820] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 384.555207][ T8820] __memcg_kmem_charge+0x136/0x300 09:06:06 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 09:06:06 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='1:2\t'], 0x4) [ 384.555227][ T8820] __alloc_pages_nodemask+0x4bd/0x8d0 [ 384.617460][ T8820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.623720][ T8820] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 384.629448][ T8820] ? copy_process.part.0+0x43f7/0x6790 [ 384.634930][ T8820] ? lockdep_hardirqs_on+0x418/0x5d0 [ 384.640227][ T8820] ? trace_hardirqs_on+0x67/0x220 [ 384.645260][ T8820] ? kasan_check_read+0x11/0x20 [ 384.645289][ T8820] copy_process.part.0+0x4a0/0x6790 [ 384.645308][ T8820] ? __schedule+0x76c/0x1560 [ 384.645333][ T8820] ? __cleanup_sighand+0x60/0x60 [ 384.645350][ T8820] ? _raw_spin_unlock_irq+0x5e/0x90 [ 384.645366][ T8820] ? finish_task_switch+0x118/0x730 [ 384.645401][ T8820] _do_fork+0x25d/0xfe0 [ 384.645424][ T8820] ? copy_init_mm+0x20/0x20 [ 384.645440][ T8820] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 384.645466][ T8820] ? retint_kernel+0x2b/0x2b [ 384.645491][ T8820] __x64_sys_clone+0xbf/0x150 [ 384.645508][ T8820] ? do_syscall_64+0x5b/0x680 [ 384.645523][ T8820] do_syscall_64+0xfd/0x680 [ 384.645546][ T8820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.645559][ T8820] RIP: 0033:0x45784a [ 384.645575][ T8820] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 384.645583][ T8820] RSP: 002b:00007ffd6453b220 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 384.645606][ T8820] RAX: ffffffffffffffda RBX: 00007ffd6453b220 RCX: 000000000045784a [ 384.645614][ T8820] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 384.645622][ T8820] RBP: 00007ffd6453b260 R08: 0000000000000001 R09: 00005555566e3940 [ 384.645630][ T8820] R10: 00005555566e3c10 R11: 0000000000000246 R12: 0000000000000001 [ 384.777861][ T8820] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd6453b2b0 [ 384.828771][T19301] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 384.838678][T19301] openvswitch: netlink: Flow get message rejected, Key attribute missing. 09:06:06 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 385.021079][ T8820] memory: usage 6704kB, limit 0kB, failcnt 8 [ 385.027421][ T8820] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 385.035036][ T8820] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 385.069169][ T8820] Memory cgroup stats for /syz1: cache:20KB rss:188KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:116KB inactive_file:0KB active_file:0KB unevictable:0KB [ 385.128546][ T8820] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=8820,uid=0 [ 385.160928][ T8820] Memory cgroup out of memory: Killed process 8820 (syz-executor.1) total-vm:72444kB, anon-rss:104kB, file-rss:35776kB, shmem-rss:0kB [ 385.209556][T19304] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.0'. [ 385.228275][ T1041] oom_reaper: reaped process 8820 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 385.228281][T19304] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 385.240746][T19301] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 385.280490][T19301] CPU: 1 PID: 19301 Comm: syz-executor.3 Not tainted 5.2.0-rc1+ #6 [ 385.288422][T19301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.298483][T19301] Call Trace: [ 385.301786][T19301] dump_stack+0x172/0x1f0 [ 385.306137][T19301] dump_header+0x10f/0xb6c [ 385.310567][T19301] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 385.316405][T19301] ? ___ratelimit+0x60/0x595 [ 385.321002][T19301] ? do_raw_spin_unlock+0x57/0x270 [ 385.326128][T19301] oom_kill_process.cold+0x10/0x15 [ 385.331256][T19301] out_of_memory+0x79a/0x1280 [ 385.335954][T19301] ? oom_killer_disable+0x280/0x280 [ 385.341180][T19301] mem_cgroup_out_of_memory+0x1ca/0x230 [ 385.346733][T19301] ? memcg_event_wake+0x230/0x230 [ 385.351763][T19301] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 385.357553][T19301] ? cgroup_file_notify+0x140/0x1b0 [ 385.362753][T19301] memory_max_write+0x169/0x300 [ 385.367601][T19301] ? mem_cgroup_write+0x360/0x360 [ 385.372624][T19301] ? mem_cgroup_write+0x360/0x360 [ 385.377641][T19301] cgroup_file_write+0x241/0x790 [ 385.382564][T19301] ? mem_cgroup_write+0x360/0x360 [ 385.387573][T19301] ? kill_css+0x380/0x380 [ 385.391891][T19301] ? kill_css+0x380/0x380 [ 385.396377][T19301] kernfs_fop_write+0x2b8/0x480 [ 385.401219][T19301] __vfs_write+0x8a/0x110 [ 385.405541][T19301] ? kernfs_fop_open+0xd80/0xd80 [ 385.410553][T19301] vfs_write+0x20c/0x580 [ 385.414782][T19301] ksys_write+0x14f/0x290 [ 385.419110][T19301] ? __ia32_sys_read+0xb0/0xb0 [ 385.423863][T19301] ? do_syscall_64+0x26/0x680 [ 385.428528][T19301] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.434590][T19301] ? do_syscall_64+0x26/0x680 [ 385.439289][T19301] __x64_sys_write+0x73/0xb0 [ 385.443865][T19301] do_syscall_64+0xfd/0x680 [ 385.448404][T19301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.454289][T19301] RIP: 0033:0x459279 [ 385.458186][T19301] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 385.477780][T19301] RSP: 002b:00007f20d465cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 385.486281][T19301] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 385.494247][T19301] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 385.502200][T19301] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 385.510172][T19301] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20d465d6d4 [ 385.518134][T19301] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 385.530146][T19301] memory: usage 9240kB, limit 0kB, failcnt 0 [ 385.536658][T19301] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 385.545085][T19301] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 385.552325][T19301] Memory cgroup stats for /syz3: cache:104KB rss:2284KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2212KB inactive_file:132KB active_file:132KB unevictable:0KB [ 385.576318][T19301] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=19300,uid=0 [ 385.592940][T19301] Memory cgroup out of memory: Killed process 19300 (syz-executor.3) total-vm:72576kB, anon-rss:2148kB, file-rss:34816kB, shmem-rss:0kB [ 385.612010][ T1041] oom_reaper: reaped process 19300 (syz-executor.3), now anon-rss:0kB, file-rss:34884kB, shmem-rss:0kB [ 385.623943][T19304] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 385.636232][T19304] CPU: 0 PID: 19304 Comm: syz-executor.0 Not tainted 5.2.0-rc1+ #6 [ 385.644138][T19304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.654193][T19304] Call Trace: [ 385.657496][T19304] dump_stack+0x172/0x1f0 [ 385.661837][T19304] dump_header+0x10f/0xb6c [ 385.666273][T19304] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 385.672089][T19304] ? ___ratelimit+0x60/0x595 [ 385.678858][T19304] ? do_raw_spin_unlock+0x57/0x270 [ 385.684019][T19304] oom_kill_process.cold+0x10/0x15 [ 385.689137][T19304] out_of_memory+0x79a/0x1280 [ 385.693826][T19304] ? retint_kernel+0x2b/0x2b [ 385.698430][T19304] ? oom_killer_disable+0x280/0x280 [ 385.703647][T19304] mem_cgroup_out_of_memory+0x1ca/0x230 [ 385.709200][T19304] ? memcg_event_wake+0x230/0x230 [ 385.714242][T19304] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 385.720064][T19304] ? cgroup_file_notify+0x140/0x1b0 [ 385.725283][T19304] memory_max_write+0x169/0x300 [ 385.730149][T19304] ? mem_cgroup_write+0x360/0x360 [ 385.735181][T19304] ? retint_kernel+0x2b/0x2b [ 385.739796][T19304] cgroup_file_write+0x241/0x790 [ 385.744749][T19304] ? mem_cgroup_write+0x360/0x360 [ 385.749776][T19304] ? kill_css+0x380/0x380 [ 385.754119][T19304] ? kill_css+0x380/0x380 [ 385.758460][T19304] kernfs_fop_write+0x2b8/0x480 [ 385.763324][T19304] __vfs_write+0x8a/0x110 [ 385.767659][T19304] ? kernfs_fop_open+0xd80/0xd80 [ 385.772614][T19304] vfs_write+0x20c/0x580 [ 385.776879][T19304] ksys_write+0x14f/0x290 [ 385.781228][T19304] ? __ia32_sys_read+0xb0/0xb0 [ 385.785997][T19304] ? do_syscall_64+0x26/0x680 [ 385.790694][T19304] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.796762][T19304] ? do_syscall_64+0x26/0x680 [ 385.801451][T19304] __x64_sys_write+0x73/0xb0 [ 385.806053][T19304] do_syscall_64+0xfd/0x680 [ 385.810567][T19304] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.816460][T19304] RIP: 0033:0x459279 [ 385.820708][T19304] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 385.841012][T19304] RSP: 002b:00007f198afcfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 385.849602][T19304] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 385.857585][T19304] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 385.865560][T19304] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 385.873536][T19304] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f198afd06d4 [ 385.881509][T19304] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 385.899720][T19304] memory: usage 8888kB, limit 0kB, failcnt 0 [ 385.908909][T19304] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 385.937200][T19304] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 385.965246][T19304] Memory cgroup stats for /syz0: cache:160KB rss:2204KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2136KB inactive_file:0KB active_file:0KB unevictable:0KB [ 385.992226][T19304] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=19303,uid=0 [ 386.013141][T19304] Memory cgroup out of memory: Killed process 19304 (syz-executor.0) total-vm:72576kB, anon-rss:2188kB, file-rss:35796kB, shmem-rss:0kB 09:06:07 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 09:06:07 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) socketpair(0xb, 0x3, 0x19f7800000000000, &(0x7f0000000580)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={0xffffffffffffffff, 0x6, 0x1, 0xff, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4df0e00000000000) 09:06:07 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='1:2\t'], 0x4) 09:06:07 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 09:06:07 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 09:06:07 executing program 1: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 386.224697][ T8817] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 386.282878][ T8817] CPU: 0 PID: 8817 Comm: syz-executor.0 Not tainted 5.2.0-rc1+ #6 [ 386.290755][ T8817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.300806][ T8817] Call Trace: [ 386.304108][ T8817] dump_stack+0x172/0x1f0 [ 386.308446][ T8817] dump_header+0x10f/0xb6c [ 386.312867][ T8817] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 386.318684][ T8817] ? ___ratelimit+0x60/0x595 [ 386.323280][ T8817] ? do_raw_spin_unlock+0x57/0x270 [ 386.328398][ T8817] oom_kill_process.cold+0x10/0x15 [ 386.333518][ T8817] out_of_memory+0x79a/0x1280 [ 386.338209][ T8817] ? lock_downgrade+0x880/0x880 [ 386.343067][ T8817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.349316][ T8817] ? oom_killer_disable+0x280/0x280 [ 386.354521][ T8817] ? find_held_lock+0x35/0x130 [ 386.359306][ T8817] mem_cgroup_out_of_memory+0x1ca/0x230 [ 386.364862][ T8817] ? memcg_event_wake+0x230/0x230 [ 386.369913][ T8817] ? do_raw_spin_unlock+0x57/0x270 [ 386.375033][ T8817] ? _raw_spin_unlock+0x2d/0x50 [ 386.379903][ T8817] try_charge+0x102c/0x15c0 [ 386.384412][ T8817] ? find_held_lock+0x35/0x130 [ 386.389197][ T8817] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 386.394773][ T8817] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 386.400414][ T8817] ? find_held_lock+0x35/0x130 [ 386.405188][ T8817] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 386.410752][ T8817] __memcg_kmem_charge_memcg+0x7c/0x130 [ 386.416336][ T8817] ? memcg_kmem_put_cache+0xb0/0xb0 [ 386.421547][ T8817] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 386.427105][ T8817] __memcg_kmem_charge+0x136/0x300 09:06:08 executing program 1: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 386.432228][ T8817] __alloc_pages_nodemask+0x4bd/0x8d0 [ 386.437607][ T8817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.443861][ T8817] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 386.449602][ T8817] ? copy_process.part.0+0x43f7/0x6790 [ 386.455074][ T8817] ? lockdep_hardirqs_on+0x418/0x5d0 [ 386.460366][ T8817] ? trace_hardirqs_on+0x67/0x220 [ 386.465394][ T8817] ? kasan_check_read+0x11/0x20 [ 386.470267][ T8817] copy_process.part.0+0x4a0/0x6790 [ 386.475513][ T8817] ? __might_fault+0x12b/0x1e0 [ 386.480304][ T8817] ? __cleanup_sighand+0x60/0x60 [ 386.481077][T19318] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 386.485257][ T8817] ? lock_downgrade+0x880/0x880 [ 386.485299][ T8817] _do_fork+0x25d/0xfe0 [ 386.503569][ T8817] ? copy_init_mm+0x20/0x20 [ 386.508093][ T8817] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 386.513574][ T8817] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 386.519069][ T8817] ? do_syscall_64+0x26/0x680 [ 386.523754][ T8817] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.529823][ T8817] ? do_syscall_64+0x26/0x680 [ 386.534515][ T8817] __x64_sys_clone+0xbf/0x150 [ 386.539204][ T8817] do_syscall_64+0xfd/0x680 [ 386.543721][ T8817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.549615][ T8817] RIP: 0033:0x45784a [ 386.553518][ T8817] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 386.573126][ T8817] RSP: 002b:00007ffc1dfcfc70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 386.581540][ T8817] RAX: ffffffffffffffda RBX: 00007ffc1dfcfc70 RCX: 000000000045784a [ 386.589509][ T8817] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 386.597482][ T8817] RBP: 00007ffc1dfcfcb0 R08: 0000000000000001 R09: 0000555555fb1940 [ 386.605455][ T8817] R10: 0000555555fb1c10 R11: 0000000000000246 R12: 0000000000000001 [ 386.613429][ T8817] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffc1dfcfd00 09:06:08 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) socketpair(0xb, 0x3, 0x19f7800000000000, &(0x7f0000000580)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={0xffffffffffffffff, 0x6, 0x1, 0xff, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4df0e00000000000) [ 386.633336][T19318] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 386.660941][ T8817] memory: usage 6544kB, limit 0kB, failcnt 8 [ 386.667549][ T8817] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 09:06:08 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 386.706782][ T8817] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 386.779585][ T8817] Memory cgroup stats for /syz0: cache:160KB rss:68KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:68KB inactive_file:0KB active_file:0KB unevictable:0KB [ 386.822731][ T8817] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8817,uid=0 [ 386.856153][ T8817] Memory cgroup out of memory: Killed process 8817 (syz-executor.0) total-vm:72444kB, anon-rss:96kB, file-rss:35776kB, shmem-rss:0kB [ 386.886234][ T8826] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 386.886531][ T1041] oom_reaper: reaped process 8817 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 386.906070][ T8826] CPU: 0 PID: 8826 Comm: syz-executor.3 Not tainted 5.2.0-rc1+ #6 [ 386.916945][ T8826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.927000][ T8826] Call Trace: [ 386.930298][ T8826] dump_stack+0x172/0x1f0 [ 386.934646][ T8826] dump_header+0x10f/0xb6c [ 386.939074][ T8826] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 386.944900][ T8826] ? ___ratelimit+0x60/0x595 [ 386.949500][ T8826] ? do_raw_spin_unlock+0x57/0x270 [ 386.954649][ T8826] oom_kill_process.cold+0x10/0x15 [ 386.959772][ T8826] out_of_memory+0x79a/0x1280 [ 386.964466][ T8826] ? oom_killer_disable+0x280/0x280 [ 386.969672][ T8826] ? find_held_lock+0x35/0x130 [ 386.974455][ T8826] mem_cgroup_out_of_memory+0x1ca/0x230 [ 386.980005][ T8826] ? memcg_event_wake+0x230/0x230 [ 386.985044][ T8826] ? do_raw_spin_unlock+0x57/0x270 [ 386.990163][ T8826] ? _raw_spin_unlock+0x2d/0x50 [ 386.996497][ T8826] try_charge+0x102c/0x15c0 [ 386.999490][T19326] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 387.001012][ T8826] ? find_held_lock+0x35/0x130 [ 387.001040][ T8826] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 387.001055][ T8826] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 387.001070][ T8826] ? find_held_lock+0x35/0x130 [ 387.001087][ T8826] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 387.001115][ T8826] __memcg_kmem_charge_memcg+0x7c/0x130 [ 387.042043][ T8826] ? memcg_kmem_put_cache+0xb0/0xb0 [ 387.047254][ T8826] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 387.048591][T19326] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 387.052812][ T8826] __memcg_kmem_charge+0x136/0x300 [ 387.052833][ T8826] __alloc_pages_nodemask+0x4bd/0x8d0 [ 387.052848][ T8826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.052867][ T8826] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 387.052891][ T8826] ? copy_process.part.0+0x43f7/0x6790 [ 387.052910][ T8826] ? lockdep_hardirqs_on+0x418/0x5d0 [ 387.052926][ T8826] ? trace_hardirqs_on+0x67/0x220 [ 387.052939][ T8826] ? kasan_check_read+0x11/0x20 [ 387.052961][ T8826] copy_process.part.0+0x4a0/0x6790 [ 387.052979][ T8826] ? __might_fault+0x12b/0x1e0 [ 387.053006][ T8826] ? __cleanup_sighand+0x60/0x60 [ 387.053022][ T8826] ? lock_downgrade+0x880/0x880 [ 387.053051][ T8826] _do_fork+0x25d/0xfe0 [ 387.128307][ T8826] ? copy_init_mm+0x20/0x20 [ 387.132821][ T8826] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 387.138275][ T8826] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 387.143742][ T8826] ? do_syscall_64+0x26/0x680 [ 387.148680][ T8826] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.154742][ T8826] ? do_syscall_64+0x26/0x680 [ 387.159423][ T8826] __x64_sys_clone+0xbf/0x150 [ 387.164189][ T8826] do_syscall_64+0xfd/0x680 [ 387.168694][ T8826] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.174579][ T8826] RIP: 0033:0x45784a [ 387.178469][ T8826] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 387.198074][ T8826] RSP: 002b:00007ffd7fc0e3a0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 387.206491][ T8826] RAX: ffffffffffffffda RBX: 00007ffd7fc0e3a0 RCX: 000000000045784a [ 387.214462][ T8826] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 387.222434][ T8826] RBP: 00007ffd7fc0e3e0 R08: 0000000000000001 R09: 000055555603b940 09:06:08 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 387.230411][ T8826] R10: 000055555603bc10 R11: 0000000000000246 R12: 0000000000000001 [ 387.238380][ T8826] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd7fc0e430 [ 387.282560][ T8826] memory: usage 6684kB, limit 0kB, failcnt 8 [ 387.288585][ T8826] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 387.312457][ T8826] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 387.319337][ T8826] Memory cgroup stats for /syz3: cache:104KB rss:172KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:100KB inactive_file:132KB active_file:132KB unevictable:0KB [ 387.382002][ T8826] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8826,uid=0 [ 387.414111][ T8826] Memory cgroup out of memory: Killed process 8826 (syz-executor.3) total-vm:72444kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB [ 387.418585][T19332] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 387.438003][ T1041] oom_reaper: reaped process 8826 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 387.443541][T19332] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 387.459654][T19315] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 387.482568][T19315] CPU: 1 PID: 19315 Comm: syz-executor.5 Not tainted 5.2.0-rc1+ #6 [ 387.490496][T19315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.500531][T19315] Call Trace: [ 387.503816][T19315] dump_stack+0x172/0x1f0 [ 387.508167][T19315] dump_header+0x10f/0xb6c [ 387.512583][T19315] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 387.518406][T19315] ? ___ratelimit+0x60/0x595 [ 387.522994][T19315] ? do_raw_spin_unlock+0x57/0x270 [ 387.528127][T19315] oom_kill_process.cold+0x10/0x15 [ 387.533246][T19315] out_of_memory+0x79a/0x1280 [ 387.537930][T19315] ? oom_killer_disable+0x280/0x280 [ 387.543142][T19315] mem_cgroup_out_of_memory+0x1ca/0x230 [ 387.548687][T19315] ? memcg_event_wake+0x230/0x230 [ 387.553700][T19315] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 387.559505][T19315] ? cgroup_file_notify+0x140/0x1b0 [ 387.564703][T19315] memory_max_write+0x169/0x300 [ 387.569561][T19315] ? mem_cgroup_write+0x360/0x360 [ 387.574600][T19315] ? lock_acquire+0x16f/0x3f0 [ 387.579295][T19315] ? kernfs_fop_write+0x227/0x480 [ 387.584305][T19315] cgroup_file_write+0x241/0x790 [ 387.589229][T19315] ? mem_cgroup_write+0x360/0x360 [ 387.594245][T19315] ? kill_css+0x380/0x380 [ 387.598577][T19315] ? kill_css+0x380/0x380 [ 387.602894][T19315] kernfs_fop_write+0x2b8/0x480 [ 387.607766][T19315] __vfs_write+0x8a/0x110 [ 387.612092][T19315] ? kernfs_fop_open+0xd80/0xd80 [ 387.617013][T19315] vfs_write+0x20c/0x580 [ 387.621272][T19315] ksys_write+0x14f/0x290 [ 387.625610][T19315] ? __ia32_sys_read+0xb0/0xb0 [ 387.630362][T19315] ? do_syscall_64+0x26/0x680 [ 387.635027][T19315] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.641073][T19315] ? do_syscall_64+0x26/0x680 [ 387.645766][T19315] __x64_sys_write+0x73/0xb0 [ 387.650361][T19315] do_syscall_64+0xfd/0x680 [ 387.654858][T19315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.660732][T19315] RIP: 0033:0x459279 [ 387.664625][T19315] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 387.684244][T19315] RSP: 002b:00007f873b5e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 387.692657][T19315] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 387.700613][T19315] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 387.708567][T19315] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 387.716629][T19315] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f873b5e26d4 [ 387.724621][T19315] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff 09:06:09 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 387.947653][T19315] memory: usage 8228kB, limit 0kB, failcnt 0 [ 387.960402][T19315] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 387.968425][T19315] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 387.981961][T19315] Memory cgroup stats for /syz5: cache:0KB rss:2224KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2152KB inactive_file:20KB active_file:0KB unevictable:0KB [ 388.009563][T19315] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=19314,uid=0 [ 388.033320][T19315] Memory cgroup out of memory: Killed process 19315 (syz-executor.5) total-vm:72840kB, anon-rss:2216kB, file-rss:35800kB, shmem-rss:0kB [ 388.053823][T19333] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 388.055054][ T1041] oom_reaper: reaped process 19315 (syz-executor.5), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB [ 388.068995][T19333] CPU: 0 PID: 19333 Comm: syz-executor.2 Not tainted 5.2.0-rc1+ #6 [ 388.083146][T19333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.093197][T19333] Call Trace: [ 388.096498][T19333] dump_stack+0x172/0x1f0 [ 388.101366][T19333] dump_header+0x10f/0xb6c [ 388.105797][T19333] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 388.111606][T19333] ? ___ratelimit+0x60/0x595 [ 388.116201][T19333] ? do_raw_spin_unlock+0x57/0x270 [ 388.121325][T19333] oom_kill_process.cold+0x10/0x15 [ 388.126442][T19333] out_of_memory+0x79a/0x1280 [ 388.131129][T19333] ? oom_killer_disable+0x280/0x280 [ 388.136419][T19333] ? cgroup_file_notify+0x140/0x1b0 [ 388.141728][T19333] mem_cgroup_out_of_memory+0x1ca/0x230 [ 388.147283][T19333] ? memcg_event_wake+0x230/0x230 [ 388.152320][T19333] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 388.158219][T19333] ? cgroup_file_notify+0x140/0x1b0 [ 388.163432][T19333] memory_max_write+0x169/0x300 [ 388.168292][T19333] ? mem_cgroup_write+0x360/0x360 [ 388.173321][T19333] ? lock_acquire+0x16f/0x3f0 [ 388.178009][T19333] ? kernfs_fop_write+0x227/0x480 [ 388.183043][T19333] cgroup_file_write+0x241/0x790 [ 388.187985][T19333] ? mem_cgroup_write+0x360/0x360 [ 388.193014][T19333] ? kill_css+0x380/0x380 [ 388.197355][T19333] ? kill_css+0x380/0x380 [ 388.201689][T19333] kernfs_fop_write+0x2b8/0x480 [ 388.206554][T19333] __vfs_write+0x8a/0x110 [ 388.210921][T19333] ? kernfs_fop_open+0xd80/0xd80 [ 388.215873][T19333] vfs_write+0x20c/0x580 [ 388.220141][T19333] ksys_write+0x14f/0x290 [ 388.224477][T19333] ? __ia32_sys_read+0xb0/0xb0 [ 388.229262][T19333] ? do_syscall_64+0x26/0x680 [ 388.233948][T19333] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.240027][T19333] ? do_syscall_64+0x26/0x680 [ 388.244725][T19333] __x64_sys_write+0x73/0xb0 [ 388.249326][T19333] do_syscall_64+0xfd/0x680 [ 388.253848][T19333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.259748][T19333] RIP: 0033:0x459279 [ 388.263650][T19333] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 388.283252][T19333] RSP: 002b:00007f4af2c27c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 388.291671][T19333] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 388.299630][T19333] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 388.307589][T19333] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 388.315548][T19333] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4af2c286d4 [ 388.323503][T19333] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 388.343413][T19333] memory: usage 9552kB, limit 0kB, failcnt 0 09:06:10 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 388.349438][T19333] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 388.372016][T19333] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 388.381010][T19333] Memory cgroup stats for [ 388.381023][T19333] /syz2: cache:40KB rss:2288KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2216KB inactive_file:60KB active_file:0KB unevictable:0KB [ 388.404662][T19333] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=19331,uid=0 [ 388.420200][T19333] Memory cgroup out of memory: Killed process 19333 (syz-executor.2) total-vm:72708kB, anon-rss:2196kB, file-rss:35860kB, shmem-rss:0kB [ 388.434878][ T8830] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 388.441845][ T1041] oom_reaper: reaped process 19333 (syz-executor.2), now anon-rss:0kB, file-rss:34900kB, shmem-rss:0kB [ 388.447301][ T8830] CPU: 0 PID: 8830 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #6 [ 388.466184][ T8830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.480412][ T8830] Call Trace: [ 388.480441][ T8830] dump_stack+0x172/0x1f0 [ 388.480460][ T8830] dump_header+0x10f/0xb6c [ 388.480475][ T8830] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 388.480489][ T8830] ? ___ratelimit+0x60/0x595 [ 388.480503][ T8830] ? do_raw_spin_unlock+0x57/0x270 [ 388.480520][ T8830] oom_kill_process.cold+0x10/0x15 [ 388.480539][ T8830] out_of_memory+0x79a/0x1280 [ 388.480562][ T8830] ? oom_killer_disable+0x280/0x280 [ 388.480573][ T8830] ? find_held_lock+0x35/0x130 [ 388.480607][ T8830] mem_cgroup_out_of_memory+0x1ca/0x230 [ 388.492621][ T8830] ? memcg_event_wake+0x230/0x230 [ 388.492643][ T8830] ? do_raw_spin_unlock+0x57/0x270 [ 388.492660][ T8830] ? _raw_spin_unlock+0x2d/0x50 [ 388.492678][ T8830] try_charge+0x102c/0x15c0 [ 388.492691][ T8830] ? find_held_lock+0x35/0x130 [ 388.492715][ T8830] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 388.503099][ T8830] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 388.503114][ T8830] ? find_held_lock+0x35/0x130 [ 388.503130][ T8830] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 388.503157][ T8830] __memcg_kmem_charge_memcg+0x7c/0x130 [ 388.503173][ T8830] ? memcg_kmem_put_cache+0xb0/0xb0 [ 388.503193][ T8830] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 388.503213][ T8830] __memcg_kmem_charge+0x136/0x300 [ 388.503233][ T8830] __alloc_pages_nodemask+0x4bd/0x8d0 [ 388.503254][ T8830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.518160][ T8830] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 388.528104][ T8830] ? copy_process.part.0+0x43f7/0x6790 [ 388.538681][ T8830] ? lockdep_hardirqs_on+0x418/0x5d0 [ 388.548630][ T8830] ? trace_hardirqs_on+0x67/0x220 [ 388.557898][ T8830] ? kasan_check_read+0x11/0x20 [ 388.568974][ T8830] copy_process.part.0+0x4a0/0x6790 [ 388.579263][ T8830] ? __might_fault+0x12b/0x1e0 [ 388.589989][ T8830] ? __cleanup_sighand+0x60/0x60 [ 388.600617][ T8830] ? lock_downgrade+0x880/0x880 [ 388.612222][ T8830] _do_fork+0x25d/0xfe0 [ 388.623373][ T8830] ? copy_init_mm+0x20/0x20 [ 388.623400][ T8830] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 388.623415][ T8830] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 388.623430][ T8830] ? do_syscall_64+0x26/0x680 [ 388.623445][ T8830] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.623460][ T8830] ? do_syscall_64+0x26/0x680 [ 388.623481][ T8830] __x64_sys_clone+0xbf/0x150 [ 388.697790][ T8830] do_syscall_64+0xfd/0x680 [ 388.702276][ T8830] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.708147][ T8830] RIP: 0033:0x45784a [ 388.712022][ T8830] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 388.731605][ T8830] RSP: 002b:00007fff9da2d7b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 388.740014][ T8830] RAX: ffffffffffffffda RBX: 00007fff9da2d7b0 RCX: 000000000045784a [ 388.747966][ T8830] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 388.755916][ T8830] RBP: 00007fff9da2d7f0 R08: 0000000000000001 R09: 000055555718d940 [ 388.763876][ T8830] R10: 000055555718dc10 R11: 0000000000000246 R12: 0000000000000001 [ 388.771861][ T8830] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff9da2d840 [ 388.807777][ T8830] memory: usage 6820kB, limit 0kB, failcnt 8 [ 388.816338][ T8830] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 388.824131][ T8830] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 388.830982][ T8830] Memory cgroup stats for /syz4: cache:0KB rss:172KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:100KB inactive_file:0KB active_file:0KB unevictable:0KB [ 388.859806][ T8830] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8830,uid=0 [ 388.875166][ T8830] Memory cgroup out of memory: Killed process 8830 (syz-executor.4) total-vm:72444kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB [ 388.889740][ T1041] oom_reaper: reaped process 8830 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 388.900902][ T8833] syz-executor.5 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 388.918416][ T8833] CPU: 1 PID: 8833 Comm: syz-executor.5 Not tainted 5.2.0-rc1+ #6 [ 388.926232][ T8833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.926244][ T8833] Call Trace: [ 388.926266][ T8833] dump_stack+0x172/0x1f0 [ 388.926286][ T8833] dump_header+0x10f/0xb6c [ 388.944026][ T8833] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 388.954216][ T8833] ? ___ratelimit+0x60/0x595 [ 388.954232][ T8833] ? do_raw_spin_unlock+0x57/0x270 [ 388.954260][ T8833] oom_kill_process.cold+0x10/0x15 [ 388.963942][ T8833] out_of_memory+0x79a/0x1280 [ 388.963965][ T8833] ? oom_killer_disable+0x280/0x280 [ 388.963984][ T8833] ? find_held_lock+0x35/0x130 [ 388.973764][ T8833] mem_cgroup_out_of_memory+0x1ca/0x230 [ 388.973781][ T8833] ? memcg_event_wake+0x230/0x230 [ 388.973803][ T8833] ? do_raw_spin_unlock+0x57/0x270 [ 388.983760][ T8833] ? _raw_spin_unlock+0x2d/0x50 [ 388.983780][ T8833] try_charge+0x102c/0x15c0 [ 388.983805][ T8833] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 388.995591][ T8833] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.995615][ T8833] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 388.995646][ T8833] __memcg_kmem_charge_memcg+0x7c/0x130 [ 389.005575][ T8833] ? memcg_kmem_put_cache+0xb0/0xb0 [ 389.005588][ T8833] ? cache_grow_begin+0x3d6/0x650 [ 389.005621][ T8833] ? lockdep_hardirqs_on+0x418/0x5d0 [ 389.015637][ T8833] ? trace_hardirqs_on+0x67/0x220 [ 389.015654][ T8833] cache_grow_begin+0x402/0x650 [ 389.015675][ T8833] ? __cpuset_node_allowed+0x136/0x540 [ 389.026916][ T8833] fallback_alloc+0x1fd/0x2d0 [ 389.026938][ T8833] ____cache_alloc_node+0x1be/0x1e0 [ 389.026959][ T8833] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 389.037679][ T8833] kmem_cache_alloc+0x1e8/0x6f0 [ 389.048026][ T8833] ? inet_create+0x2f4/0xe00 [ 389.057850][ T8833] sk_prot_alloc+0x67/0x2e0 [ 389.067931][ T8833] ? lock_downgrade+0x880/0x880 [ 389.079393][ T8833] sk_alloc+0x39/0xf70 [ 389.088755][ T8833] inet_create+0x36a/0xe00 [ 389.098119][ T8833] __sock_create+0x3d8/0x730 [ 389.106563][ T8833] ? _raw_spin_unlock_irq+0x28/0x90 [ 389.106585][ T8833] __sys_socket+0x103/0x220 [ 389.106612][ T8833] ? move_addr_to_kernel+0x80/0x80 [ 389.116357][ T8833] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 389.116373][ T8833] ? do_syscall_64+0x26/0x680 [ 389.116399][ T8833] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 389.125976][ T8833] ? do_syscall_64+0x26/0x680 [ 389.125998][ T8833] __x64_sys_socket+0x73/0xb0 [ 389.126017][ T8833] do_syscall_64+0xfd/0x680 [ 389.155969][ T8833] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 389.161839][ T8833] RIP: 0033:0x45bdc7 [ 389.165715][ T8833] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 389.185313][ T8833] RSP: 002b:00007fff3aa275c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 389.193703][ T8833] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045bdc7 [ 389.201695][ T8833] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 09:06:10 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 09:06:10 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 389.209646][ T8833] RBP: 00000000000004c0 R08: 0000000000000000 R09: 000000000000000a [ 389.217594][ T8833] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 389.225549][ T8833] R13: 00007fff3aa27ce0 R14: 000000000005e4c3 R15: 00007fff3aa27cf0 09:06:10 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 389.252517][ T8833] memory: usage 5804kB, limit 0kB, failcnt 12 [ 389.258753][ T8833] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 389.267011][T19336] IPVS: ftp: loaded support on port[0] = 21 [ 389.282837][ T8833] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 389.289731][ T8833] Memory cgroup stats for /syz5: cache:0KB rss:128KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:56KB inactive_file:20KB active_file:0KB unevictable:0KB [ 389.332454][ T8833] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=8833,uid=0 09:06:11 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 389.351021][ T8833] Memory cgroup out of memory: Killed process 8833 (syz-executor.5) total-vm:72444kB, anon-rss:108kB, file-rss:35776kB, shmem-rss:0kB [ 389.393011][ T1041] oom_reaper: reaped process 8833 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 389.404189][ T8824] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 389.432510][ T8824] CPU: 1 PID: 8824 Comm: syz-executor.2 Not tainted 5.2.0-rc1+ #6 [ 389.440349][ T8824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.450414][ T8824] Call Trace: [ 389.453715][ T8824] dump_stack+0x172/0x1f0 [ 389.458069][ T8824] dump_header+0x10f/0xb6c [ 389.462498][ T8824] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 389.468309][ T8824] ? ___ratelimit+0x60/0x595 [ 389.472919][ T8824] ? do_raw_spin_unlock+0x57/0x270 [ 389.478045][ T8824] oom_kill_process.cold+0x10/0x15 [ 389.483165][ T8824] out_of_memory+0x79a/0x1280 [ 389.487842][ T8824] ? oom_killer_disable+0x280/0x280 [ 389.493019][ T8824] ? find_held_lock+0x35/0x130 [ 389.497797][ T8824] mem_cgroup_out_of_memory+0x1ca/0x230 [ 389.503323][ T8824] ? memcg_event_wake+0x230/0x230 [ 389.508344][ T8824] ? do_raw_spin_unlock+0x57/0x270 [ 389.513437][ T8824] ? _raw_spin_unlock+0x2d/0x50 [ 389.518269][ T8824] try_charge+0x102c/0x15c0 [ 389.522748][ T8824] ? find_held_lock+0x35/0x130 [ 389.527494][ T8824] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 389.533040][ T8824] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 389.538581][ T8824] ? find_held_lock+0x35/0x130 [ 389.543330][ T8824] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 389.548890][ T8824] __memcg_kmem_charge_memcg+0x7c/0x130 [ 389.554445][ T8824] ? memcg_kmem_put_cache+0xb0/0xb0 [ 389.559629][ T8824] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 389.565174][ T8824] __memcg_kmem_charge+0x136/0x300 [ 389.570265][ T8824] __alloc_pages_nodemask+0x4bd/0x8d0 [ 389.575621][ T8824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.581840][ T8824] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 389.587576][ T8824] ? copy_process.part.0+0x43f7/0x6790 [ 389.593043][ T8824] copy_process.part.0+0x4a0/0x6790 [ 389.598222][ T8824] ? __might_fault+0x12b/0x1e0 [ 389.602971][ T8824] ? __cleanup_sighand+0x60/0x60 [ 389.607888][ T8824] ? lock_downgrade+0x880/0x880 [ 389.612729][ T8824] _do_fork+0x25d/0xfe0 [ 389.616866][ T8824] ? copy_init_mm+0x20/0x20 [ 389.621353][ T8824] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 389.626793][ T8824] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 389.632231][ T8824] ? do_syscall_64+0x26/0x680 [ 389.636888][ T8824] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 389.642933][ T8824] ? do_syscall_64+0x26/0x680 [ 389.647589][ T8824] __x64_sys_clone+0xbf/0x150 [ 389.652250][ T8824] do_syscall_64+0xfd/0x680 [ 389.656738][ T8824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 389.662615][ T8824] RIP: 0033:0x45784a [ 389.666486][ T8824] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 389.686072][ T8824] RSP: 002b:00007ffcf7566970 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 389.694460][ T8824] RAX: ffffffffffffffda RBX: 00007ffcf7566970 RCX: 000000000045784a 09:06:11 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 389.702411][ T8824] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 389.710359][ T8824] RBP: 00007ffcf75669b0 R08: 0000000000000001 R09: 00005555572e7940 [ 389.718315][ T8824] R10: 00005555572e7c10 R11: 0000000000000246 R12: 0000000000000001 [ 389.726364][ T8824] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffcf7566a00 [ 389.748761][ T8824] memory: usage 7152kB, limit 0kB, failcnt 8 [ 389.758382][ T8824] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 389.790569][ T8824] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 389.803933][ T8824] Memory cgroup stats for /syz2: cache:40KB rss:64KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:64KB inactive_file:60KB active_file:0KB unevictable:0KB [ 389.835749][ T8824] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=8824,uid=0 [ 389.857539][ T8824] Memory cgroup out of memory: Killed process 8824 (syz-executor.2) total-vm:72444kB, anon-rss:96kB, file-rss:35776kB, shmem-rss:0kB [ 389.872832][ T1041] oom_reaper: reaped process 8824 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 09:06:11 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 390.586691][T19336] chnl_net:caif_netlink_parms(): no params data found [ 390.621919][T19341] IPVS: ftp: loaded support on port[0] = 21 [ 390.632293][T19336] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.639975][T19336] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.647914][T19336] device bridge_slave_0 entered promiscuous mode [ 390.719076][T19336] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.726317][T19336] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.734126][T19336] device bridge_slave_1 entered promiscuous mode [ 390.760669][T19336] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 390.839985][T19336] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 390.866158][T19336] team0: Port device team_slave_0 added [ 390.882308][T19336] team0: Port device team_slave_1 added [ 391.012043][T19343] IPVS: ftp: loaded support on port[0] = 21 [ 391.145552][T19336] device hsr_slave_0 entered promiscuous mode [ 391.192803][T19336] device hsr_slave_1 entered promiscuous mode [ 391.326429][T19341] chnl_net:caif_netlink_parms(): no params data found [ 391.403022][T19336] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.410104][T19336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 391.417502][T19336] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.424581][T19336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 391.435026][T14540] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.442999][T14540] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.538904][T19341] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.546118][T19341] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.554083][T19341] device bridge_slave_0 entered promiscuous mode [ 391.561929][T19341] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.569506][T19341] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.577642][T19341] device bridge_slave_1 entered promiscuous mode [ 391.647864][T19341] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 391.663259][T19341] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 391.753748][T19341] team0: Port device team_slave_0 added [ 391.811868][T19341] team0: Port device team_slave_1 added [ 391.819373][T19343] chnl_net:caif_netlink_parms(): no params data found [ 391.833737][T19336] 8021q: adding VLAN 0 to HW filter on device bond0 [ 391.974613][T19341] device hsr_slave_0 entered promiscuous mode [ 392.022871][T19341] device hsr_slave_1 entered promiscuous mode [ 392.128647][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 392.136660][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 392.148022][T19336] 8021q: adding VLAN 0 to HW filter on device team0 [ 392.218569][T19343] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.225892][T19343] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.234860][T19343] device bridge_slave_0 entered promiscuous mode [ 392.243849][T19343] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.250953][T19343] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.259237][T19343] device bridge_slave_1 entered promiscuous mode [ 392.351820][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 392.361807][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 392.370579][ T8831] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.377703][ T8831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 392.386380][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 392.395177][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 392.403673][ T8831] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.410753][ T8831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.418422][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 392.427298][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 392.504564][T19343] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 392.525673][T19343] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 392.535016][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 392.544294][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 392.554056][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 392.563005][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 392.571376][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 392.654631][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 392.663239][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 392.710766][T19343] team0: Port device team_slave_0 added [ 392.718339][T19343] team0: Port device team_slave_1 added [ 392.728031][T19336] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 392.739224][T19336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 392.748312][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 392.757163][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 392.770408][T19341] 8021q: adding VLAN 0 to HW filter on device bond0 [ 392.876123][T19343] device hsr_slave_0 entered promiscuous mode [ 392.916851][T19343] device hsr_slave_1 entered promiscuous mode [ 393.025664][T19336] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 393.043737][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 393.051711][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 393.063016][T19341] 8021q: adding VLAN 0 to HW filter on device team0 [ 393.146204][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 393.157863][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 393.166623][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.173709][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 393.194708][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 393.211338][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 393.236323][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 393.245342][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.252473][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 393.260371][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 393.269121][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 393.311526][T19351] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 393.321572][T19351] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 393.362546][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 393.371523][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 393.390410][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 393.403289][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 393.420026][T19341] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 393.424406][T19351] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 393.441036][T19351] CPU: 1 PID: 19351 Comm: syz-executor.1 Not tainted 5.2.0-rc1+ #6 [ 393.442413][T19341] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 393.448924][T19351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.448930][T19351] Call Trace: [ 393.448955][T19351] dump_stack+0x172/0x1f0 [ 393.448979][T19351] dump_header+0x10f/0xb6c [ 393.478862][T19343] 8021q: adding VLAN 0 to HW filter on device bond0 [ 393.482123][T19351] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 393.482147][T19351] ? ___ratelimit+0x60/0x595 [ 393.499123][T19351] ? do_raw_spin_unlock+0x57/0x270 [ 393.501941][T19343] 8021q: adding VLAN 0 to HW filter on device team0 [ 393.504255][T19351] oom_kill_process.cold+0x10/0x15 [ 393.504276][T19351] out_of_memory+0x79a/0x1280 [ 393.504304][T19351] ? __sched_text_start+0x8/0x8 [ 393.525633][T19351] ? oom_killer_disable+0x280/0x280 [ 393.530861][T19351] mem_cgroup_out_of_memory+0x1ca/0x230 [ 393.536425][T19351] ? memcg_event_wake+0x230/0x230 [ 393.541468][T19351] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 393.544420][T19343] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 393.547286][T19351] ? cgroup_file_notify+0x140/0x1b0 [ 393.547310][T19351] memory_max_write+0x169/0x300 [ 393.547331][T19351] ? mem_cgroup_write+0x360/0x360 [ 393.557735][T19343] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 393.562847][T19351] ? lock_acquire+0x16f/0x3f0 [ 393.562863][T19351] ? kernfs_fop_write+0x227/0x480 [ 393.562886][T19351] cgroup_file_write+0x241/0x790 [ 393.562905][T19351] ? mem_cgroup_write+0x360/0x360 [ 393.562924][T19351] ? kill_css+0x380/0x380 [ 393.586196][T19343] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 393.587874][T19351] ? kill_css+0x380/0x380 [ 393.587904][T19351] kernfs_fop_write+0x2b8/0x480 [ 393.597857][T19351] __vfs_write+0x8a/0x110 [ 393.597872][T19351] ? kernfs_fop_open+0xd80/0xd80 [ 393.597891][T19351] vfs_write+0x20c/0x580 [ 393.636640][T19351] ksys_write+0x14f/0x290 [ 393.641072][T19351] ? __ia32_sys_read+0xb0/0xb0 [ 393.645852][T19351] ? do_syscall_64+0x26/0x680 [ 393.650551][T19351] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 393.656636][T19351] ? do_syscall_64+0x26/0x680 [ 393.661335][T19351] __x64_sys_write+0x73/0xb0 [ 393.665935][T19351] do_syscall_64+0xfd/0x680 [ 393.665956][T19351] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 393.665968][T19351] RIP: 0033:0x459279 [ 393.665989][T19351] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 393.700039][T19351] RSP: 002b:00007f2603d44c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 393.708458][T19351] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 393.716437][T19351] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 393.724418][T19351] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 393.732399][T19351] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2603d456d4 [ 393.740376][T19351] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 393.769932][T19351] memory: usage 8568kB, limit 0kB, failcnt 11 [ 393.776524][T19351] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 393.784374][T19351] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 393.785471][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 393.791454][T19351] Memory cgroup stats for /syz1: cache:20KB rss:2260KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2188KB inactive_file:0KB active_file:0KB unevictable:0KB [ 393.822932][T19351] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=19350,uid=0 [ 393.824161][T19359] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 393.841887][T19351] Memory cgroup out of memory: Killed process 19350 (syz-executor.1) total-vm:72580kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 393.853728][ T1041] oom_reaper: reaped process 19350 (syz-executor.1), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB [ 393.880270][T19360] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 393.880291][T19360] CPU: 1 PID: 19360 Comm: syz-executor.3 Not tainted 5.2.0-rc1+ #6 [ 393.880301][T19360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.880308][T19360] Call Trace: [ 393.880333][T19360] dump_stack+0x172/0x1f0 [ 393.880359][T19360] dump_header+0x10f/0xb6c [ 393.880380][T19360] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 393.880409][T19360] ? ___ratelimit+0x60/0x595 [ 393.880429][T19360] ? do_raw_spin_unlock+0x57/0x270 [ 393.880451][T19360] oom_kill_process.cold+0x10/0x15 [ 393.880473][T19360] out_of_memory+0x79a/0x1280 [ 393.880495][T19360] ? __sched_text_start+0x8/0x8 [ 393.880517][T19360] ? oom_killer_disable+0x280/0x280 [ 393.880533][T19360] ? cgroup_file_notify+0x140/0x1b0 [ 393.880564][T19360] mem_cgroup_out_of_memory+0x1ca/0x230 [ 393.880582][T19360] ? memcg_event_wake+0x230/0x230 [ 393.880615][T19360] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 393.880635][T19360] ? cgroup_file_notify+0x140/0x1b0 [ 393.880660][T19360] memory_max_write+0x169/0x300 [ 393.880685][T19360] ? mem_cgroup_write+0x360/0x360 [ 393.880702][T19360] ? lock_acquire+0x16f/0x3f0 [ 393.880721][T19360] ? kernfs_fop_write+0x227/0x480 [ 393.880745][T19360] cgroup_file_write+0x241/0x790 [ 393.880765][T19360] ? mem_cgroup_write+0x360/0x360 [ 393.880781][T19360] ? kill_css+0x380/0x380 [ 393.880805][T19360] ? kill_css+0x380/0x380 [ 393.880822][T19360] kernfs_fop_write+0x2b8/0x480 [ 393.880842][T19360] __vfs_write+0x8a/0x110 [ 393.880858][T19360] ? kernfs_fop_open+0xd80/0xd80 [ 393.880876][T19360] vfs_write+0x20c/0x580 [ 393.880898][T19360] ksys_write+0x14f/0x290 [ 393.880917][T19360] ? __ia32_sys_read+0xb0/0xb0 [ 393.880938][T19360] ? do_syscall_64+0x26/0x680 [ 393.880954][T19360] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 393.880972][T19360] ? do_syscall_64+0x26/0x680 [ 393.880995][T19360] __x64_sys_write+0x73/0xb0 [ 393.881016][T19360] do_syscall_64+0xfd/0x680 [ 393.881044][T19360] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 393.881057][T19360] RIP: 0033:0x459279 [ 393.881074][T19360] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 393.881083][T19360] RSP: 002b:00007f043a88fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 393.881100][T19360] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 393.881110][T19360] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 393.881120][T19360] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 393.881130][T19360] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f043a8906d4 [ 393.881140][T19360] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 393.881252][T19360] memory: usage 8772kB, limit 0kB, failcnt 11 [ 393.881265][T19360] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 393.881275][T19360] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 393.881282][T19360] Memory cgroup stats for /syz3: cache:104KB rss:2172KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2240KB inactive_file:132KB active_file:132KB unevictable:0KB [ 393.881368][T19360] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=19358,uid=0 [ 393.881688][T19360] Memory cgroup out of memory: Killed process 19358 (syz-executor.3) total-vm:72712kB, anon-rss:2136kB, file-rss:34816kB, shmem-rss:0kB [ 393.883655][ T1041] oom_reaper: reaped process 19358 (syz-executor.3), now anon-rss:0kB, file-rss:34804kB, shmem-rss:0kB [ 394.279199][T19359] openvswitch: netlink: Flow get message rejected, Key attribute missing. 09:06:16 executing program 1: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 09:06:16 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 09:06:16 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 09:06:16 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 394.292003][T19336] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 394.329499][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 394.345151][T19336] CPU: 1 PID: 19336 Comm: syz-executor.1 Not tainted 5.2.0-rc1+ #6 [ 394.353061][T19336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.363113][T19336] Call Trace: [ 394.366448][T19336] dump_stack+0x172/0x1f0 [ 394.367426][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 394.370792][T19336] dump_header+0x10f/0xb6c [ 394.383040][T19336] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 394.388855][T19336] ? ___ratelimit+0x60/0x595 [ 394.393457][T19336] ? do_raw_spin_unlock+0x57/0x270 [ 394.398583][T19336] oom_kill_process.cold+0x10/0x15 [ 394.403707][T19336] out_of_memory+0x79a/0x1280 [ 394.408398][T19336] ? lock_downgrade+0x880/0x880 [ 394.413256][T19336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.419537][T19336] ? oom_killer_disable+0x280/0x280 [ 394.424740][T19336] ? find_held_lock+0x35/0x130 [ 394.429557][T19336] mem_cgroup_out_of_memory+0x1ca/0x230 [ 394.435117][T19336] ? memcg_event_wake+0x230/0x230 [ 394.438074][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 394.440153][T19336] ? do_raw_spin_unlock+0x57/0x270 [ 394.440172][T19336] ? _raw_spin_unlock+0x2d/0x50 [ 394.440193][T19336] try_charge+0x102c/0x15c0 [ 394.462332][T19336] ? find_held_lock+0x35/0x130 [ 394.467111][T19336] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 394.471355][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 394.472660][T19336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.472678][T19336] ? kasan_check_read+0x11/0x20 [ 394.472700][T19336] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 394.472723][T19336] mem_cgroup_try_charge+0x24d/0x5e0 [ 394.482300][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 394.486761][T19336] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 394.486781][T19336] wp_page_copy+0x416/0x1770 [ 394.486797][T19336] ? do_wp_page+0x486/0x1500 [ 394.486818][T19336] ? pmd_pfn+0x1d0/0x1d0 [ 394.486839][T19336] ? lock_downgrade+0x880/0x880 [ 394.492833][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 394.497217][T19336] ? swp_swapcount+0x540/0x540 [ 394.497232][T19336] ? do_raw_spin_unlock+0x57/0x270 [ 394.497252][T19336] ? kasan_check_read+0x11/0x20 [ 394.503311][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 394.510229][T19336] ? do_raw_spin_unlock+0x57/0x270 [ 394.510250][T19336] do_wp_page+0x48e/0x1500 [ 394.510271][T19336] ? finish_mkwrite_fault+0x540/0x540 [ 394.517123][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 394.520476][T19336] __handle_mm_fault+0x22e3/0x3eb0 [ 394.520501][T19336] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 394.526071][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 394.529308][T19336] ? find_held_lock+0x35/0x130 [ 394.529326][T19336] ? handle_mm_fault+0x292/0xa90 [ 394.529351][T19336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.535065][ T8831] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.541375][T19336] ? kasan_check_read+0x11/0x20 [ 394.541410][T19336] handle_mm_fault+0x3b7/0xa90 [ 394.546235][ T8831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.551274][T19336] __do_page_fault+0x5ef/0xda0 [ 394.557082][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 394.563298][T19336] do_page_fault+0x71/0x57d [ 394.563314][T19336] ? page_fault+0x8/0x30 [ 394.563329][T19336] page_fault+0x1e/0x30 [ 394.563347][T19336] RIP: 0033:0x430356 [ 394.569247][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 394.572851][T19336] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 394.572859][T19336] RSP: 002b:00007ffd3755a320 EFLAGS: 00010206 [ 394.572871][T19336] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 394.572880][T19336] RDX: 0000555556d19930 RSI: 0000555556d21970 RDI: 0000000000000003 [ 394.572888][T19336] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556d18940 [ 394.572897][T19336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 394.572905][T19336] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 394.764820][T19336] memory: usage 6152kB, limit 0kB, failcnt 19 [ 394.770934][T19336] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 394.782751][T19336] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 394.797770][T19336] Memory cgroup stats for /syz1: cache:20KB rss:52KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:52KB inactive_file:0KB active_file:0KB unevictable:0KB [ 394.827580][T19336] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=19336,uid=0 09:06:16 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 394.844389][T19336] Memory cgroup out of memory: Killed process 19336 (syz-executor.1) total-vm:72448kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 394.861102][ T1041] oom_reaper: reaped process 19336 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 394.861648][ T8831] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.879292][ T8831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 394.882677][T19343] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 394.887354][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 394.904998][T19343] CPU: 1 PID: 19343 Comm: syz-executor.3 Not tainted 5.2.0-rc1+ #6 [ 394.912900][T19343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.918761][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 394.922955][T19343] Call Trace: [ 394.922979][T19343] dump_stack+0x172/0x1f0 [ 394.923001][T19343] dump_header+0x10f/0xb6c [ 394.923018][T19343] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 394.923038][T19343] ? ___ratelimit+0x60/0x595 [ 394.931899][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 394.934119][T19343] ? do_raw_spin_unlock+0x57/0x270 [ 394.934141][T19343] oom_kill_process.cold+0x10/0x15 [ 394.934167][T19343] out_of_memory+0x79a/0x1280 [ 394.939170][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 394.942896][T19343] ? lock_downgrade+0x880/0x880 [ 394.942912][T19343] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.942932][T19343] ? oom_killer_disable+0x280/0x280 [ 394.949559][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 394.953298][T19343] ? find_held_lock+0x35/0x130 [ 394.953327][T19343] mem_cgroup_out_of_memory+0x1ca/0x230 [ 394.953348][T19343] ? memcg_event_wake+0x230/0x230 [ 395.023824][T19343] ? do_raw_spin_unlock+0x57/0x270 [ 395.028935][T19343] ? _raw_spin_unlock+0x2d/0x50 [ 395.033787][T19343] try_charge+0x102c/0x15c0 [ 395.038271][T19343] ? find_held_lock+0x35/0x130 [ 395.043022][T19343] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 395.048552][T19343] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.054781][T19343] ? kasan_check_read+0x11/0x20 [ 395.059616][T19343] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 395.065144][T19343] mem_cgroup_try_charge+0x24d/0x5e0 [ 395.070434][T19343] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 395.076070][T19343] wp_page_copy+0x416/0x1770 [ 395.080663][T19343] ? do_wp_page+0x486/0x1500 [ 395.085243][T19343] ? pmd_pfn+0x1d0/0x1d0 [ 395.089470][T19343] ? lock_downgrade+0x880/0x880 [ 395.094314][T19343] ? swp_swapcount+0x540/0x540 [ 395.099053][T19343] ? do_raw_spin_unlock+0x57/0x270 [ 395.104173][T19343] ? kasan_check_read+0x11/0x20 [ 395.109007][T19343] ? do_raw_spin_unlock+0x57/0x270 [ 395.114099][T19343] do_wp_page+0x48e/0x1500 [ 395.118500][T19343] ? finish_mkwrite_fault+0x540/0x540 [ 395.123857][T19343] __handle_mm_fault+0x22e3/0x3eb0 [ 395.128952][T19343] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 395.134478][T19343] ? find_held_lock+0x35/0x130 [ 395.139246][T19343] ? handle_mm_fault+0x292/0xa90 [ 395.144170][T19343] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.150414][T19343] ? kasan_check_read+0x11/0x20 [ 395.155249][T19343] handle_mm_fault+0x3b7/0xa90 [ 395.159995][T19343] __do_page_fault+0x5ef/0xda0 [ 395.164745][T19343] do_page_fault+0x71/0x57d [ 395.169249][T19343] ? page_fault+0x8/0x30 [ 395.173477][T19343] page_fault+0x1e/0x30 [ 395.177612][T19343] RIP: 0033:0x430356 [ 395.181485][T19343] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 395.201068][T19343] RSP: 002b:00007fff300e3120 EFLAGS: 00010206 [ 395.207117][T19343] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 395.215065][T19343] RDX: 0000555555fe2930 RSI: 0000555555fea970 RDI: 0000000000000003 [ 395.223020][T19343] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555555fe1940 [ 395.230982][T19343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 395.238933][T19343] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 395.247577][T19343] memory: usage 6304kB, limit 0kB, failcnt 23 [ 395.253861][T19343] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 395.261318][T19343] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 395.268258][T19343] Memory cgroup stats for /syz3: cache:104KB rss:60KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:60KB inactive_file:132KB active_file:132KB unevictable:0KB [ 395.289142][T19343] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=19343,uid=0 [ 395.305001][T19343] Memory cgroup out of memory: Killed process 19343 (syz-executor.3) total-vm:72448kB, anon-rss:68kB, file-rss:34824kB, shmem-rss:0kB [ 395.319541][ T1041] oom_reaper: reaped process 19343 (syz-executor.3), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 395.496298][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 395.511065][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 395.543335][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 395.551262][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 395.596314][T19341] 8021q: adding VLAN 0 to HW filter on device batadv0 09:06:17 executing program 1: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 09:06:17 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 09:06:17 executing program 1: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 395.921648][T19366] IPVS: ftp: loaded support on port[0] = 21 [ 395.953222][T19368] IPVS: ftp: loaded support on port[0] = 21 [ 395.962554][T19367] IPVS: ftp: loaded support on port[0] = 21 09:06:17 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 396.224772][T19373] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.0'. [ 396.241349][T19373] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 396.311982][T19373] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 396.324290][T19373] CPU: 1 PID: 19373 Comm: syz-executor.0 Not tainted 5.2.0-rc1+ #6 [ 396.332198][T19373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.342259][T19373] Call Trace: [ 396.342285][T19373] dump_stack+0x172/0x1f0 [ 396.342309][T19373] dump_header+0x10f/0xb6c [ 396.342330][T19373] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 396.349930][T19373] ? ___ratelimit+0x60/0x595 [ 396.349947][T19373] ? do_raw_spin_unlock+0x57/0x270 [ 396.349975][T19373] oom_kill_process.cold+0x10/0x15 [ 396.360183][T19373] out_of_memory+0x79a/0x1280 [ 396.360206][T19373] ? __sched_text_start+0x8/0x8 [ 396.360227][T19373] ? oom_killer_disable+0x280/0x280 [ 396.369932][T19373] mem_cgroup_out_of_memory+0x1ca/0x230 [ 396.369954][T19373] ? memcg_event_wake+0x230/0x230 [ 396.379730][T19373] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 396.379749][T19373] ? cgroup_file_notify+0x140/0x1b0 [ 396.379770][T19373] memory_max_write+0x169/0x300 [ 396.389795][T19373] ? mem_cgroup_write+0x360/0x360 [ 396.389812][T19373] ? retint_kernel+0x2b/0x2b [ 396.389835][T19373] cgroup_file_write+0x241/0x790 [ 396.400399][T19373] ? mem_cgroup_write+0x360/0x360 [ 396.400415][T19373] ? kill_css+0x380/0x380 [ 396.400437][T19373] ? kill_css+0x380/0x380 [ 396.411434][T19373] kernfs_fop_write+0x2b8/0x480 [ 396.411456][T19373] __vfs_write+0x8a/0x110 [ 396.411477][T19373] ? kernfs_fop_open+0xd80/0xd80 [ 396.421348][T19373] vfs_write+0x20c/0x580 [ 396.421370][T19373] ksys_write+0x14f/0x290 [ 396.421396][T19373] ? __ia32_sys_read+0xb0/0xb0 [ 396.430895][T19373] ? do_syscall_64+0x26/0x680 [ 396.430912][T19373] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.430927][T19373] ? do_syscall_64+0x26/0x680 [ 396.430948][T19373] __x64_sys_write+0x73/0xb0 [ 396.440284][T19373] do_syscall_64+0xfd/0x680 [ 396.440305][T19373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.440323][T19373] RIP: 0033:0x459279 [ 396.449506][T19373] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 396.449515][T19373] RSP: 002b:00007f0e5411ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 396.449530][T19373] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 396.449538][T19373] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 396.449554][T19373] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 396.458879][T19373] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0e5411f6d4 [ 396.458889][T19373] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 396.493209][T19373] memory: usage 8440kB, limit 0kB, failcnt 13 [ 396.510746][T19373] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 396.562618][T19373] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 396.583613][T19373] Memory cgroup stats for /syz0: cache:160KB rss:2148KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2148KB inactive_file:0KB active_file:0KB unevictable:0KB [ 396.597480][T19373] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=19372,uid=0 [ 396.630866][T19373] Memory cgroup out of memory: Killed process 19372 (syz-executor.0) total-vm:72580kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 396.658224][ T1041] oom_reaper: reaped process 19372 (syz-executor.0), now anon-rss:0kB, file-rss:34824kB, shmem-rss:0kB 09:06:18 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 396.845609][T19341] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 396.855839][T19341] CPU: 1 PID: 19341 Comm: syz-executor.0 Not tainted 5.2.0-rc1+ #6 [ 396.863722][T19341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.873768][T19341] Call Trace: [ 396.877056][T19341] dump_stack+0x172/0x1f0 [ 396.881365][T19341] dump_header+0x10f/0xb6c [ 396.885798][T19341] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 396.891603][T19341] ? ___ratelimit+0x60/0x595 [ 396.896176][T19341] ? do_raw_spin_unlock+0x57/0x270 [ 396.901294][T19341] oom_kill_process.cold+0x10/0x15 [ 396.906402][T19341] out_of_memory+0x79a/0x1280 [ 396.911061][T19341] ? lock_downgrade+0x880/0x880 [ 396.915895][T19341] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.922117][T19341] ? oom_killer_disable+0x280/0x280 [ 396.927292][T19341] ? find_held_lock+0x35/0x130 [ 396.932041][T19341] mem_cgroup_out_of_memory+0x1ca/0x230 [ 396.937564][T19341] ? memcg_event_wake+0x230/0x230 [ 396.942572][T19341] ? do_raw_spin_unlock+0x57/0x270 [ 396.947667][T19341] ? _raw_spin_unlock+0x2d/0x50 [ 396.952524][T19341] try_charge+0x102c/0x15c0 [ 396.957003][T19341] ? find_held_lock+0x35/0x130 [ 396.961754][T19341] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 396.967286][T19341] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.973525][T19341] ? kasan_check_read+0x11/0x20 [ 396.978376][T19341] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 396.983916][T19341] mem_cgroup_try_charge+0x24d/0x5e0 [ 396.989201][T19341] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 396.994823][T19341] wp_page_copy+0x416/0x1770 [ 397.000559][T19341] ? do_wp_page+0x486/0x1500 [ 397.005133][T19341] ? pmd_pfn+0x1d0/0x1d0 [ 397.009454][T19341] ? lock_downgrade+0x880/0x880 [ 397.014285][T19341] ? swp_swapcount+0x540/0x540 [ 397.019025][T19341] ? do_raw_spin_unlock+0x57/0x270 [ 397.024116][T19341] ? kasan_check_read+0x11/0x20 [ 397.028952][T19341] ? do_raw_spin_unlock+0x57/0x270 [ 397.034047][T19341] do_wp_page+0x48e/0x1500 [ 397.038446][T19341] ? finish_mkwrite_fault+0x540/0x540 [ 397.043808][T19341] __handle_mm_fault+0x22e3/0x3eb0 [ 397.048909][T19341] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 397.054437][T19341] ? find_held_lock+0x35/0x130 [ 397.059182][T19341] ? handle_mm_fault+0x292/0xa90 [ 397.064140][T19341] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.070362][T19341] ? kasan_check_read+0x11/0x20 [ 397.075199][T19341] handle_mm_fault+0x3b7/0xa90 [ 397.079948][T19341] __do_page_fault+0x5ef/0xda0 [ 397.084701][T19341] do_page_fault+0x71/0x57d [ 397.089201][T19341] ? page_fault+0x8/0x30 [ 397.093423][T19341] page_fault+0x1e/0x30 [ 397.097553][T19341] RIP: 0033:0x430356 [ 397.101427][T19341] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 397.121295][T19341] RSP: 002b:00007ffd458282d0 EFLAGS: 00010206 [ 397.127406][T19341] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 397.135395][T19341] RDX: 0000555555824930 RSI: 000055555582c970 RDI: 0000000000000003 [ 397.143375][T19341] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555555823940 [ 397.151360][T19341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 397.159340][T19341] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 397.186149][T19341] memory: usage 6100kB, limit 0kB, failcnt 21 [ 397.202870][T19341] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 397.210351][T19341] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 397.238505][T19341] Memory cgroup stats for /syz0: cache:160KB rss:40KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB [ 397.273379][T19367] chnl_net:caif_netlink_parms(): no params data found [ 397.287394][T19341] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=19341,uid=0 [ 397.303387][T19341] Memory cgroup out of memory: Killed process 19341 (syz-executor.0) total-vm:72448kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 397.318289][ T1041] oom_reaper: reaped process 19341 (syz-executor.0), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 397.459803][T19380] IPVS: ftp: loaded support on port[0] = 21 [ 397.641781][T19366] chnl_net:caif_netlink_parms(): no params data found [ 397.654597][T19378] IPVS: ftp: loaded support on port[0] = 21 [ 397.717210][T19368] chnl_net:caif_netlink_parms(): no params data found [ 397.743752][T19367] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.750907][T19367] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.758909][T19367] device bridge_slave_0 entered promiscuous mode 09:06:19 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 397.766951][T19367] bridge0: port 2(bridge_slave_1) entered blocking state [ 397.774081][T19367] bridge0: port 2(bridge_slave_1) entered disabled state [ 397.782111][T19367] device bridge_slave_1 entered promiscuous mode 09:06:19 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 397.919625][T19368] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.928059][T19368] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.936661][T19368] device bridge_slave_0 entered promiscuous mode [ 397.945212][T19368] bridge0: port 2(bridge_slave_1) entered blocking state [ 397.952243][T19368] bridge0: port 2(bridge_slave_1) entered disabled state [ 397.960099][T19368] device bridge_slave_1 entered promiscuous mode [ 398.005169][T19368] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 398.072303][T19366] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.079865][T19366] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.088210][T19366] device bridge_slave_0 entered promiscuous mode [ 398.098022][T19368] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 398.110675][T19367] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 398.184925][T19366] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.192010][T19366] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.200430][T19366] device bridge_slave_1 entered promiscuous mode [ 398.218398][T19367] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 398.298665][T19368] team0: Port device team_slave_0 added [ 398.324531][T19366] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 398.338285][T19366] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 398.351014][T19368] team0: Port device team_slave_1 added [ 398.367483][T19367] team0: Port device team_slave_0 added [ 398.451274][T19367] team0: Port device team_slave_1 added [ 398.528615][T19366] team0: Port device team_slave_0 added [ 398.540526][T19366] team0: Port device team_slave_1 added [ 398.625958][T19368] device hsr_slave_0 entered promiscuous mode [ 398.663089][T19368] device hsr_slave_1 entered promiscuous mode [ 398.855535][T19367] device hsr_slave_0 entered promiscuous mode [ 398.912893][T19367] device hsr_slave_1 entered promiscuous mode [ 399.105798][T19366] device hsr_slave_0 entered promiscuous mode [ 399.169241][T19366] device hsr_slave_1 entered promiscuous mode [ 399.229823][T19384] IPVS: ftp: loaded support on port[0] = 21 [ 399.260064][T19378] chnl_net:caif_netlink_parms(): no params data found [ 399.380146][T19380] chnl_net:caif_netlink_parms(): no params data found [ 399.487197][T19378] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.495414][T19378] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.504628][T19378] device bridge_slave_0 entered promiscuous mode [ 399.574231][T19378] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.581313][T19378] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.591205][T19378] device bridge_slave_1 entered promiscuous mode [ 399.629792][T19380] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.637534][T19380] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.646006][T19380] device bridge_slave_0 entered promiscuous mode [ 399.655053][T19380] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.662119][T19380] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.670359][T19380] device bridge_slave_1 entered promiscuous mode [ 399.771267][T19380] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 399.788356][T19378] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 399.804990][T19378] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 399.829552][T19380] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 399.866006][T19378] team0: Port device team_slave_0 added [ 399.902073][T19380] team0: Port device team_slave_0 added [ 399.955015][T19378] team0: Port device team_slave_1 added [ 400.013648][T19380] team0: Port device team_slave_1 added [ 400.105150][T19384] chnl_net:caif_netlink_parms(): no params data found [ 400.149665][T19367] 8021q: adding VLAN 0 to HW filter on device bond0 [ 400.198730][T19366] 8021q: adding VLAN 0 to HW filter on device bond0 [ 400.255774][T19378] device hsr_slave_0 entered promiscuous mode [ 400.292954][T19378] device hsr_slave_1 entered promiscuous mode [ 400.447454][T19368] 8021q: adding VLAN 0 to HW filter on device bond0 [ 400.475039][T19380] device hsr_slave_0 entered promiscuous mode [ 400.543068][T19380] device hsr_slave_1 entered promiscuous mode [ 400.588018][T19367] 8021q: adding VLAN 0 to HW filter on device team0 [ 400.603604][T19384] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.610687][T19384] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.620530][T19384] device bridge_slave_0 entered promiscuous mode [ 400.629620][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 400.638520][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 400.647011][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 400.655327][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 400.669208][T19366] 8021q: adding VLAN 0 to HW filter on device team0 [ 400.684113][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 400.694783][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 400.703424][ T8875] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.710485][ T8875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 400.718699][T19384] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.726081][T19384] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.734742][T19384] device bridge_slave_1 entered promiscuous mode [ 400.761101][T19368] 8021q: adding VLAN 0 to HW filter on device team0 [ 400.773401][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 400.781343][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 400.791633][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 400.800049][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 400.809683][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 400.818093][ T8831] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.825176][ T8831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 400.893674][T19384] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 400.907774][T19384] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 400.935519][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 400.950591][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 400.960681][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 400.969457][ T8875] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.976583][ T8875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 400.985270][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 401.068944][T19384] team0: Port device team_slave_0 added [ 401.078460][T19384] team0: Port device team_slave_1 added [ 401.092065][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 401.100751][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 401.109351][T14503] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.116499][T14503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.124410][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 401.133244][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 401.141813][T14503] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.148925][T14503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.156548][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 401.167397][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 401.176340][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 401.185653][T14503] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.192769][T14503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.202074][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 401.295650][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 401.307923][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 401.316724][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 401.325092][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 401.334180][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 401.343122][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 401.352679][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 401.361137][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 401.369427][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 401.378245][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 401.491039][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 401.501847][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 401.510569][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 401.526229][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 401.534906][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 401.545325][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 401.554572][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 401.563288][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 401.571834][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 401.590981][T19378] 8021q: adding VLAN 0 to HW filter on device bond0 [ 401.646603][T19384] device hsr_slave_0 entered promiscuous mode [ 401.703130][T19384] device hsr_slave_1 entered promiscuous mode [ 401.798416][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 401.806900][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 401.815189][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 401.826477][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 401.834910][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 401.843630][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 401.851811][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 401.860281][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 401.891787][T19366] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 401.905423][T19366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 401.929296][T19368] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 401.945719][T19367] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 401.968314][T19367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 401.976991][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 401.985634][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 401.993571][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 402.001878][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 402.010313][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 402.019021][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 402.081501][T19378] 8021q: adding VLAN 0 to HW filter on device team0 [ 402.177828][T14502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 402.186875][T14502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 402.196246][T14502] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.203359][T14502] bridge0: port 1(bridge_slave_0) entered forwarding state [ 402.234515][T19367] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 402.298082][T14502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 402.306450][T14502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 402.315471][T14502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 402.324916][T14502] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.332127][T14502] bridge0: port 2(bridge_slave_1) entered forwarding state [ 402.357140][T19366] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 402.371023][T19368] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 402.390634][T14502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 402.416334][T14502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 402.434368][T14502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 402.444439][T14502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 402.506444][T19380] 8021q: adding VLAN 0 to HW filter on device bond0 [ 402.527472][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 402.546596][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 402.556447][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 402.584463][T19380] 8021q: adding VLAN 0 to HW filter on device team0 [ 402.592140][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 402.614947][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 402.627126][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 402.643769][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 402.655808][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 402.664345][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 402.703590][T19400] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 402.713400][T19400] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 402.735575][T19378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 402.829671][T19400] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 402.884025][T19400] CPU: 1 PID: 19400 Comm: syz-executor.5 Not tainted 5.2.0-rc1+ #6 [ 402.885570][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 402.891948][T19400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.891955][T19400] Call Trace: [ 402.891984][T19400] dump_stack+0x172/0x1f0 [ 402.892010][T19400] dump_header+0x10f/0xb6c [ 402.912328][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 402.913410][T19400] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 402.913441][T19400] ? ___ratelimit+0x60/0x595 [ 402.913458][T19400] ? do_raw_spin_unlock+0x57/0x270 [ 402.913479][T19400] oom_kill_process.cold+0x10/0x15 [ 402.913500][T19400] out_of_memory+0x79a/0x1280 [ 402.923344][T14540] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.930195][T19400] ? __sched_text_start+0x8/0x8 [ 402.930216][T19400] ? oom_killer_disable+0x280/0x280 [ 402.930244][T19400] mem_cgroup_out_of_memory+0x1ca/0x230 [ 402.936108][T14540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 402.940630][T19400] ? memcg_event_wake+0x230/0x230 [ 402.950267][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 402.950875][T19400] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 402.950894][T19400] ? cgroup_file_notify+0x140/0x1b0 [ 402.950924][T19400] memory_max_write+0x169/0x300 [ 402.956399][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 402.962631][T19400] ? mem_cgroup_write+0x360/0x360 [ 402.962649][T19400] ? lock_acquire+0x16f/0x3f0 [ 402.962665][T19400] ? kernfs_fop_write+0x227/0x480 [ 402.962687][T19400] cgroup_file_write+0x241/0x790 [ 402.962708][T19400] ? mem_cgroup_write+0x360/0x360 [ 402.968799][T14540] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.972731][T19400] ? kill_css+0x380/0x380 [ 402.972755][T19400] ? kill_css+0x380/0x380 [ 402.972772][T19400] kernfs_fop_write+0x2b8/0x480 [ 402.972801][T19400] __vfs_write+0x8a/0x110 [ 402.978351][T14540] bridge0: port 2(bridge_slave_1) entered forwarding state [ 402.985513][T19400] ? kernfs_fop_open+0xd80/0xd80 [ 402.985532][T19400] vfs_write+0x20c/0x580 [ 402.985555][T19400] ksys_write+0x14f/0x290 [ 402.991537][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 402.999355][T19400] ? __ia32_sys_read+0xb0/0xb0 [ 402.999375][T19400] ? do_syscall_64+0x26/0x680 [ 402.999398][T19400] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.999413][T19400] ? do_syscall_64+0x26/0x680 [ 402.999433][T19400] __x64_sys_write+0x73/0xb0 [ 403.016010][T19384] 8021q: adding VLAN 0 to HW filter on device bond0 [ 403.023236][T19400] do_syscall_64+0xfd/0x680 [ 403.023259][T19400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.023271][T19400] RIP: 0033:0x459279 [ 403.023295][T19400] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 403.041496][T19384] 8021q: adding VLAN 0 to HW filter on device team0 [ 403.042906][T19400] RSP: 002b:00007ffb47cdcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 403.042921][T19400] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 403.042930][T19400] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 403.042939][T19400] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 403.042949][T19400] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb47cdd6d4 [ 403.042958][T19400] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 403.074547][T19408] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 403.111327][T19400] memory: usage 7548kB, limit 0kB, failcnt 13 [ 403.129218][T19408] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 403.177407][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 403.276334][T19406] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 403.301354][T19406] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 403.323500][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 403.325781][T19400] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 403.331541][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 403.348390][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 403.358683][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 403.371163][T19400] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 403.388496][T19400] Memory cgroup stats for /syz5: cache:0KB rss:2132KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2060KB inactive_file:20KB active_file:0KB unevictable:0KB [ 403.403821][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 403.434613][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 403.444200][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 403.455030][T19400] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=19397,uid=0 [ 403.475245][T19400] Memory cgroup out of memory: Killed process 19397 (syz-executor.5) total-vm:72712kB, anon-rss:2188kB, file-rss:35792kB, shmem-rss:0kB [ 403.493857][ T1041] oom_reaper: reaped process 19397 (syz-executor.5), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 403.517326][T19404] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 403.518213][T19378] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 403.560153][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 403.585530][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 403.604983][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 403.626600][T14540] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.633755][T14540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 403.639310][T19404] CPU: 1 PID: 19404 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #6 [ 403.648834][T19404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.654656][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 403.658886][T19404] Call Trace: [ 403.658912][T19404] dump_stack+0x172/0x1f0 [ 403.658936][T19404] dump_header+0x10f/0xb6c [ 403.658958][T19404] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 403.667626][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 403.670033][T19404] ? ___ratelimit+0x60/0x595 [ 403.670051][T19404] ? do_raw_spin_unlock+0x57/0x270 [ 403.670072][T19404] oom_kill_process.cold+0x10/0x15 [ 403.670092][T19404] out_of_memory+0x79a/0x1280 [ 403.677080][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 403.678828][T19404] ? oom_killer_disable+0x280/0x280 [ 403.678859][T19404] mem_cgroup_out_of_memory+0x1ca/0x230 [ 403.678880][T19404] ? memcg_event_wake+0x230/0x230 [ 403.734873][T19404] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 403.740678][T19404] ? cgroup_file_notify+0x140/0x1b0 [ 403.745880][T19404] memory_max_write+0x169/0x300 [ 403.750735][T19404] ? mem_cgroup_write+0x360/0x360 [ 403.755756][T19404] ? lock_acquire+0x1ea/0x3f0 [ 403.760435][T19404] cgroup_file_write+0x241/0x790 [ 403.765371][T19404] ? mem_cgroup_write+0x360/0x360 [ 403.770399][T19404] ? kill_css+0x380/0x380 [ 403.774736][T19404] ? kill_css+0x380/0x380 [ 403.779065][T19404] kernfs_fop_write+0x2b8/0x480 [ 403.783926][T19404] __vfs_write+0x8a/0x110 [ 403.788251][T19404] ? kernfs_fop_open+0xd80/0xd80 [ 403.793185][T19404] vfs_write+0x20c/0x580 [ 403.797461][T19404] ksys_write+0x14f/0x290 [ 403.801803][T19404] ? __ia32_sys_read+0xb0/0xb0 [ 403.806574][T19404] __x64_sys_write+0x73/0xb0 [ 403.811159][T19404] ? do_syscall_64+0x5b/0x680 [ 403.815860][T19404] do_syscall_64+0xfd/0x680 [ 403.820363][T19404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.826251][T19404] RIP: 0033:0x459279 [ 403.830139][T19404] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 403.849753][T19404] RSP: 002b:00007efec18eac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 403.858162][T19404] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 403.866126][T19404] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 403.874090][T19404] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 403.882054][T19404] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efec18eb6d4 [ 403.890019][T19404] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 403.955575][T19404] memory: usage 8636kB, limit 0kB, failcnt 11 [ 403.961857][T19404] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 403.970283][T19404] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 403.978732][T19404] Memory cgroup stats for /syz4: cache:0KB rss:2156KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2156KB inactive_file:0KB active_file:0KB unevictable:0KB 09:06:25 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 404.042100][T19404] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=19403,uid=0 [ 404.080147][T19404] Memory cgroup out of memory: Killed process 19404 (syz-executor.4) total-vm:72712kB, anon-rss:2188kB, file-rss:35788kB, shmem-rss:0kB [ 404.110914][T19368] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 404.113487][ T1041] oom_reaper: reaped process 19404 (syz-executor.4), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 404.127377][T19368] CPU: 0 PID: 19368 Comm: syz-executor.2 Not tainted 5.2.0-rc1+ #6 [ 404.139777][T19368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.149834][T19368] Call Trace: [ 404.153146][T19368] dump_stack+0x172/0x1f0 [ 404.157493][T19368] dump_header+0x10f/0xb6c [ 404.161921][T19368] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 404.167733][T19368] ? ___ratelimit+0x60/0x595 [ 404.172327][T19368] ? do_raw_spin_unlock+0x57/0x270 [ 404.177450][T19368] oom_kill_process.cold+0x10/0x15 [ 404.182658][T19368] out_of_memory+0x79a/0x1280 [ 404.187353][T19368] ? oom_killer_disable+0x280/0x280 [ 404.192556][T19368] ? find_held_lock+0x35/0x130 [ 404.197339][T19368] mem_cgroup_out_of_memory+0x1ca/0x230 [ 404.202897][T19368] ? memcg_event_wake+0x230/0x230 [ 404.202920][T19368] ? do_raw_spin_unlock+0x57/0x270 [ 404.202940][T19368] ? _raw_spin_unlock+0x2d/0x50 [ 404.202956][T19368] try_charge+0x102c/0x15c0 [ 404.202966][T19368] ? find_held_lock+0x35/0x130 [ 404.202984][T19368] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 404.202998][T19368] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.203013][T19368] ? kasan_check_read+0x11/0x20 [ 404.222689][T19368] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 404.222708][T19368] mem_cgroup_try_charge+0x24d/0x5e0 [ 404.222728][T19368] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 404.222745][T19368] wp_page_copy+0x416/0x1770 [ 404.222761][T19368] ? do_wp_page+0x486/0x1500 [ 404.222780][T19368] ? pmd_pfn+0x1d0/0x1d0 [ 404.222800][T19368] ? lock_downgrade+0x880/0x880 [ 404.222815][T19368] ? swp_swapcount+0x540/0x540 [ 404.222831][T19368] ? kasan_check_read+0x11/0x20 09:06:26 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 404.222845][T19368] ? do_raw_spin_unlock+0x57/0x270 [ 404.222861][T19368] do_wp_page+0x48e/0x1500 [ 404.222881][T19368] ? finish_mkwrite_fault+0x540/0x540 [ 404.222913][T19368] __handle_mm_fault+0x22e3/0x3eb0 [ 404.222934][T19368] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 404.222946][T19368] ? find_held_lock+0x35/0x130 [ 404.222961][T19368] ? handle_mm_fault+0x292/0xa90 [ 404.222984][T19368] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.222998][T19368] ? kasan_check_read+0x11/0x20 [ 404.223017][T19368] handle_mm_fault+0x3b7/0xa90 [ 404.223037][T19368] __do_page_fault+0x5ef/0xda0 [ 404.223060][T19368] do_page_fault+0x71/0x57d [ 404.223072][T19368] ? page_fault+0x8/0x30 [ 404.223085][T19368] page_fault+0x1e/0x30 [ 404.223094][T19368] RIP: 0033:0x403672 [ 404.223107][T19368] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 29 86 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 49 3b 05 00 48 [ 404.223113][T19368] RSP: 002b:00007fff177cad60 EFLAGS: 00010246 09:06:26 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 404.223123][T19368] RAX: 0000000000000000 RBX: 00000000000629d7 RCX: 0000000000412e80 [ 404.223130][T19368] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007fff177cbe90 [ 404.233582][T19368] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555556166940 [ 404.233591][T19368] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff177cbe90 [ 404.233599][T19368] R13: 00007fff177cbe80 R14: 0000000000000000 R15: 00007fff177cbe90 [ 404.265460][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 404.274592][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 404.293016][ T8875] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.294934][T19368] memory: usage 6748kB, limit 0kB, failcnt 19 [ 404.299166][ T8875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 404.304572][T19368] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 404.331947][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 404.348629][ T8875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 404.373088][T19380] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 404.440445][T19380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 404.476707][T19368] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 404.490297][T19368] Memory cgroup stats for /syz2: cache:40KB rss:116KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:52KB inactive_file:60KB active_file:0KB unevictable:0KB [ 404.559775][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 404.588671][T19368] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=19368,uid=0 [ 404.594199][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 404.623742][T19368] Memory cgroup out of memory: Killed process 19368 (syz-executor.2) total-vm:72448kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 404.635264][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 404.653167][ T1041] oom_reaper: reaped process 19368 (syz-executor.2), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 404.665041][T19366] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 404.690487][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 404.698357][T19366] CPU: 1 PID: 19366 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #6 [ 404.698367][T19366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.698372][T19366] Call Trace: [ 404.698404][T19366] dump_stack+0x172/0x1f0 [ 404.698425][T19366] dump_header+0x10f/0xb6c [ 404.698441][T19366] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 404.698458][T19366] ? ___ratelimit+0x60/0x595 [ 404.698474][T19366] ? do_raw_spin_unlock+0x57/0x270 [ 404.698493][T19366] oom_kill_process.cold+0x10/0x15 [ 404.698512][T19366] out_of_memory+0x79a/0x1280 [ 404.698536][T19366] ? oom_killer_disable+0x280/0x280 [ 404.698548][T19366] ? find_held_lock+0x35/0x130 [ 404.698578][T19366] mem_cgroup_out_of_memory+0x1ca/0x230 [ 404.726065][T19414] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 404.728529][T19366] ? memcg_event_wake+0x230/0x230 [ 404.728555][T19366] ? do_raw_spin_unlock+0x57/0x270 [ 404.728574][T19366] ? _raw_spin_unlock+0x2d/0x50 [ 404.728598][T19366] try_charge+0x102c/0x15c0 [ 404.752797][T19414] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 404.754182][T19366] ? find_held_lock+0x35/0x130 [ 404.754211][T19366] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 404.754231][T19366] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.754254][T19366] ? kasan_check_read+0x11/0x20 [ 404.773143][T19380] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 404.779009][T19366] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 404.798453][T19366] mem_cgroup_try_charge+0x24d/0x5e0 [ 404.798476][T19366] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 404.851491][T19366] wp_page_copy+0x416/0x1770 [ 404.856097][T19366] ? do_wp_page+0x486/0x1500 [ 404.860730][T19366] ? pmd_pfn+0x1d0/0x1d0 [ 404.865029][T19366] ? lock_downgrade+0x880/0x880 [ 404.869891][T19366] ? swp_swapcount+0x540/0x540 [ 404.874679][T19366] ? do_raw_spin_unlock+0x57/0x270 [ 404.879802][T19366] ? kasan_check_read+0x11/0x20 [ 404.884663][T19366] ? do_raw_spin_unlock+0x57/0x270 [ 404.889785][T19366] do_wp_page+0x48e/0x1500 [ 404.894313][T19366] ? finish_mkwrite_fault+0x540/0x540 [ 404.899697][T19366] __handle_mm_fault+0x22e3/0x3eb0 [ 404.904829][T19366] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 404.910382][T19366] ? find_held_lock+0x35/0x130 [ 404.915166][T19366] ? handle_mm_fault+0x292/0xa90 [ 404.920153][T19366] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.926416][T19366] ? kasan_check_read+0x11/0x20 [ 404.931289][T19366] handle_mm_fault+0x3b7/0xa90 [ 404.936070][T19366] __do_page_fault+0x5ef/0xda0 [ 404.940880][T19366] do_page_fault+0x71/0x57d [ 404.945403][T19366] ? page_fault+0x8/0x30 [ 404.949660][T19366] page_fault+0x1e/0x30 [ 404.953908][T19366] RIP: 0033:0x430356 [ 404.957810][T19366] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 404.977427][T19366] RSP: 002b:00007fff67013250 EFLAGS: 00010206 [ 404.983500][T19366] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 404.991477][T19366] RDX: 00005555560d2930 RSI: 00005555560da970 RDI: 0000000000000003 [ 405.000469][T19366] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555560d1940 [ 405.005925][T19422] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 405.008528][T19366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 405.008538][T19366] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 405.068738][T19366] memory: usage 6252kB, limit 0kB, failcnt 19 [ 405.078870][T19422] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 405.089114][T19366] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 405.097294][T19366] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 405.106520][T19366] Memory cgroup stats for /syz4: cache:0KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:56KB inactive_file:0KB active_file:0KB unevictable:0KB [ 405.130523][T19366] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=19366,uid=0 [ 405.140096][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 405.153149][T19366] Memory cgroup out of memory: Killed process 19366 (syz-executor.4) total-vm:72448kB, anon-rss:68kB, file-rss:34824kB, shmem-rss:0kB [ 405.153926][ T1041] oom_reaper: reaped process 19366 (syz-executor.4), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 405.178715][T19367] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 405.185471][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 405.194736][T19367] CPU: 1 PID: 19367 Comm: syz-executor.5 Not tainted 5.2.0-rc1+ #6 [ 405.204434][T19367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.211880][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 405.214485][T19367] Call Trace: [ 405.214511][T19367] dump_stack+0x172/0x1f0 [ 405.214533][T19367] dump_header+0x10f/0xb6c [ 405.214551][T19367] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 405.214571][T19367] ? ___ratelimit+0x60/0x595 [ 405.223188][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 405.225644][T19367] ? do_raw_spin_unlock+0x57/0x270 [ 405.225666][T19367] oom_kill_process.cold+0x10/0x15 [ 405.225686][T19367] out_of_memory+0x79a/0x1280 [ 405.233085][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 405.234429][T19367] ? oom_killer_disable+0x280/0x280 [ 405.245383][T19384] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 405.252578][T19367] ? find_held_lock+0x35/0x130 [ 405.252607][T19367] mem_cgroup_out_of_memory+0x1ca/0x230 [ 405.252630][T19367] ? memcg_event_wake+0x230/0x230 [ 405.260407][T19384] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 405.263183][T19367] ? do_raw_spin_unlock+0x57/0x270 [ 405.263202][T19367] ? _raw_spin_unlock+0x2d/0x50 [ 405.263221][T19367] try_charge+0x102c/0x15c0 [ 405.263242][T19367] ? find_held_lock+0x35/0x130 [ 405.286236][T19384] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 405.291235][T19367] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 405.291258][T19367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.301544][T19367] ? kasan_check_read+0x11/0x20 [ 405.301566][T19367] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 405.301585][T19367] mem_cgroup_try_charge+0x24d/0x5e0 [ 405.361790][T19367] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 405.372681][T19367] wp_page_copy+0x416/0x1770 [ 405.372697][T19367] ? do_wp_page+0x486/0x1500 [ 405.372717][T19367] ? pmd_pfn+0x1d0/0x1d0 [ 405.372737][T19367] ? lock_downgrade+0x880/0x880 [ 405.372754][T19367] ? swp_swapcount+0x540/0x540 [ 405.372787][T19367] ? do_raw_spin_unlock+0x57/0x270 [ 405.400890][T19367] ? kasan_check_read+0x11/0x20 [ 405.405756][T19367] ? do_raw_spin_unlock+0x57/0x270 [ 405.410880][T19367] do_wp_page+0x48e/0x1500 [ 405.415315][T19367] ? finish_mkwrite_fault+0x540/0x540 [ 405.420705][T19367] __handle_mm_fault+0x22e3/0x3eb0 [ 405.425835][T19367] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 405.431395][T19367] ? find_held_lock+0x35/0x130 [ 405.436173][T19367] ? handle_mm_fault+0x292/0xa90 [ 405.441129][T19367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.447378][T19367] ? kasan_check_read+0x11/0x20 [ 405.452250][T19367] handle_mm_fault+0x3b7/0xa90 [ 405.457031][T19367] __do_page_fault+0x5ef/0xda0 [ 405.461812][T19367] do_page_fault+0x71/0x57d [ 405.464938][T19430] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.0'. [ 405.466322][T19367] ? page_fault+0x8/0x30 [ 405.466340][T19367] page_fault+0x1e/0x30 [ 405.466351][T19367] RIP: 0033:0x430356 [ 405.466367][T19367] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 405.466375][T19367] RSP: 002b:00007ffdba512190 EFLAGS: 00010206 [ 405.466387][T19367] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 405.466403][T19367] RDX: 00005555572a9930 RSI: 00005555572b1970 RDI: 0000000000000003 [ 405.466413][T19367] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555572a8940 [ 405.466421][T19367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 405.466439][T19367] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 405.475976][T19430] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 405.509463][T19367] memory: usage 5168kB, limit 0kB, failcnt 21 [ 405.589919][T19367] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 09:06:27 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) socketpair(0xb, 0x3, 0x19f7800000000000, &(0x7f0000000580)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={0xffffffffffffffff, 0x6, 0x1, 0xff, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4df0e00000000000) [ 405.608522][T19367] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 405.622930][T19367] Memory cgroup stats for /syz5: cache:0KB rss:52KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:52KB inactive_file:20KB active_file:0KB unevictable:0KB [ 405.646565][T19367] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=19367,uid=0 [ 405.664265][T19367] Memory cgroup out of memory: Killed process 19367 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34824kB, shmem-rss:0kB [ 405.678709][T19423] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 405.679136][ T1041] oom_reaper: reaped process 19367 (syz-executor.5), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 405.689503][T19423] CPU: 0 PID: 19423 Comm: syz-executor.3 Not tainted 5.2.0-rc1+ #6 [ 405.707988][T19423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.718039][T19423] Call Trace: [ 405.721341][T19423] dump_stack+0x172/0x1f0 [ 405.725713][T19423] dump_header+0x10f/0xb6c [ 405.730138][T19423] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 405.735952][T19423] ? ___ratelimit+0x60/0x595 [ 405.740543][T19423] ? do_raw_spin_unlock+0x57/0x270 [ 405.745666][T19423] oom_kill_process.cold+0x10/0x15 [ 405.750780][T19423] out_of_memory+0x79a/0x1280 [ 405.755468][T19423] ? oom_killer_disable+0x280/0x280 [ 405.760664][T19423] ? cgroup_file_notify+0x140/0x1b0 [ 405.765878][T19423] mem_cgroup_out_of_memory+0x1ca/0x230 [ 405.771439][T19423] ? memcg_event_wake+0x230/0x230 [ 405.776475][T19423] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 405.782286][T19423] ? cgroup_file_notify+0x140/0x1b0 [ 405.787495][T19423] memory_max_write+0x169/0x300 [ 405.792353][T19423] ? mem_cgroup_write+0x360/0x360 [ 405.797382][T19423] ? lock_acquire+0x16f/0x3f0 [ 405.802067][T19423] ? kernfs_fop_write+0x227/0x480 [ 405.807102][T19423] cgroup_file_write+0x241/0x790 [ 405.812047][T19423] ? mem_cgroup_write+0x360/0x360 [ 405.817075][T19423] ? kill_css+0x380/0x380 [ 405.821421][T19423] ? kill_css+0x380/0x380 [ 405.825759][T19423] kernfs_fop_write+0x2b8/0x480 [ 405.830619][T19423] __vfs_write+0x8a/0x110 [ 405.834951][T19423] ? kernfs_fop_open+0xd80/0xd80 [ 405.839897][T19423] vfs_write+0x20c/0x580 [ 405.844148][T19423] ksys_write+0x14f/0x290 [ 405.848481][T19423] ? __ia32_sys_read+0xb0/0xb0 [ 405.853260][T19423] ? do_syscall_64+0x26/0x680 [ 405.857943][T19423] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.864008][T19423] ? do_syscall_64+0x26/0x680 [ 405.868692][T19423] __x64_sys_write+0x73/0xb0 [ 405.873287][T19423] do_syscall_64+0xfd/0x680 [ 405.877793][T19423] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.883691][T19423] RIP: 0033:0x459279 [ 405.887586][T19423] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 405.907193][T19423] RSP: 002b:00007f501ef66c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 405.915694][T19423] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 405.923667][T19423] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 405.931722][T19423] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 405.939689][T19423] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f501ef676d4 [ 405.947661][T19423] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 405.969338][T19423] memory: usage 8444kB, limit 0kB, failcnt 24 [ 405.980758][T19423] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 405.988880][T19423] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 405.996004][T19423] Memory cgroup stats for /syz3: cache:104KB rss:2228KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2228KB inactive_file:132KB active_file:132KB unevictable:0KB [ 406.018054][T19423] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=19421,uid=0 [ 406.033783][T19423] Memory cgroup out of memory: Killed process 19421 (syz-executor.3) total-vm:72712kB, anon-rss:2188kB, file-rss:35776kB, shmem-rss:0kB [ 406.048593][T19431] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 406.049733][ T1041] oom_reaper: reaped process 19421 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 406.059945][T19431] CPU: 0 PID: 19431 Comm: syz-executor.0 Not tainted 5.2.0-rc1+ #6 [ 406.078412][T19431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.088471][T19431] Call Trace: [ 406.091774][T19431] dump_stack+0x172/0x1f0 [ 406.096113][T19431] dump_header+0x10f/0xb6c [ 406.101284][T19431] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 406.107091][T19431] ? ___ratelimit+0x60/0x595 [ 406.111682][T19431] ? do_raw_spin_unlock+0x57/0x270 [ 406.116798][T19431] oom_kill_process.cold+0x10/0x15 [ 406.121921][T19431] out_of_memory+0x79a/0x1280 [ 406.126609][T19431] ? oom_killer_disable+0x280/0x280 [ 406.131832][T19431] ? cgroup_file_notify+0x140/0x1b0 [ 406.137655][T19431] mem_cgroup_out_of_memory+0x1ca/0x230 [ 406.143209][T19431] ? memcg_event_wake+0x230/0x230 [ 406.148245][T19431] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 406.154061][T19431] ? cgroup_file_notify+0x140/0x1b0 [ 406.159260][T19431] memory_max_write+0x169/0x300 [ 406.164107][T19431] ? mem_cgroup_write+0x360/0x360 [ 406.169131][T19431] ? lock_acquire+0x16f/0x3f0 [ 406.173824][T19431] ? kernfs_fop_write+0x227/0x480 [ 406.178862][T19431] cgroup_file_write+0x241/0x790 [ 406.183793][T19431] ? mem_cgroup_write+0x360/0x360 [ 406.188815][T19431] ? kill_css+0x380/0x380 [ 406.193161][T19431] ? kill_css+0x380/0x380 [ 406.197481][T19431] kernfs_fop_write+0x2b8/0x480 [ 406.202314][T19431] __vfs_write+0x8a/0x110 [ 406.206642][T19431] ? kernfs_fop_open+0xd80/0xd80 [ 406.211620][T19431] vfs_write+0x20c/0x580 [ 406.215864][T19431] ksys_write+0x14f/0x290 [ 406.220192][T19431] ? __ia32_sys_read+0xb0/0xb0 [ 406.224954][T19431] ? do_syscall_64+0x26/0x680 [ 406.229634][T19431] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.235704][T19431] ? do_syscall_64+0x26/0x680 [ 406.240376][T19431] __x64_sys_write+0x73/0xb0 [ 406.244962][T19431] do_syscall_64+0xfd/0x680 [ 406.249472][T19431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.255364][T19431] RIP: 0033:0x459279 [ 406.259252][T19431] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 406.278875][T19431] RSP: 002b:00007f8f79632c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 406.287281][T19431] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 406.295251][T19431] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 406.303223][T19431] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 406.311195][T19431] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8f796336d4 09:06:28 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 406.319155][T19431] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 406.355648][T19431] memory: usage 8316kB, limit 0kB, failcnt 22 [ 406.367825][T19431] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 406.376260][T14539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 406.388806][T19431] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 406.396788][T14539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 406.401321][T19431] Memory cgroup stats for /syz0: cache:160KB rss:2184KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2184KB inactive_file:0KB active_file:0KB unevictable:0KB [ 406.441403][T19431] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=19428,uid=0 [ 406.472588][T19431] Memory cgroup out of memory: Killed process 19431 (syz-executor.0) total-vm:72712kB, anon-rss:2192kB, file-rss:35848kB, shmem-rss:0kB [ 406.500951][T19378] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 406.502144][ T1041] oom_reaper: reaped process 19431 (syz-executor.0), now anon-rss:0kB, file-rss:34888kB, shmem-rss:0kB [ 406.511300][T19378] CPU: 0 PID: 19378 Comm: syz-executor.1 Not tainted 5.2.0-rc1+ #6 [ 406.529946][T19378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.540000][T19378] Call Trace: [ 406.543297][T19378] dump_stack+0x172/0x1f0 [ 406.547639][T19378] dump_header+0x10f/0xb6c [ 406.552061][T19378] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 406.557867][T19378] ? ___ratelimit+0x60/0x595 [ 406.562469][T19378] ? do_raw_spin_unlock+0x57/0x270 [ 406.567591][T19378] oom_kill_process.cold+0x10/0x15 [ 406.572723][T19378] out_of_memory+0x79a/0x1280 [ 406.577412][T19378] ? oom_killer_disable+0x280/0x280 [ 406.582610][T19378] ? find_held_lock+0x35/0x130 [ 406.587395][T19378] mem_cgroup_out_of_memory+0x1ca/0x230 [ 406.592943][T19378] ? memcg_event_wake+0x230/0x230 [ 406.597972][T19378] ? do_raw_spin_unlock+0x57/0x270 [ 406.603087][T19378] ? _raw_spin_unlock+0x2d/0x50 [ 406.607947][T19378] try_charge+0x102c/0x15c0 [ 406.612448][T19378] ? find_held_lock+0x35/0x130 [ 406.617228][T19378] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 406.622779][T19378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.629020][T19378] ? kasan_check_read+0x11/0x20 [ 406.633882][T19378] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 406.639440][T19378] mem_cgroup_try_charge+0x24d/0x5e0 [ 406.644737][T19378] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 406.650376][T19378] __handle_mm_fault+0x1e1a/0x3eb0 [ 406.655498][T19378] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 406.661048][T19378] ? find_held_lock+0x35/0x130 [ 406.665818][T19378] ? handle_mm_fault+0x292/0xa90 [ 406.670769][T19378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.677012][T19378] ? kasan_check_read+0x11/0x20 [ 406.681869][T19378] handle_mm_fault+0x3b7/0xa90 [ 406.686651][T19378] __do_page_fault+0x5ef/0xda0 [ 406.691426][T19378] do_page_fault+0x71/0x57d [ 406.695937][T19378] ? page_fault+0x8/0x30 [ 406.700186][T19378] page_fault+0x1e/0x30 [ 406.704339][T19378] RIP: 0033:0x403672 09:06:28 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 406.708238][T19378] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 29 86 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 49 3b 05 00 48 [ 406.727841][T19378] RSP: 002b:00007ffc3c092e70 EFLAGS: 00010246 [ 406.733900][T19378] RAX: 0000000000000000 RBX: 0000000000062fe7 RCX: 0000000000412e80 [ 406.741853][T19378] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffc3c093fa0 [ 406.749808][T19378] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555555fc3940 [ 406.757760][T19378] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc3c093fa0 [ 406.765715][T19378] R13: 00007ffc3c093f90 R14: 0000000000000000 R15: 00007ffc3c093fa0 [ 406.777430][T19378] memory: usage 5824kB, limit 0kB, failcnt 28 [ 406.788505][T19378] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 406.797422][T19378] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 406.805194][T19378] Memory cgroup stats for /syz1: cache:20KB rss:112KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:48KB inactive_file:0KB active_file:0KB unevictable:0KB [ 406.826194][T19378] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=19378,uid=0 [ 406.841660][T19378] Memory cgroup out of memory: Killed process 19378 (syz-executor.1) total-vm:72448kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 406.856779][ T1041] oom_reaper: reaped process 19378 (syz-executor.1), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 406.867964][T19380] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 406.878124][T19380] CPU: 1 PID: 19380 Comm: syz-executor.3 Not tainted 5.2.0-rc1+ #6 [ 406.886029][T19380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.896082][T19380] Call Trace: [ 406.899384][T19380] dump_stack+0x172/0x1f0 [ 406.903728][T19380] dump_header+0x10f/0xb6c [ 406.908149][T19380] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 406.913957][T19380] ? ___ratelimit+0x60/0x595 [ 406.918546][T19380] ? do_raw_spin_unlock+0x57/0x270 [ 406.923662][T19380] oom_kill_process.cold+0x10/0x15 [ 406.928776][T19380] out_of_memory+0x79a/0x1280 [ 406.933462][T19380] ? oom_killer_disable+0x280/0x280 [ 406.938659][T19380] ? find_held_lock+0x35/0x130 [ 406.943444][T19380] mem_cgroup_out_of_memory+0x1ca/0x230 [ 406.948992][T19380] ? memcg_event_wake+0x230/0x230 [ 406.954024][T19380] ? do_raw_spin_unlock+0x57/0x270 [ 406.959139][T19380] ? _raw_spin_unlock+0x2d/0x50 [ 406.964005][T19380] try_charge+0x102c/0x15c0 [ 406.968506][T19380] ? find_held_lock+0x35/0x130 [ 406.973280][T19380] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 406.979006][T19380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.985254][T19380] ? kasan_check_read+0x11/0x20 [ 406.990112][T19380] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 406.996470][T19380] mem_cgroup_try_charge+0x24d/0x5e0 [ 407.001772][T19380] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 407.007415][T19380] wp_page_copy+0x416/0x1770 [ 407.012007][T19380] ? do_wp_page+0x486/0x1500 [ 407.016605][T19380] ? pmd_pfn+0x1d0/0x1d0 [ 407.020854][T19380] ? lock_downgrade+0x880/0x880 [ 407.025705][T19380] ? swp_swapcount+0x540/0x540 [ 407.030467][T19380] ? do_raw_spin_unlock+0x57/0x270 [ 407.035585][T19380] ? kasan_check_read+0x11/0x20 [ 407.040438][T19380] ? do_raw_spin_unlock+0x57/0x270 [ 407.045559][T19380] do_wp_page+0x48e/0x1500 [ 407.049983][T19380] ? finish_mkwrite_fault+0x540/0x540 [ 407.055368][T19380] __handle_mm_fault+0x22e3/0x3eb0 [ 407.060497][T19380] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 407.066042][T19380] ? find_held_lock+0x35/0x130 [ 407.070811][T19380] ? handle_mm_fault+0x292/0xa90 [ 407.075772][T19380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 407.082012][T19380] ? kasan_check_read+0x11/0x20 [ 407.086877][T19380] handle_mm_fault+0x3b7/0xa90 [ 407.091645][T19380] __do_page_fault+0x5ef/0xda0 [ 407.096432][T19380] do_page_fault+0x71/0x57d [ 407.101446][T19380] ? page_fault+0x8/0x30 [ 407.105701][T19380] page_fault+0x1e/0x30 [ 407.109864][T19380] RIP: 0033:0x430356 [ 407.113753][T19380] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 407.133336][T19380] RSP: 002b:00007ffcc5e2a160 EFLAGS: 00010206 [ 407.139378][T19380] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 407.147373][T19380] RDX: 000055555607b930 RSI: 0000555556083970 RDI: 0000000000000003 [ 407.155338][T19380] RBP: 0000000000008041 R08: 0000000000000001 R09: 000055555607a940 [ 407.163286][T19380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 407.171252][T19380] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 407.181415][T19380] memory: usage 6064kB, limit 0kB, failcnt 36 [ 407.187614][T19380] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 407.195145][T19380] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 407.202003][T19380] Memory cgroup stats for [ 407.202014][T19380] /syz3: cache:104KB rss:48KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:48KB inactive_file:132KB active_file:132KB unevictable:0KB [ 407.225190][T19380] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=19380,uid=0 [ 407.240636][T19380] Memory cgroup out of memory: Killed process 19380 (syz-executor.3) total-vm:72448kB, anon-rss:68kB, file-rss:34824kB, shmem-rss:0kB [ 407.255353][T19384] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 407.255812][ T1041] oom_reaper: reaped process 19380 (syz-executor.3), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 407.265720][T19384] CPU: 1 PID: 19384 Comm: syz-executor.0 Not tainted 5.2.0-rc1+ #6 [ 407.284310][T19384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.294358][T19384] Call Trace: [ 407.294382][T19384] dump_stack+0x172/0x1f0 [ 407.294420][T19384] dump_header+0x10f/0xb6c [ 407.302013][T19384] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 407.312238][T19384] ? ___ratelimit+0x60/0x595 [ 407.316829][T19384] ? do_raw_spin_unlock+0x57/0x270 [ 407.316851][T19384] oom_kill_process.cold+0x10/0x15 [ 407.316870][T19384] out_of_memory+0x79a/0x1280 [ 407.316892][T19384] ? oom_killer_disable+0x280/0x280 [ 407.327104][T19384] ? find_held_lock+0x35/0x130 [ 407.336970][T19384] mem_cgroup_out_of_memory+0x1ca/0x230 [ 407.336986][T19384] ? memcg_event_wake+0x230/0x230 [ 407.337007][T19384] ? do_raw_spin_unlock+0x57/0x270 [ 407.337027][T19384] ? _raw_spin_unlock+0x2d/0x50 [ 407.347314][T19384] try_charge+0x102c/0x15c0 [ 407.357412][T19384] ? find_held_lock+0x35/0x130 [ 407.357437][T19384] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 407.357455][T19384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 407.357475][T19384] ? kasan_check_read+0x11/0x20 [ 407.366802][T19384] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 407.377079][T19384] mem_cgroup_try_charge+0x24d/0x5e0 [ 407.377100][T19384] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 407.377119][T19384] wp_page_copy+0x416/0x1770 [ 407.377139][T19384] ? do_wp_page+0x486/0x1500 [ 407.388211][T19384] ? pmd_pfn+0x1d0/0x1d0 [ 407.399028][T19384] ? lock_downgrade+0x880/0x880 [ 407.409224][T19384] ? swp_swapcount+0x540/0x540 [ 407.418031][T19384] ? do_raw_spin_unlock+0x57/0x270 [ 407.427632][T19384] ? kasan_check_read+0x11/0x20 [ 407.427652][T19384] ? do_raw_spin_unlock+0x57/0x270 [ 407.437606][T19384] do_wp_page+0x48e/0x1500 [ 407.447108][T19384] ? finish_mkwrite_fault+0x540/0x540 [ 407.452487][T19384] __handle_mm_fault+0x22e3/0x3eb0 [ 407.452510][T19384] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 407.452529][T19384] ? find_held_lock+0x35/0x130 [ 407.467900][T19384] ? handle_mm_fault+0x292/0xa90 [ 407.472837][T19384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 407.479060][T19384] ? kasan_check_read+0x11/0x20 [ 407.483895][T19384] handle_mm_fault+0x3b7/0xa90 [ 407.488660][T19384] __do_page_fault+0x5ef/0xda0 [ 407.493410][T19384] do_page_fault+0x71/0x57d [ 407.497932][T19384] ? page_fault+0x8/0x30 [ 407.502153][T19384] page_fault+0x1e/0x30 [ 407.506285][T19384] RIP: 0033:0x430356 [ 407.510162][T19384] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 407.529761][T19384] RSP: 002b:00007ffefee46170 EFLAGS: 00010206 [ 407.535804][T19384] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 407.543751][T19384] RDX: 0000555555ebd930 RSI: 0000555555ec5970 RDI: 0000000000000003 [ 407.551699][T19384] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555555ebc940 [ 407.559645][T19384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 407.567613][T19384] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 407.578144][T19384] memory: usage 5932kB, limit 0kB, failcnt 30 [ 407.584317][T19384] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 407.584327][T19384] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 407.584334][T19384] Memory cgroup stats for /syz0: cache:160KB rss:48KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:48KB inactive_file:0KB active_file:0KB unevictable:0KB 09:06:29 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 09:06:29 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 407.584418][T19384] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=19384,uid=0 [ 407.584509][T19384] Memory cgroup out of memory: Killed process 19384 (syz-executor.0) total-vm:72448kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB 09:06:29 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 09:06:29 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) socketpair(0xb, 0x3, 0x19f7800000000000, &(0x7f0000000580)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={0xffffffffffffffff, 0x6, 0x1, 0xff, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4df0e00000000000) 09:06:29 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 09:06:29 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 09:06:30 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 09:06:30 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) socketpair(0xb, 0x3, 0x19f7800000000000, &(0x7f0000000580)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={0xffffffffffffffff, 0x6, 0x1, 0xff, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4df0e00000000000) 09:06:30 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r2, r2}) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = socket$kcm(0x10, 0x4006000000002, 0x10) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7fffffff, 0x3, 0x5, 0x53e, 0x0, 0x2000000, 0x9, 0x1, 0x338, 0x40, 0xb4f, 0x6, 0x400, 0x1, 0x7f, 0x5b, 0x1, 0x9, 0x3, 0x2a7a, 0x9, 0x6, 0x1f, 0x443, 0x1, 0xdd, 0xfffffffffffffffc, 0x0, 0x8, 0x80000000, 0x5, 0xa8ab, 0x5, 0xea, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x3}, 0x20200, 0x8, 0x7, 0x0, 0x0, 0xffffffffffffff19, 0x3}, r6, 0x5, r0, 0x2) openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e0000003300812de45a0000185082cf0300a0eba06ec40092ff002fff0f00"/46, 0x2e}], 0x1}, 0x0) socketpair(0x1b, 0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 09:06:30 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) socketpair(0xb, 0x3, 0x19f7800000000000, &(0x7f0000000580)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={0xffffffffffffffff, 0x6, 0x1, 0xff, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4df0e00000000000) 09:06:30 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) socketpair(0xb, 0x3, 0x19f7800000000000, &(0x7f0000000580)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={0xffffffffffffffff, 0x6, 0x1, 0xff, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4df0e00000000000) 09:06:30 executing program 0: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) socketpair(0xb, 0x3, 0x19f7800000000000, &(0x7f0000000580)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={0xffffffffffffffff, 0x6, 0x1, 0xff, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4df0e00000000000) [ 408.946577][T19433] IPVS: ftp: loaded support on port[0] = 21 [ 409.030352][T19435] IPVS: ftp: loaded support on port[0] = 21 [ 409.277942][T19438] IPVS: ftp: loaded support on port[0] = 21 [ 409.292081][T19433] chnl_net:caif_netlink_parms(): no params data found [ 409.524657][T19433] bridge0: port 1(bridge_slave_0) entered blocking state [ 409.531742][T19433] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.540180][T19433] device bridge_slave_0 entered promiscuous mode [ 409.548389][T19433] bridge0: port 2(bridge_slave_1) entered blocking state [ 409.555535][T19433] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.563675][T19433] device bridge_slave_1 entered promiscuous mode [ 409.588188][T19435] chnl_net:caif_netlink_parms(): no params data found [ 409.670584][T19433] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 409.705534][T19433] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 409.806161][T19443] IPVS: ftp: loaded support on port[0] = 21 [ 409.835831][T19444] IPVS: ftp: loaded support on port[0] = 21 [ 409.910454][T19445] IPVS: ftp: loaded support on port[0] = 21 [ 409.918228][T19433] team0: Port device team_slave_0 added [ 409.998408][T19433] team0: Port device team_slave_1 added [ 410.036838][T19435] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.044105][T19435] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.051834][T19435] device bridge_slave_0 entered promiscuous mode [ 410.062317][T19435] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.069473][T19435] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.077724][T19435] device bridge_slave_1 entered promiscuous mode [ 410.143985][T19438] chnl_net:caif_netlink_parms(): no params data found [ 410.217477][T19435] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 410.265785][T19433] device hsr_slave_0 entered promiscuous mode [ 410.302964][T19433] device hsr_slave_1 entered promiscuous mode [ 410.369510][T19435] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 410.587650][T19435] team0: Port device team_slave_0 added [ 410.594585][T19438] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.601657][T19438] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.610187][T19438] device bridge_slave_0 entered promiscuous mode [ 410.638454][T19435] team0: Port device team_slave_1 added [ 410.705448][T19438] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.714808][T19438] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.723479][T19438] device bridge_slave_1 entered promiscuous mode [ 410.955899][T19435] device hsr_slave_0 entered promiscuous mode [ 410.993008][T19435] device hsr_slave_1 entered promiscuous mode [ 411.067757][T19438] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 411.141896][T19444] chnl_net:caif_netlink_parms(): no params data found [ 411.188802][T19438] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 411.287840][T19433] 8021q: adding VLAN 0 to HW filter on device bond0 [ 411.376315][T19438] team0: Port device team_slave_0 added [ 411.385105][T19445] chnl_net:caif_netlink_parms(): no params data found [ 411.396589][T19443] chnl_net:caif_netlink_parms(): no params data found [ 411.426521][T19438] team0: Port device team_slave_1 added [ 411.474490][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 411.483071][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 411.605212][T19433] 8021q: adding VLAN 0 to HW filter on device team0 [ 411.655884][T19438] device hsr_slave_0 entered promiscuous mode [ 411.692939][T19438] device hsr_slave_1 entered promiscuous mode [ 411.740525][T19443] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.754639][T19443] bridge0: port 1(bridge_slave_0) entered disabled state [ 411.763180][T19443] device bridge_slave_0 entered promiscuous mode [ 411.771240][T19444] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.778415][T19444] bridge0: port 1(bridge_slave_0) entered disabled state [ 411.787178][T19444] device bridge_slave_0 entered promiscuous mode [ 411.874319][T19443] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.881403][T19443] bridge0: port 2(bridge_slave_1) entered disabled state [ 411.889773][T19443] device bridge_slave_1 entered promiscuous mode [ 411.897846][T19444] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.905075][T19444] bridge0: port 2(bridge_slave_1) entered disabled state [ 411.914625][T19444] device bridge_slave_1 entered promiscuous mode [ 411.923805][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 411.933052][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 411.941322][T14504] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.948446][T14504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 411.970693][T19445] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.978895][T19445] bridge0: port 1(bridge_slave_0) entered disabled state [ 411.989839][T19445] device bridge_slave_0 entered promiscuous mode [ 412.024258][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 412.032272][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 412.050877][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 412.061073][T14503] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.068182][T14503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 412.076891][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 412.118916][T19445] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.127152][T19445] bridge0: port 2(bridge_slave_1) entered disabled state [ 412.135805][T19445] device bridge_slave_1 entered promiscuous mode [ 412.145816][T19444] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 412.157373][T19444] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 412.186956][T19443] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 412.257109][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 412.268195][T19444] team0: Port device team_slave_0 added [ 412.277336][T19443] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 412.305956][T19445] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 412.315982][T19444] team0: Port device team_slave_1 added [ 412.395351][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 412.404618][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 412.413869][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 412.422719][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 412.431534][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 412.444497][T19445] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 412.515908][T19444] device hsr_slave_0 entered promiscuous mode [ 412.563078][T19444] device hsr_slave_1 entered promiscuous mode [ 412.652053][ T2529] device bridge_slave_1 left promiscuous mode [ 412.660358][ T2529] bridge0: port 2(bridge_slave_1) entered disabled state [ 412.711586][ T2529] device bridge_slave_0 left promiscuous mode [ 412.718364][ T2529] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.466192][ T2529] device hsr_slave_1 left promiscuous mode [ 415.521012][ T2529] device hsr_slave_0 left promiscuous mode [ 415.578944][ T2529] team0 (unregistering): Port device team_slave_1 removed [ 415.595958][ T2529] team0 (unregistering): Port device team_slave_0 removed [ 415.611767][ T2529] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 415.670528][ T2529] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 415.790511][ T2529] bond0 (unregistering): Released all slaves [ 415.910271][T19443] team0: Port device team_slave_0 added [ 415.933499][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 415.942088][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 415.951055][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 415.961559][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 416.000640][T19443] team0: Port device team_slave_1 added [ 416.010996][T19435] 8021q: adding VLAN 0 to HW filter on device bond0 [ 416.023071][T19433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 416.032324][T19445] team0: Port device team_slave_0 added [ 416.095962][T19443] device hsr_slave_0 entered promiscuous mode [ 416.153114][T19443] device hsr_slave_1 entered promiscuous mode [ 416.207488][T19435] 8021q: adding VLAN 0 to HW filter on device team0 [ 416.225202][T19445] team0: Port device team_slave_1 added [ 416.243969][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 416.251776][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 416.267497][T19438] 8021q: adding VLAN 0 to HW filter on device bond0 [ 416.331973][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 416.340935][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 416.349971][T14504] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.357086][T14504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 416.375854][T19433] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 416.404477][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 416.414030][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 416.433518][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 416.452796][T14503] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.459860][T14503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 416.469244][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 416.488888][T19438] 8021q: adding VLAN 0 to HW filter on device team0 [ 416.546627][T19445] device hsr_slave_0 entered promiscuous mode [ 416.602955][T19445] device hsr_slave_1 entered promiscuous mode [ 416.675294][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 416.693462][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 416.711765][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 416.733179][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 416.742344][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 416.782235][T19444] 8021q: adding VLAN 0 to HW filter on device bond0 [ 416.823153][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 416.831256][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 416.858981][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 416.880383][T14503] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.887561][T14503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 416.896671][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 416.905735][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 416.914683][T14503] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.921773][T14503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 416.952545][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 416.961353][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 416.975400][T19456] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 417.002828][T19456] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 417.038224][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 417.045773][T19457] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 417.054522][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 417.073597][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 417.074601][T19457] CPU: 0 PID: 19457 Comm: syz-executor.2 Not tainted 5.2.0-rc1+ #6 [ 417.089384][T19457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.093728][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 417.099439][T19457] Call Trace: [ 417.110614][T19457] dump_stack+0x172/0x1f0 [ 417.114963][T19457] dump_header+0x10f/0xb6c [ 417.119384][T19457] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 417.123517][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 417.125200][T19457] ? ___ratelimit+0x60/0x595 [ 417.137568][T19457] ? do_raw_spin_unlock+0x57/0x270 [ 417.142685][T19457] oom_kill_process.cold+0x10/0x15 [ 417.143276][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 417.147804][T19457] out_of_memory+0x79a/0x1280 [ 417.160364][T19457] ? __sched_text_start+0x8/0x8 [ 417.165220][T19457] ? oom_killer_disable+0x280/0x280 [ 417.170421][T19457] ? cgroup_file_notify+0x140/0x1b0 [ 417.175653][T19457] mem_cgroup_out_of_memory+0x1ca/0x230 [ 417.176489][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 417.181213][T19457] ? memcg_event_wake+0x230/0x230 [ 417.194033][T19457] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 417.199852][T19457] ? cgroup_file_notify+0x140/0x1b0 [ 417.205064][T19457] memory_max_write+0x169/0x300 [ 417.209939][T19457] ? mem_cgroup_write+0x360/0x360 [ 417.214972][T19457] ? lock_acquire+0x16f/0x3f0 [ 417.219656][T19435] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 417.219674][T19435] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 417.229985][T19457] ? kernfs_fop_write+0x227/0x480 [ 417.230007][T19457] cgroup_file_write+0x241/0x790 [ 417.230027][T19457] ? mem_cgroup_write+0x360/0x360 [ 417.230040][T19457] ? kill_css+0x380/0x380 [ 417.230067][T19457] ? kill_css+0x380/0x380 [ 417.263981][T19457] kernfs_fop_write+0x2b8/0x480 [ 417.268849][T19457] __vfs_write+0x8a/0x110 [ 417.273178][T19457] ? kernfs_fop_open+0xd80/0xd80 [ 417.278124][T19457] vfs_write+0x20c/0x580 [ 417.282375][T19457] ksys_write+0x14f/0x290 [ 417.286717][T19457] ? __ia32_sys_read+0xb0/0xb0 [ 417.291493][T19457] ? do_syscall_64+0x26/0x680 [ 417.296185][T19457] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.302253][T19457] ? do_syscall_64+0x26/0x680 [ 417.305653][T19435] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 417.306939][T19457] __x64_sys_write+0x73/0xb0 [ 417.318273][T19457] do_syscall_64+0xfd/0x680 [ 417.322797][T19457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.322815][T19457] RIP: 0033:0x459279 [ 417.332578][T19457] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 417.352196][T19457] RSP: 002b:00007f038b39bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 417.360612][T19457] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 417.368598][T19457] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 417.376576][T19457] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 417.384551][T19457] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f038b39c6d4 [ 417.392519][T19457] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 417.432904][T19457] memory: usage 8976kB, limit 0kB, failcnt 20 [ 417.446280][T19457] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 417.454654][T19457] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 417.461634][T19457] Memory cgroup stats for /syz2: cache:40KB rss:2164KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2164KB inactive_file:60KB active_file:0KB unevictable:0KB [ 417.463738][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 417.483518][T19457] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=19455,uid=0 [ 417.506268][T19457] Memory cgroup out of memory: Killed process 19455 (syz-executor.2) total-vm:72712kB, anon-rss:2192kB, file-rss:35776kB, shmem-rss:0kB [ 417.524418][ T1041] oom_reaper: reaped process 19455 (syz-executor.2), now anon-rss:0kB, file-rss:34884kB, shmem-rss:0kB [ 417.536492][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 417.553184][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 417.561808][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 09:06:39 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='1:2\t'], 0x4) [ 417.593236][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 417.596991][T19433] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 417.601651][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 417.618801][T19433] CPU: 0 PID: 19433 Comm: syz-executor.2 Not tainted 5.2.0-rc1+ #6 [ 417.626699][T19433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.636756][T19433] Call Trace: [ 417.640052][T19433] dump_stack+0x172/0x1f0 [ 417.643239][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 417.644418][T19433] dump_header+0x10f/0xb6c [ 417.652153][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 417.656012][T19433] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 417.656028][T19433] ? ___ratelimit+0x60/0x595 [ 417.656043][T19433] ? do_raw_spin_unlock+0x57/0x270 [ 417.656062][T19433] oom_kill_process.cold+0x10/0x15 [ 417.656079][T19433] out_of_memory+0x79a/0x1280 [ 417.656096][T19433] ? lock_downgrade+0x880/0x880 [ 417.656117][T19433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.683687][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 417.684465][T19433] ? oom_killer_disable+0x280/0x280 [ 417.689710][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 417.693956][T19433] ? find_held_lock+0x35/0x130 [ 417.693990][T19433] mem_cgroup_out_of_memory+0x1ca/0x230 [ 417.694005][T19433] ? memcg_event_wake+0x230/0x230 [ 417.694029][T19433] ? do_raw_spin_unlock+0x57/0x270 [ 417.714623][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 417.720940][T19433] ? _raw_spin_unlock+0x2d/0x50 [ 417.753879][T19433] try_charge+0x102c/0x15c0 [ 417.758391][T19433] ? find_held_lock+0x35/0x130 [ 417.763168][T19433] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 417.768723][T19433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.773111][T19443] 8021q: adding VLAN 0 to HW filter on device bond0 [ 417.774966][T19433] ? kasan_check_read+0x11/0x20 [ 417.786397][T19433] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 417.791950][T19433] mem_cgroup_try_charge+0x24d/0x5e0 [ 417.797243][T19433] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 417.802878][T19433] wp_page_copy+0x416/0x1770 [ 417.807482][T19433] ? do_wp_page+0x486/0x1500 [ 417.812086][T19433] ? pmd_pfn+0x1d0/0x1d0 [ 417.816346][T19433] ? lock_downgrade+0x880/0x880 [ 417.821209][T19433] ? swp_swapcount+0x540/0x540 [ 417.825978][T19433] ? do_raw_spin_unlock+0x57/0x270 [ 417.831095][T19433] ? kasan_check_read+0x11/0x20 [ 417.832419][T19443] 8021q: adding VLAN 0 to HW filter on device team0 [ 417.835947][T19433] ? do_raw_spin_unlock+0x57/0x270 [ 417.847636][T19433] do_wp_page+0x48e/0x1500 [ 417.852059][T19433] ? finish_mkwrite_fault+0x540/0x540 [ 417.857450][T19433] __handle_mm_fault+0x22e3/0x3eb0 [ 417.862574][T19433] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 417.868138][T19433] ? find_held_lock+0x35/0x130 [ 417.872913][T19433] ? handle_mm_fault+0x292/0xa90 [ 417.877875][T19433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.884127][T19433] ? kasan_check_read+0x11/0x20 [ 417.888995][T19433] handle_mm_fault+0x3b7/0xa90 [ 417.893763][T19433] __do_page_fault+0x5ef/0xda0 [ 417.898544][T19433] do_page_fault+0x71/0x57d [ 417.903052][T19433] ? page_fault+0x8/0x30 [ 417.907301][T19433] page_fault+0x1e/0x30 [ 417.911462][T19433] RIP: 0033:0x430356 [ 417.915357][T19433] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 417.934966][T19433] RSP: 002b:00007fff5c5672e0 EFLAGS: 00010206 [ 417.941034][T19433] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 417.944692][T19443] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 417.949012][T19433] RDX: 0000555557388930 RSI: 0000555557390970 RDI: 0000000000000003 [ 417.967285][T19433] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555557387940 [ 417.975257][T19433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 417.983225][T19433] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 417.992577][T19443] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 418.004943][T19433] memory: usage 6592kB, limit 0kB, failcnt 28 [ 418.011023][T19433] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 418.018852][T19433] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 418.033570][T19433] Memory cgroup stats for /syz2: cache:40KB rss:64KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:64KB inactive_file:60KB active_file:0KB unevictable:0KB [ 418.036773][T19444] 8021q: adding VLAN 0 to HW filter on device team0 [ 418.062512][T19433] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=19433,uid=0 [ 418.079352][T19433] Memory cgroup out of memory: Killed process 19433 (syz-executor.2) total-vm:72448kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 418.094404][ T1041] oom_reaper: reaped process 19433 (syz-executor.2), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 418.109054][T19438] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 418.120894][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 418.133659][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 418.163254][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 418.171095][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 418.193077][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 418.201473][T14503] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.208595][T14503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 418.217181][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 418.226320][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 418.235173][T14503] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.242234][T14503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 418.250468][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 418.259745][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 418.269045][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 418.278509][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 418.287485][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 418.313564][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 418.322193][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 418.331157][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 418.340238][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 418.349115][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 418.858119][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 418.873541][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 418.881508][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 418.943328][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 418.952147][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 418.960688][T14503] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.967789][T14503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 418.975954][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 418.984874][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 418.994655][T14503] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.001718][T14503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 419.009837][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 419.019280][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 419.034333][T19443] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 419.068765][T19438] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 419.102115][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 419.122294][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 419.160154][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 09:06:40 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='1:2\t'], 0x4) [ 419.249653][T19445] 8021q: adding VLAN 0 to HW filter on device bond0 [ 419.288464][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 419.309514][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 419.353889][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 419.383321][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 09:06:41 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='1:2\t'], 0x4) 09:06:41 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) socketpair(0xb, 0x3, 0x19f7800000000000, &(0x7f0000000580)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={0xffffffffffffffff, 0x6, 0x1, 0xff, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4df0e00000000000) [ 419.399444][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 419.423654][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 419.432060][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 419.461105][T19444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 419.588944][T19445] 8021q: adding VLAN 0 to HW filter on device team0 [ 419.631829][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 419.661839][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 419.703562][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 419.715811][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 419.734170][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.741642][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 419.757529][T19483] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 419.781286][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 419.782852][T19483] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 419.821909][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 419.859890][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.867074][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 419.896974][T19483] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 419.919704][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 419.934336][T19444] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 419.961099][T19483] CPU: 0 PID: 19483 Comm: syz-executor.5 Not tainted 5.2.0-rc1+ #6 [ 419.969023][T19483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.979070][T19483] Call Trace: [ 419.979095][T19483] dump_stack+0x172/0x1f0 [ 419.979118][T19483] dump_header+0x10f/0xb6c [ 419.979136][T19483] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 419.979151][T19483] ? ___ratelimit+0x60/0x595 [ 419.979168][T19483] ? do_raw_spin_unlock+0x57/0x270 [ 419.979189][T19483] oom_kill_process.cold+0x10/0x15 [ 420.011948][T19483] out_of_memory+0x79a/0x1280 [ 420.016652][T19483] ? __sched_text_start+0x8/0x8 [ 420.021519][T19483] ? oom_killer_disable+0x280/0x280 [ 420.022660][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 420.026741][T19483] mem_cgroup_out_of_memory+0x1ca/0x230 [ 420.026765][T19483] ? memcg_event_wake+0x230/0x230 [ 420.044924][T19483] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 420.049687][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 420.050741][T19483] ? cgroup_file_notify+0x140/0x1b0 [ 420.050766][T19483] memory_max_write+0x169/0x300 [ 420.050788][T19483] ? mem_cgroup_write+0x360/0x360 [ 420.073735][T19483] ? lock_acquire+0x16f/0x3f0 [ 420.078419][T19483] ? kernfs_fop_write+0x227/0x480 [ 420.083469][T19483] ? kernfs_get_active+0x129/0x240 [ 420.088612][T19483] cgroup_file_write+0x241/0x790 [ 420.093565][T19483] ? mem_cgroup_write+0x360/0x360 [ 420.098588][T19483] ? kill_css+0x380/0x380 [ 420.103495][T19483] ? kill_css+0x380/0x380 [ 420.107827][T19483] kernfs_fop_write+0x2b8/0x480 [ 420.112698][T19483] __vfs_write+0x8a/0x110 [ 420.117027][T19483] ? kernfs_fop_open+0xd80/0xd80 [ 420.121971][T19483] vfs_write+0x20c/0x580 [ 420.126229][T19483] ksys_write+0x14f/0x290 [ 420.130564][T19483] ? __ia32_sys_read+0xb0/0xb0 [ 420.135330][T19483] ? do_syscall_64+0x26/0x680 [ 420.140026][T19483] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 420.146099][T19483] ? do_syscall_64+0x26/0x680 [ 420.150787][T19483] __x64_sys_write+0x73/0xb0 [ 420.155386][T19483] do_syscall_64+0xfd/0x680 [ 420.159904][T19483] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 420.165797][T19483] RIP: 0033:0x459279 [ 420.169691][T19483] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 420.189294][T19483] RSP: 002b:00007fcb28b57c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 420.197703][T19483] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 09:06:41 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='1:2\t'], 0x4) [ 420.205675][T19483] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 420.213657][T19483] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 420.221632][T19483] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcb28b586d4 [ 420.229602][T19483] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 420.254627][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 420.275310][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 420.303625][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 420.323271][T14504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 420.361989][T19483] memory: usage 7288kB, limit 0kB, failcnt 22 [ 420.369718][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 420.372147][T19483] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 420.387855][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 420.407852][T19483] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 420.416814][T19483] Memory cgroup stats for /syz5: cache:0KB rss:2152KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2152KB inactive_file:20KB active_file:0KB unevictable:0KB [ 420.429617][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 420.485658][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 420.513966][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 420.535357][T19445] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 420.552174][T19483] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=19482,uid=0 [ 420.671653][T19445] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 420.700238][T19483] Memory cgroup out of memory: Killed process 19482 (syz-executor.5) total-vm:72712kB, anon-rss:2196kB, file-rss:35776kB, shmem-rss:0kB [ 420.824406][ T1041] oom_reaper: reaped process 19482 (syz-executor.5), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 420.852335][T19503] IPVS: ftp: loaded support on port[0] = 21 09:06:42 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='1:2\t'], 0x4) 09:06:42 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) socketpair(0xb, 0x3, 0x19f7800000000000, &(0x7f0000000580)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={0xffffffffffffffff, 0x6, 0x1, 0xff, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4df0e00000000000) 09:06:42 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x2}, 0xc) recvmsg(0xffffffffffffffff, &(0x7f0000019a40)={&(0x7f0000017400)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000019980)=[{0x0}, {&(0x7f0000018580)=""/71, 0x47}, {&(0x7f0000018600)=""/250, 0xfa}, {&(0x7f0000018700)=""/233, 0xe9}, {&(0x7f0000018800)=""/87, 0x57}, {0x0}, {&(0x7f0000019880)=""/230, 0xe6}], 0x7, &(0x7f0000019a00)=""/63, 0x3f}, 0x42) bpf$PROG_LOAD(0x5, &(0x7f0000019b00)={0x0, 0xe, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1fb}, [@exit, @exit, @alu={0x4, 0x2000000000, 0xf, 0xa, 0x6, 0x0, 0x4}, @jmp={0x5, 0x100000000, 0xc, 0x7, 0xb, 0x70, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xed}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map={0x18, 0x9, 0x1, 0x0, r0}, @exit]}, &(0x7f0000000140)='syzkaller\x00', 0x40, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r0, 0x8, &(0x7f0000019a80)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000019ac0)={0x5, 0xd, 0x2, 0xfffffffffffffffa}, 0x10}, 0x70) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000000c0)={0x0, 0x70, 0x5c03f7cb, 0x6, 0xffff, 0x0, 0x0, 0x9, 0x6000, 0x4, 0xfffffffffffffff8, 0x5, 0x8, 0x80000000, 0x100000001, 0x32da, 0x0, 0x400, 0x2, 0x8, 0x5d, 0x76, 0x0, 0x401, 0x40, 0x1, 0x3a, 0x7, 0x8, 0x1c04, 0x9, 0x0, 0x0, 0x800, 0x3f, 0x7f, 0x9, 0x7, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x4}, 0x1000, 0x2, 0x6, 0x0, 0xff, 0x7}) socketpair(0x25, 0x5, 0x3, &(0x7f0000000040)) [ 421.213184][T19438] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 421.306937][T19438] CPU: 1 PID: 19438 Comm: syz-executor.5 Not tainted 5.2.0-rc1+ #6 [ 421.314871][T19438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.324933][T19438] Call Trace: [ 421.328237][T19438] dump_stack+0x172/0x1f0 [ 421.332585][T19438] dump_header+0x10f/0xb6c [ 421.337014][T19438] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 421.342832][T19438] ? ___ratelimit+0x60/0x595 [ 421.347440][T19438] ? do_raw_spin_unlock+0x57/0x270 [ 421.352571][T19438] oom_kill_process.cold+0x10/0x15 [ 421.357698][T19438] out_of_memory+0x79a/0x1280 [ 421.362388][T19438] ? lock_downgrade+0x880/0x880 [ 421.367255][T19438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 421.373511][T19438] ? oom_killer_disable+0x280/0x280 [ 421.378728][T19438] ? find_held_lock+0x35/0x130 [ 421.383525][T19438] mem_cgroup_out_of_memory+0x1ca/0x230 [ 421.389080][T19438] ? memcg_event_wake+0x230/0x230 [ 421.394120][T19438] ? do_raw_spin_unlock+0x57/0x270 [ 421.399242][T19438] ? _raw_spin_unlock+0x2d/0x50 [ 421.404104][T19438] try_charge+0x102c/0x15c0 [ 421.408611][T19438] ? find_held_lock+0x35/0x130 [ 421.413391][T19438] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 421.418954][T19438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 421.425205][T19438] ? kasan_check_read+0x11/0x20 [ 421.430071][T19438] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 421.435624][T19438] mem_cgroup_try_charge+0x24d/0x5e0 [ 421.440920][T19438] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 421.446566][T19438] wp_page_copy+0x416/0x1770 [ 421.451165][T19438] ? do_wp_page+0x486/0x1500 [ 421.455783][T19438] ? pmd_pfn+0x1d0/0x1d0 [ 421.460095][T19438] ? lock_downgrade+0x880/0x880 [ 421.464960][T19438] ? swp_swapcount+0x540/0x540 [ 421.469737][T19438] ? do_raw_spin_unlock+0x57/0x270 [ 421.474948][T19438] ? kasan_check_read+0x11/0x20 [ 421.479807][T19438] ? do_raw_spin_unlock+0x57/0x270 [ 421.484947][T19438] do_wp_page+0x48e/0x1500 [ 421.489380][T19438] ? finish_mkwrite_fault+0x540/0x540 [ 421.494780][T19438] __handle_mm_fault+0x22e3/0x3eb0 [ 421.499912][T19438] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 421.505469][T19438] ? find_held_lock+0x35/0x130 [ 421.510243][T19438] ? handle_mm_fault+0x292/0xa90 [ 421.515200][T19438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 421.521450][T19438] ? kasan_check_read+0x11/0x20 [ 421.526316][T19438] handle_mm_fault+0x3b7/0xa90 [ 421.531095][T19438] __do_page_fault+0x5ef/0xda0 [ 421.535878][T19438] do_page_fault+0x71/0x57d [ 421.540391][T19438] ? page_fault+0x8/0x30 [ 421.544650][T19438] page_fault+0x1e/0x30 [ 421.548808][T19438] RIP: 0033:0x430356 [ 421.552709][T19438] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 0c 4c 64 00 85 c0 0f 84 [ 421.573209][T19438] RSP: 002b:00007ffc19ed8820 EFLAGS: 00010206 [ 421.579285][T19438] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 421.587289][T19438] RDX: 0000555555aa7930 RSI: 0000555555aaf970 RDI: 0000000000000003 [ 421.595273][T19438] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555555aa6940 [ 421.603245][T19438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 421.611222][T19438] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 09:06:43 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='1:2\t'], 0x4) 09:06:43 executing program 0: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) socketpair(0xb, 0x3, 0x19f7800000000000, &(0x7f0000000580)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={0xffffffffffffffff, 0x6, 0x1, 0xff, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4df0e00000000000) [ 421.726842][T19503] chnl_net:caif_netlink_parms(): no params data found [ 421.753044][T19438] memory: usage 4908kB, limit 0kB, failcnt 30 [ 421.764971][T19438] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 421.796546][T19438] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 421.839746][T19438] Memory cgroup stats for /syz5: cache:0KB rss:52KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:52KB inactive_file:20KB active_file:0KB unevictable:0KB [ 421.925737][T19503] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.951899][T19503] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.958589][T19438] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=19438,uid=0 [ 421.981214][T19503] device bridge_slave_0 entered promiscuous mode [ 422.008722][T19438] Memory cgroup out of memory: Killed process 19438 (syz-executor.5) total-vm:72448kB, anon-rss:76kB, file-rss:34824kB, shmem-rss:0kB [ 422.030423][T19503] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.055808][T19503] bridge0: port 2(bridge_slave_1) entered disabled state 09:06:43 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) socketpair(0xb, 0x3, 0x19f7800000000000, &(0x7f0000000580)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={0xffffffffffffffff, 0x6, 0x1, 0xff, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4df0e00000000000) 09:06:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x100000001, 0x100000000000913, 0x6}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000012c0)={r0, &(0x7f0000000280), 0x0}, 0x18) 09:06:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400), 0x0, 0x0, 0xffffffffffffff14}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:06:43 executing program 0: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) socketpair(0xb, 0x3, 0x19f7800000000000, &(0x7f0000000580)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={0xffffffffffffffff, 0x6, 0x1, 0xff, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4df0e00000000000) [ 422.078674][T19503] device bridge_slave_1 entered promiscuous mode [ 422.083205][ T1041] oom_reaper: reaped process 19438 (syz-executor.5), now anon-rss:0kB, file-rss:33928kB, shmem-rss:0kB [ 425.464701][T19503] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 425.686665][T19503] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 427.236773][T19503] team0: Port device team_slave_0 added [ 427.255539][T19503] team0: Port device team_slave_1 added [ 427.335889][T19503] device hsr_slave_0 entered promiscuous mode [ 427.372928][T19503] device hsr_slave_1 entered promiscuous mode [ 430.365882][T19503] 8021q: adding VLAN 0 to HW filter on device bond0 [ 430.381432][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 430.391763][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 430.403272][T19503] 8021q: adding VLAN 0 to HW filter on device team0 [ 430.414289][ T8821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 430.423997][ T8821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 430.432766][ T8821] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.439829][ T8821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 430.466049][ T8821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 430.474841][ T8821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 430.483765][ T8821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 430.492038][ T8821] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.499139][ T8821] bridge0: port 2(bridge_slave_1) entered forwarding state [ 430.507264][ T8821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 430.517019][ T8821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 432.024332][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 432.034279][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 432.044804][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 432.054201][T14503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 433.559777][T19503] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 433.570429][T19503] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 433.592529][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 433.600474][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 433.609835][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 433.619851][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 433.628768][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 435.151311][T19503] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 435.159012][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 09:06:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x100000001, 0x100000000000913, 0x6}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000012c0)={r0, &(0x7f0000000280), 0x0}, 0x18) 09:06:58 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x100000001, 0x100000000000913, 0x6}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000012c0)={r0, &(0x7f0000000280), 0x0}, 0x18) 09:06:58 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x7, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) socketpair(0xb, 0x3, 0x19f7800000000000, &(0x7f0000000580)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={0xffffffffffffffff, 0x6, 0x1, 0xff, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4df0e00000000000) 09:06:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400), 0x0, 0x0, 0xffffffffffffff14}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:06:58 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x2}, 0xc) recvmsg(0xffffffffffffffff, &(0x7f0000019a40)={&(0x7f0000017400)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000019980)=[{0x0}, {&(0x7f0000018580)=""/71, 0x47}, {&(0x7f0000018600)=""/250, 0xfa}, {&(0x7f0000018700)=""/233, 0xe9}, {&(0x7f0000018800)=""/87, 0x57}, {0x0}, {&(0x7f0000019880)=""/230, 0xe6}], 0x7, &(0x7f0000019a00)=""/63, 0x3f}, 0x42) bpf$PROG_LOAD(0x5, &(0x7f0000019b00)={0x0, 0xe, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1fb}, [@exit, @exit, @alu={0x4, 0x2000000000, 0xf, 0xa, 0x6, 0x0, 0x4}, @jmp={0x5, 0x100000000, 0xc, 0x7, 0xb, 0x70, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xed}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map={0x18, 0x9, 0x1, 0x0, r0}, @exit]}, &(0x7f0000000140)='syzkaller\x00', 0x40, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r0, 0x8, &(0x7f0000019a80)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000019ac0)={0x5, 0xd, 0x2, 0xfffffffffffffffa}, 0x10}, 0x70) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000000c0)={0x0, 0x70, 0x5c03f7cb, 0x6, 0xffff, 0x0, 0x0, 0x9, 0x6000, 0x4, 0xfffffffffffffff8, 0x5, 0x8, 0x80000000, 0x100000001, 0x32da, 0x0, 0x400, 0x2, 0x8, 0x5d, 0x76, 0x0, 0x401, 0x40, 0x1, 0x3a, 0x7, 0x8, 0x1c04, 0x9, 0x0, 0x0, 0x800, 0x3f, 0x7f, 0x9, 0x7, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x4}, 0x1000, 0x2, 0x6, 0x0, 0xff, 0x7}) socketpair(0x25, 0x5, 0x3, &(0x7f0000000040)) 09:06:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400), 0x0, 0x0, 0xffffffffffffff14}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:06:58 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x100000001, 0x100000000000913, 0x6}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000012c0)={r0, &(0x7f0000000280), 0x0}, 0x18) 09:06:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x100000001, 0x100000000000913, 0x6}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000012c0)={r0, &(0x7f0000000280), 0x0}, 0x18) 09:06:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400), 0x0, 0x0, 0xffffffffffffff14}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:06:58 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x100000001, 0x100000000000913, 0x6}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000012c0)={r0, &(0x7f0000000280), 0x0}, 0x18) 09:06:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x100000001, 0x100000000000913, 0x6}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000012c0)={r0, &(0x7f0000000280), 0x0}, 0x18) 09:06:59 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000040)=0x1) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={0xffffffffffffffff, r0, 0x13, 0x1}, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 09:06:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400), 0x0, 0x0, 0xffffffffffffff14}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:06:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400), 0x0, 0x0, 0xffffffffffffff14}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 437.740097][ T27] audit: type=1804 audit(1558948019.436:92): pid=19591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir522457843/syzkaller.OLfvXe/8/memory.events" dev="sda1" ino=16561 res=1 [ 437.847107][ T27] audit: type=1800 audit(1558948019.436:93): pid=19591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16561 res=0 09:06:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x1ba, &(0x7f000000cf3d)=""/195}, 0x48) 09:06:59 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x8, &(0x7f0000000040)=r0, 0x4) [ 439.441348][T19611] IPVS: ftp: loaded support on port[0] = 21 [ 439.675517][T19611] chnl_net:caif_netlink_parms(): no params data found [ 439.764841][T19611] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.772009][T19611] bridge0: port 1(bridge_slave_0) entered disabled state [ 439.780519][T19611] device bridge_slave_0 entered promiscuous mode [ 439.825143][T19611] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.832234][T19611] bridge0: port 2(bridge_slave_1) entered disabled state [ 439.844707][T19611] device bridge_slave_1 entered promiscuous mode [ 439.870756][T19611] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 439.882051][T19611] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 439.934559][T19611] team0: Port device team_slave_0 added [ 439.942028][T19611] team0: Port device team_slave_1 added [ 440.006072][T19611] device hsr_slave_0 entered promiscuous mode [ 440.042936][T19611] device hsr_slave_1 entered promiscuous mode [ 440.140784][T19611] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.147904][T19611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.155312][T19611] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.162458][T19611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.275782][T19611] 8021q: adding VLAN 0 to HW filter on device bond0 [ 440.332161][T19611] 8021q: adding VLAN 0 to HW filter on device team0 [ 440.340254][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 440.349215][T14540] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.357565][T14540] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.372072][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 440.457746][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 440.468664][T14540] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.475784][T14540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.484185][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 440.493685][T14540] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.500746][T14540] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.568565][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 440.578014][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 440.594871][T14539] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 440.613834][T19611] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 440.624447][T19611] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 440.690176][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 440.700889][T14540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 440.723633][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 440.735553][T19611] 8021q: adding VLAN 0 to HW filter on device batadv0 09:07:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x1ba, &(0x7f000000cf3d)=""/195}, 0x48) 09:07:02 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x2}, 0xc) recvmsg(0xffffffffffffffff, &(0x7f0000019a40)={&(0x7f0000017400)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000019980)=[{0x0}, {&(0x7f0000018580)=""/71, 0x47}, {&(0x7f0000018600)=""/250, 0xfa}, {&(0x7f0000018700)=""/233, 0xe9}, {&(0x7f0000018800)=""/87, 0x57}, {0x0}, {&(0x7f0000019880)=""/230, 0xe6}], 0x7, &(0x7f0000019a00)=""/63, 0x3f}, 0x42) bpf$PROG_LOAD(0x5, &(0x7f0000019b00)={0x0, 0xe, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1fb}, [@exit, @exit, @alu={0x4, 0x2000000000, 0xf, 0xa, 0x6, 0x0, 0x4}, @jmp={0x5, 0x100000000, 0xc, 0x7, 0xb, 0x70, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xed}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @map={0x18, 0x9, 0x1, 0x0, r0}, @exit]}, &(0x7f0000000140)='syzkaller\x00', 0x40, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r0, 0x8, &(0x7f0000019a80)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000019ac0)={0x5, 0xd, 0x2, 0xfffffffffffffffa}, 0x10}, 0x70) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000000c0)={0x0, 0x70, 0x5c03f7cb, 0x6, 0xffff, 0x0, 0x0, 0x9, 0x6000, 0x4, 0xfffffffffffffff8, 0x5, 0x8, 0x80000000, 0x100000001, 0x32da, 0x0, 0x400, 0x2, 0x8, 0x5d, 0x76, 0x0, 0x401, 0x40, 0x1, 0x3a, 0x7, 0x8, 0x1c04, 0x9, 0x0, 0x0, 0x800, 0x3f, 0x7f, 0x9, 0x7, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x4}, 0x1000, 0x2, 0x6, 0x0, 0xff, 0x7}) socketpair(0x25, 0x5, 0x3, &(0x7f0000000040)) 09:07:02 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x8, &(0x7f0000000040)=r0, 0x4) 09:07:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400), 0x0, 0x0, 0xffffffffffffff14}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:07:02 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000040)=0x1) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={0xffffffffffffffff, r0, 0x13, 0x1}, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 09:07:02 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000040)=0x1) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={0xffffffffffffffff, r0, 0x13, 0x1}, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 09:07:02 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x8, &(0x7f0000000040)=r0, 0x4) 09:07:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x1ba, &(0x7f000000cf3d)=""/195}, 0x48) 09:07:03 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x8, &(0x7f0000000040)=r0, 0x4) 09:07:03 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000040)=0x1) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={0xffffffffffffffff, r0, 0x13, 0x1}, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 09:07:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00003c9733f5f087110008abca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702000000000000", 0x39}], 0x1}, 0x0) 09:07:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x1ba, &(0x7f000000cf3d)=""/195}, 0x48) 09:07:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00003c9733f5f087110008abca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702000000000000", 0x39}], 0x1}, 0x0) [ 441.694883][ T27] audit: type=1804 audit(1558948023.396:94): pid=19655 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir362155096/syzkaller.KqwjjA/4/memory.events" dev="sda1" ino=16737 res=1 09:07:03 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000200081ae00060c00000f000002000000000000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) [ 441.958909][ T27] audit: type=1800 audit(1558948023.416:95): pid=19655 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16737 res=0 [ 442.008114][T19666] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.3'. [ 442.022978][ T27] audit: type=1804 audit(1558948023.626:96): pid=19636 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir037308249/syzkaller.KNyANB/7/memory.events" dev="sda1" ino=16672 res=1 09:07:03 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000040)=0x1) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={0xffffffffffffffff, r0, 0x13, 0x1}, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 09:07:03 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000040)=0x1) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={0xffffffffffffffff, r0, 0x13, 0x1}, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 09:07:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00003c9733f5f087110008abca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702000000000000", 0x39}], 0x1}, 0x0) 09:07:03 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) 09:07:03 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000040)=0x1) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={0xffffffffffffffff, r0, 0x13, 0x1}, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) [ 442.122874][ T27] audit: type=1800 audit(1558948023.626:97): pid=19636 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16672 res=0 09:07:03 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000200081ae00060c00000f000002000000000000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) [ 442.302741][ T27] audit: type=1804 audit(1558948023.646:98): pid=19635 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir522457843/syzkaller.OLfvXe/9/memory.events" dev="sda1" ino=16638 res=1 [ 442.489503][ T27] audit: type=1800 audit(1558948023.646:99): pid=19635 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16638 res=0 [ 442.525577][T19689] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.3'. 09:07:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="39000000140081ae00003c9733f5f087110008abca9b4e7d0f6298db85d0b0e62bdbb7d553b4e921556b3d5df500c250825702000000000000", 0x39}], 0x1}, 0x0) [ 442.564192][T19671] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 442.630819][T19671] CPU: 1 PID: 19671 Comm: syz-executor.0 Not tainted 5.2.0-rc1+ #6 [ 442.638750][T19671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.648809][T19671] Call Trace: [ 442.652117][T19671] dump_stack+0x172/0x1f0 [ 442.656466][T19671] dump_header+0x10f/0xb6c [ 442.660903][T19671] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 442.666725][T19671] ? ___ratelimit+0x60/0x595 [ 442.671322][T19671] ? do_raw_spin_unlock+0x57/0x270 [ 442.676455][T19671] oom_kill_process.cold+0x10/0x15 [ 442.681584][T19671] out_of_memory+0x79a/0x1280 [ 442.686288][T19671] ? retint_kernel+0x2b/0x2b [ 442.690902][T19671] ? oom_killer_disable+0x280/0x280 [ 442.696120][T19671] mem_cgroup_out_of_memory+0x1ca/0x230 [ 442.701702][T19671] ? memcg_event_wake+0x230/0x230 [ 442.706746][T19671] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 442.712562][T19671] ? cgroup_file_notify+0x140/0x1b0 [ 442.717774][T19671] memory_max_write+0x169/0x300 [ 442.722655][T19671] ? mem_cgroup_write+0x360/0x360 09:07:04 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000040)=0x1) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={0xffffffffffffffff, r0, 0x13, 0x1}, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) [ 442.727691][T19671] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 442.733169][T19671] cgroup_file_write+0x241/0x790 [ 442.738147][T19671] ? mem_cgroup_write+0x360/0x360 [ 442.743188][T19671] ? kill_css+0x380/0x380 [ 442.747543][T19671] ? kill_css+0x380/0x380 [ 442.751884][T19671] kernfs_fop_write+0x2b8/0x480 [ 442.756752][T19671] __vfs_write+0x8a/0x110 [ 442.761093][T19671] ? kernfs_fop_open+0xd80/0xd80 [ 442.766051][T19671] vfs_write+0x20c/0x580 [ 442.770318][T19671] ksys_write+0x14f/0x290 [ 442.774678][T19671] ? __ia32_sys_read+0xb0/0xb0 [ 442.779465][T19671] ? do_syscall_64+0x26/0x680 [ 442.784153][T19671] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.790232][T19671] ? do_syscall_64+0x26/0x680 [ 442.794922][T19671] __x64_sys_write+0x73/0xb0 [ 442.799519][T19671] do_syscall_64+0xfd/0x680 [ 442.804030][T19671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.804043][T19671] RIP: 0033:0x459279 [ 442.804058][T19671] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 442.804066][T19671] RSP: 002b:00007f2ac8a11c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 442.804087][T19671] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 442.849848][T19671] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 442.857833][T19671] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 442.865811][T19671] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2ac8a126d4 [ 442.873799][T19671] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff 09:07:04 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000200081ae00060c00000f000002000000000000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) [ 442.946106][ T27] audit: type=1804 audit(1558948024.186:100): pid=19677 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir037308249/syzkaller.KNyANB/8/memory.events" dev="sda1" ino=16654 res=1 [ 443.066610][T19701] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.3'. [ 443.086320][ T27] audit: type=1800 audit(1558948024.186:101): pid=19677 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16654 res=0 09:07:04 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000200081ae00060c00000f000002000000000000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 09:07:04 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000040)=0x1) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={0xffffffffffffffff, r0, 0x13, 0x1}, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) [ 443.201481][ T27] audit: type=1804 audit(1558948024.606:102): pid=19680 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir362155096/syzkaller.KqwjjA/5/memory.events" dev="sda1" ino=16644 res=1 09:07:04 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000200081ae00060c00000f000002000000000000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) [ 443.362463][T19671] memory: usage 7932kB, limit 0kB, failcnt 39 [ 443.368700][T19671] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 443.386152][T19707] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. [ 443.423582][T19671] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 443.451630][ T27] audit: type=1800 audit(1558948024.606:103): pid=19680 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16644 res=0 [ 443.483434][T19671] Memory cgroup stats for /syz0: cache:140KB rss:2240KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2176KB inactive_file:132KB active_file:0KB unevictable:0KB [ 443.510354][ T27] audit: type=1804 audit(1558948024.716:104): pid=19696 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir037308249/syzkaller.KNyANB/9/memory.events" dev="sda1" ino=16651 res=1 [ 443.536146][T19671] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=19669,uid=0 [ 443.553066][T19671] Memory cgroup out of memory: Killed process 19669 (syz-executor.0) total-vm:72708kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 443.567253][ T27] audit: type=1800 audit(1558948024.716:105): pid=19696 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16651 res=0 [ 443.591966][ T1041] oom_reaper: reaped process 19669 (syz-executor.0), now anon-rss:0kB, file-rss:34784kB, shmem-rss:0kB [ 443.616230][T19712] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.3'. 09:07:05 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000040)=0x1) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={0xffffffffffffffff, r0, 0x13, 0x1}, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 09:07:05 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) 09:07:05 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x89f5, &(0x7f0000000040)={'sit0\x00', @random="a533c0b4ffe4"}) [ 443.623058][ T27] audit: type=1804 audit(1558948025.216:106): pid=19690 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir522457843/syzkaller.OLfvXe/10/memory.events" dev="sda1" ino=16849 res=1 09:07:05 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) 09:07:05 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000200081ae00060c00000f000002000000000000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 09:07:05 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x89f5, &(0x7f0000000040)={'sit0\x00', @random="a533c0b4ffe4"}) [ 443.821432][ T27] audit: type=1800 audit(1558948025.216:107): pid=19690 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16849 res=0 09:07:05 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x89f5, &(0x7f0000000040)={'sit0\x00', @random="a533c0b4ffe4"}) [ 444.116263][T19729] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. 09:07:05 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000200081ae00060c00000f000002000000000000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 09:07:06 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x89f5, &(0x7f0000000040)={'sit0\x00', @random="a533c0b4ffe4"}) [ 444.352917][ T27] audit: type=1804 audit(1558948026.056:108): pid=19713 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir362155096/syzkaller.KqwjjA/6/memory.events" dev="sda1" ino=16950 res=1 09:07:06 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) [ 444.471298][T19736] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. 09:07:06 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) [ 444.506710][ T27] audit: type=1800 audit(1558948026.086:109): pid=19713 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16950 res=0 [ 444.514892][T19725] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 444.645704][T19725] CPU: 0 PID: 19725 Comm: syz-executor.3 Not tainted 5.2.0-rc1+ #6 [ 444.653630][T19725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.663685][T19725] Call Trace: [ 444.666988][T19725] dump_stack+0x172/0x1f0 [ 444.671337][T19725] dump_header+0x10f/0xb6c [ 444.675792][T19725] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 444.681611][T19725] ? ___ratelimit+0x60/0x595 [ 444.686211][T19725] ? do_raw_spin_unlock+0x57/0x270 [ 444.691336][T19725] oom_kill_process.cold+0x10/0x15 [ 444.696460][T19725] out_of_memory+0x79a/0x1280 [ 444.701151][T19725] ? __sched_text_start+0x8/0x8 [ 444.706030][T19725] ? oom_killer_disable+0x280/0x280 [ 444.711254][T19725] mem_cgroup_out_of_memory+0x1ca/0x230 [ 444.716833][T19725] ? memcg_event_wake+0x230/0x230 [ 444.721882][T19725] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 444.727706][T19725] ? cgroup_file_notify+0x140/0x1b0 [ 444.732925][T19725] memory_max_write+0x169/0x300 [ 444.737789][T19725] ? mem_cgroup_write+0x360/0x360 [ 444.742820][T19725] ? lock_acquire+0x1ea/0x3f0 [ 444.747509][T19725] cgroup_file_write+0x241/0x790 [ 444.752458][T19725] ? mem_cgroup_write+0x360/0x360 [ 444.757506][T19725] ? kill_css+0x380/0x380 [ 444.761857][T19725] ? kill_css+0x380/0x380 [ 444.766193][T19725] kernfs_fop_write+0x2b8/0x480 [ 444.771058][T19725] __vfs_write+0x8a/0x110 [ 444.775392][T19725] ? kernfs_fop_open+0xd80/0xd80 [ 444.780353][T19725] vfs_write+0x20c/0x580 [ 444.784661][T19725] ksys_write+0x14f/0x290 [ 444.789005][T19725] ? __ia32_sys_read+0xb0/0xb0 [ 444.793789][T19725] __x64_sys_write+0x73/0xb0 [ 444.798390][T19725] ? do_syscall_64+0x7f/0x680 [ 444.803075][T19725] do_syscall_64+0xfd/0x680 [ 444.807606][T19725] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.813503][T19725] RIP: 0033:0x459279 [ 444.817408][T19725] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 444.837017][T19725] RSP: 002b:00007f6c5386bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 444.845439][T19725] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 444.853416][T19725] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 444.861482][T19725] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 444.869450][T19725] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6c5386c6d4 [ 444.877423][T19725] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff 09:07:06 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) [ 444.894366][T19725] memory: usage 8216kB, limit 0kB, failcnt 37 [ 444.900599][T19725] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 444.908847][T19725] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 444.916405][T19725] Memory cgroup stats for /syz3: cache:76KB rss:2272KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2204KB inactive_file:20KB active_file:0KB unevictable:0KB 09:07:06 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) [ 445.044075][T19725] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=19724,uid=0 [ 445.142576][T19725] Memory cgroup out of memory: Killed process 19725 (syz-executor.3) total-vm:72576kB, anon-rss:2188kB, file-rss:35796kB, shmem-rss:0kB [ 445.200658][ T1041] oom_reaper: reaped process 19725 (syz-executor.3), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 445.212797][T19742] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 445.263124][T19742] CPU: 1 PID: 19742 Comm: syz-executor.2 Not tainted 5.2.0-rc1+ #6 [ 445.271044][T19742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.281103][T19742] Call Trace: [ 445.284438][T19742] dump_stack+0x172/0x1f0 [ 445.288815][T19742] dump_header+0x10f/0xb6c [ 445.293243][T19742] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 445.299060][T19742] ? ___ratelimit+0x60/0x595 [ 445.303658][T19742] ? do_raw_spin_unlock+0x57/0x270 [ 445.308785][T19742] oom_kill_process.cold+0x10/0x15 [ 445.313911][T19742] out_of_memory+0x79a/0x1280 [ 445.318608][T19742] ? oom_killer_disable+0x280/0x280 [ 445.323831][T19742] mem_cgroup_out_of_memory+0x1ca/0x230 [ 445.329388][T19742] ? memcg_event_wake+0x230/0x230 [ 445.334466][T19742] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 445.340307][T19742] ? cgroup_file_notify+0x140/0x1b0 [ 445.345524][T19742] memory_max_write+0x169/0x300 [ 445.350393][T19742] ? mem_cgroup_write+0x360/0x360 [ 445.355439][T19742] ? lock_acquire+0x16f/0x3f0 [ 445.360130][T19742] ? kernfs_fop_write+0x227/0x480 [ 445.365172][T19742] cgroup_file_write+0x241/0x790 [ 445.370126][T19742] ? mem_cgroup_write+0x360/0x360 [ 445.375159][T19742] ? kill_css+0x380/0x380 [ 445.379508][T19742] ? kill_css+0x380/0x380 [ 445.383855][T19742] kernfs_fop_write+0x2b8/0x480 [ 445.388722][T19742] __vfs_write+0x8a/0x110 [ 445.393063][T19742] ? kernfs_fop_open+0xd80/0xd80 [ 445.398010][T19742] vfs_write+0x20c/0x580 [ 445.402475][T19742] ksys_write+0x14f/0x290 [ 445.406860][T19742] ? __ia32_sys_read+0xb0/0xb0 [ 445.411626][T19742] __x64_sys_write+0x73/0xb0 [ 445.416732][T19742] ? do_syscall_64+0x5b/0x680 [ 445.421392][T19742] do_syscall_64+0xfd/0x680 [ 445.425892][T19742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.431771][T19742] RIP: 0033:0x459279 [ 445.435667][T19742] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 445.455256][T19742] RSP: 002b:00007ffa4f2dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 445.463668][T19742] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 445.471677][T19742] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 445.479632][T19742] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 445.487586][T19742] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffa4f2df6d4 [ 445.495539][T19742] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 445.519699][T19742] memory: usage 8540kB, limit 0kB, failcnt 29 [ 445.527895][T19742] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 445.535979][T19742] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 445.543479][T19742] Memory cgroup stats for /syz2: cache:40KB rss:2188KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2188KB inactive_file:60KB active_file:0KB unevictable:0KB [ 445.566209][T19742] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=19740,uid=0 [ 445.589482][T19742] Memory cgroup out of memory: Killed process 19742 (syz-executor.2) total-vm:72576kB, anon-rss:2192kB, file-rss:35788kB, shmem-rss:0kB [ 445.605352][ T1041] oom_reaper: reaped process 19742 (syz-executor.2), now anon-rss:0kB, file-rss:34892kB, shmem-rss:0kB [ 445.617291][T19743] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 445.628950][T19743] CPU: 0 PID: 19743 Comm: syz-executor.4 Not tainted 5.2.0-rc1+ #6 [ 445.636849][T19743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.646919][T19743] Call Trace: [ 445.650232][T19743] dump_stack+0x172/0x1f0 [ 445.654608][T19743] dump_header+0x10f/0xb6c [ 445.659051][T19743] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 445.664863][T19743] ? ___ratelimit+0x60/0x595 [ 445.669463][T19743] oom_kill_process.cold+0x10/0x15 [ 445.674582][T19743] out_of_memory+0x79a/0x1280 [ 445.679298][T19743] ? oom_killer_disable+0x280/0x280 [ 445.684532][T19743] mem_cgroup_out_of_memory+0x1ca/0x230 [ 445.690080][T19743] ? memcg_event_wake+0x230/0x230 [ 445.695120][T19743] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 445.700934][T19743] ? cgroup_file_notify+0x140/0x1b0 [ 445.706141][T19743] memory_max_write+0x169/0x300 [ 445.710994][T19743] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 445.716463][T19743] ? mem_cgroup_write+0x360/0x360 [ 445.721487][T19743] ? lock_acquire+0x16f/0x3f0 [ 445.726168][T19743] ? kernfs_fop_write+0x227/0x480 [ 445.731200][T19743] cgroup_file_write+0x241/0x790 [ 445.736496][T19743] ? mem_cgroup_write+0x360/0x360 [ 445.741523][T19743] ? kill_css+0x380/0x380 [ 445.745865][T19743] ? kill_css+0x380/0x380 [ 445.750194][T19743] kernfs_fop_write+0x2b8/0x480 [ 445.755052][T19743] __vfs_write+0x8a/0x110 [ 445.759383][T19743] ? kernfs_fop_open+0xd80/0xd80 [ 445.764329][T19743] vfs_write+0x20c/0x580 [ 445.768578][T19743] ksys_write+0x14f/0x290 [ 445.772941][T19743] ? __ia32_sys_read+0xb0/0xb0 [ 445.777719][T19743] __x64_sys_write+0x73/0xb0 [ 445.782319][T19743] do_syscall_64+0xfd/0x680 [ 445.786844][T19743] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.792739][T19743] RIP: 0033:0x459279 [ 445.796643][T19743] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 445.816253][T19743] RSP: 002b:00007f4b63a24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 445.824671][T19743] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 445.832647][T19743] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 445.840618][T19743] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 445.848595][T19743] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b63a256d4 [ 445.856569][T19743] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 445.887236][T19743] memory: usage 8604kB, limit 0kB, failcnt 20 [ 445.898040][T19743] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 445.906696][T19743] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 445.916463][T19743] Memory cgroup stats for /syz4: cache:76KB rss:2280KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2212KB inactive_file:0KB active_file:0KB unevictable:0KB [ 445.950851][T19743] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=19741,uid=0 [ 445.976934][T19743] Memory cgroup out of memory: Killed process 19741 (syz-executor.4) total-vm:72576kB, anon-rss:2148kB, file-rss:34816kB, shmem-rss:0kB [ 445.995523][ T1041] oom_reaper: reaped process 19741 (syz-executor.4), now anon-rss:0kB, file-rss:34824kB, shmem-rss:0kB [ 446.002469][T19749] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 446.124738][T19749] CPU: 1 PID: 19749 Comm: syz-executor.1 Not tainted 5.2.0-rc1+ #6 [ 446.132672][T19749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.142733][T19749] Call Trace: [ 446.146050][T19749] dump_stack+0x172/0x1f0 [ 446.150404][T19749] dump_header+0x10f/0xb6c [ 446.154836][T19749] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 446.160661][T19749] ? ___ratelimit+0x60/0x595 [ 446.165263][T19749] ? do_raw_spin_unlock+0x57/0x270 [ 446.170387][T19749] oom_kill_process.cold+0x10/0x15 [ 446.175516][T19749] out_of_memory+0x79a/0x1280 [ 446.180206][T19749] ? oom_killer_disable+0x280/0x280 [ 446.185428][T19749] mem_cgroup_out_of_memory+0x1ca/0x230 [ 446.190980][T19749] ? memcg_event_wake+0x230/0x230 [ 446.196134][T19749] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 446.202443][T19749] ? cgroup_file_notify+0x140/0x1b0 [ 446.208129][T19749] memory_max_write+0x169/0x300 [ 446.212999][T19749] ? mem_cgroup_write+0x360/0x360 [ 446.218041][T19749] ? mem_cgroup_write+0x360/0x360 [ 446.223070][T19749] ? cgroup_file_write+0x1e2/0x790 [ 446.228417][T19749] cgroup_file_write+0x241/0x790 [ 446.233365][T19749] ? mem_cgroup_write+0x360/0x360 [ 446.238395][T19749] ? kill_css+0x380/0x380 [ 446.242768][T19749] ? kill_css+0x380/0x380 [ 446.247115][T19749] kernfs_fop_write+0x2b8/0x480 [ 446.251975][T19749] __vfs_write+0x8a/0x110 [ 446.256336][T19749] ? kernfs_fop_open+0xd80/0xd80 [ 446.261283][T19749] vfs_write+0x20c/0x580 [ 446.265540][T19749] ksys_write+0x14f/0x290 [ 446.269878][T19749] ? __ia32_sys_read+0xb0/0xb0 [ 446.274658][T19749] ? do_syscall_64+0x26/0x680 [ 446.279352][T19749] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.285430][T19749] ? do_syscall_64+0x26/0x680 [ 446.290121][T19749] __x64_sys_write+0x73/0xb0 [ 446.294722][T19749] do_syscall_64+0xfd/0x680 [ 446.299239][T19749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.305131][T19749] RIP: 0033:0x459279 [ 446.309150][T19749] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 446.328861][T19749] RSP: 002b:00007fa7e9cbbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 446.337274][T19749] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 446.345237][T19749] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 446.353188][T19749] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 446.361141][T19749] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa7e9cbc6d4 [ 446.369095][T19749] R13: 00000000004c8e79 R14: 00000000004dfac8 R15: 00000000ffffffff [ 446.384224][T19749] memory: usage 7188kB, limit 0kB, failcnt 29 [ 446.390311][T19749] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 446.397867][T19749] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 446.404822][T19749] Memory cgroup stats for /syz1: cache:20KB rss:2160KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2160KB inactive_file:0KB active_file:0KB unevictable:0KB [ 446.426239][T19749] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=19748,uid=0 [ 446.442312][T19749] Memory cgroup out of memory: Killed process 19749 (syz-executor.1) total-vm:72576kB, anon-rss:2192kB, file-rss:35784kB, shmem-rss:0kB [ 446.459728][ T1041] oom_reaper: reaped process 19749 (syz-executor.1), now anon-rss:0kB, file-rss:34824kB, shmem-rss:0kB [ 484.154905][ T2529] device bridge_slave_1 left promiscuous mode [ 484.161162][ T2529] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.265315][ T2529] device bridge_slave_0 left promiscuous mode [ 484.271553][ T2529] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.376806][ T2529] device bridge_slave_1 left promiscuous mode [ 484.388608][ T2529] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.476127][ T2529] device bridge_slave_0 left promiscuous mode [ 484.482343][ T2529] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.584027][ T2529] device bridge_slave_1 left promiscuous mode [ 484.590247][ T2529] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.693572][ T2529] device bridge_slave_0 left promiscuous mode [ 484.699837][ T2529] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.784150][ T2529] device bridge_slave_1 left promiscuous mode [ 484.790382][ T2529] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.879557][ T2529] device bridge_slave_0 left promiscuous mode [ 484.893652][ T2529] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.954224][ T2529] device bridge_slave_1 left promiscuous mode [ 484.960448][ T2529] bridge0: port 2(bridge_slave_1) entered disabled state [ 485.093375][ T2529] device bridge_slave_0 left promiscuous mode [ 485.099601][ T2529] bridge0: port 1(bridge_slave_0) entered disabled state [ 485.210631][ T2529] device bridge_slave_1 left promiscuous mode [ 485.226058][ T2529] bridge0: port 2(bridge_slave_1) entered disabled state [ 485.313329][ T2529] device bridge_slave_0 left promiscuous mode [ 485.319560][ T2529] bridge0: port 1(bridge_slave_0) entered disabled state [ 485.414453][ T2529] device bridge_slave_1 left promiscuous mode [ 485.420681][ T2529] bridge0: port 2(bridge_slave_1) entered disabled state [ 485.512864][ T2529] device bridge_slave_0 left promiscuous mode [ 485.519096][ T2529] bridge0: port 1(bridge_slave_0) entered disabled state [ 485.613862][ T2529] device bridge_slave_1 left promiscuous mode [ 485.620091][ T2529] bridge0: port 2(bridge_slave_1) entered disabled state [ 485.721040][ T2529] device bridge_slave_0 left promiscuous mode [ 485.729357][ T2529] bridge0: port 1(bridge_slave_0) entered disabled state [ 485.814087][ T2529] device bridge_slave_1 left promiscuous mode [ 485.820345][ T2529] bridge0: port 2(bridge_slave_1) entered disabled state [ 485.884333][ T2529] device bridge_slave_0 left promiscuous mode [ 485.890563][ T2529] bridge0: port 1(bridge_slave_0) entered disabled state [ 485.989560][ T2529] device bridge_slave_1 left promiscuous mode [ 486.006031][ T2529] bridge0: port 2(bridge_slave_1) entered disabled state [ 486.083407][ T2529] device bridge_slave_0 left promiscuous mode [ 486.089631][ T2529] bridge0: port 1(bridge_slave_0) entered disabled state [ 486.165276][ T2529] device bridge_slave_1 left promiscuous mode [ 486.171499][ T2529] bridge0: port 2(bridge_slave_1) entered disabled state [ 486.233896][ T2529] device bridge_slave_0 left promiscuous mode [ 486.240143][ T2529] bridge0: port 1(bridge_slave_0) entered disabled state [ 486.314015][ T2529] device bridge_slave_1 left promiscuous mode [ 486.320235][ T2529] bridge0: port 2(bridge_slave_1) entered disabled state [ 486.412990][ T2529] device bridge_slave_0 left promiscuous mode [ 486.419213][ T2529] bridge0: port 1(bridge_slave_0) entered disabled state [ 486.494389][ T2529] device bridge_slave_1 left promiscuous mode [ 486.500634][ T2529] bridge0: port 2(bridge_slave_1) entered disabled state [ 486.592964][ T2529] device bridge_slave_0 left promiscuous mode [ 486.599188][ T2529] bridge0: port 1(bridge_slave_0) entered disabled state [ 486.687282][ T2529] device bridge_slave_1 left promiscuous mode [ 486.707199][ T2529] bridge0: port 2(bridge_slave_1) entered disabled state [ 486.783138][ T2529] device bridge_slave_0 left promiscuous mode [ 486.789369][ T2529] bridge0: port 1(bridge_slave_0) entered disabled state [ 486.874489][ T2529] device bridge_slave_1 left promiscuous mode [ 486.880723][ T2529] bridge0: port 2(bridge_slave_1) entered disabled state [ 486.972892][ T2529] device bridge_slave_0 left promiscuous mode [ 486.979123][ T2529] bridge0: port 1(bridge_slave_0) entered disabled state [ 625.285690][ T2529] device hsr_slave_1 left promiscuous mode [ 625.330849][ T2529] device hsr_slave_0 left promiscuous mode [ 625.410160][ T2529] team0 (unregistering): Port device team_slave_1 removed [ 625.473672][ T2529] team0 (unregistering): Port device team_slave_0 removed [ 625.532794][ T2529] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 625.594690][ T2529] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 625.829256][ T2529] bond0 (unregistering): Released all slaves [ 626.006628][ T2529] device hsr_slave_1 left promiscuous mode [ 626.074921][ T2529] device hsr_slave_0 left promiscuous mode [ 626.125580][ T2529] team0 (unregistering): Port device team_slave_1 removed [ 626.203222][ T2529] team0 (unregistering): Port device team_slave_0 removed [ 626.243613][ T2529] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 626.304745][ T2529] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 626.589777][ T2529] bond0 (unregistering): Released all slaves [ 626.773598][ T2529] device hsr_slave_1 left promiscuous mode [ 626.830669][ T2529] device hsr_slave_0 left promiscuous mode [ 626.906246][ T2529] team0 (unregistering): Port device team_slave_1 removed [ 626.945839][ T2529] team0 (unregistering): Port device team_slave_0 removed [ 627.013910][ T2529] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 627.075701][ T2529] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 627.341719][ T2529] bond0 (unregistering): Released all slaves [ 627.546514][ T2529] device hsr_slave_1 left promiscuous mode [ 627.604537][ T2529] device hsr_slave_0 left promiscuous mode [ 627.665035][ T2529] team0 (unregistering): Port device team_slave_1 removed [ 627.733463][ T2529] team0 (unregistering): Port device team_slave_0 removed [ 627.795634][ T2529] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 627.901872][ T2529] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 628.136489][ T2529] bond0 (unregistering): Released all slaves [ 628.334162][ T2529] device hsr_slave_1 left promiscuous mode [ 628.402456][ T2529] device hsr_slave_0 left promiscuous mode [ 628.444883][ T2529] team0 (unregistering): Port device team_slave_1 removed [ 628.488518][ T2529] team0 (unregistering): Port device team_slave_0 removed [ 628.547192][ T2529] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 628.616918][ T2529] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 628.867069][ T2529] bond0 (unregistering): Released all slaves [ 629.012828][ T1040] INFO: task kworker/0:3:8831 blocked for more than 143 seconds. [ 629.021009][ T1040] Not tainted 5.2.0-rc1+ #6 [ 629.026337][ T2529] kobject: 'rx-0' (0000000042ced442): kobject_cleanup, parent 000000007b341691 [ 629.044113][ T2529] kobject: 'rx-0' (0000000042ced442): auto cleanup 'remove' event [ 629.051958][ T2529] kobject: 'rx-0' (0000000042ced442): kobject_uevent_env [ 629.069495][ T1040] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 629.101032][ T1040] kworker/0:3 D26528 8831 2 0x80004000 [ 629.113467][ T2529] kobject: 'rx-0' (0000000042ced442): kobject_uevent_env: uevent_suppress caused the event to drop! [ 629.124672][ T1040] Workqueue: events linkwatch_event [ 629.129896][ T1040] Call Trace: [ 629.155457][ T1040] __schedule+0x7cb/0x1560 [ 629.159930][ T1040] ? __sched_text_start+0x8/0x8 [ 629.160674][ T2529] kobject: 'rx-0' (0000000042ced442): auto cleanup kobject_del [ 629.195396][ T1040] ? kasan_check_read+0x11/0x20 [ 629.200290][ T1040] ? _raw_spin_unlock_irq+0x5e/0x90 [ 629.203115][ T2529] kobject: 'rx-0' (0000000042ced442): calling ktype release [ 629.238623][ T2529] kobject: 'rx-0': free name [ 629.243064][ T1040] schedule+0xa8/0x260 [ 629.247320][ T1040] schedule_preempt_disabled+0x13/0x20 [ 629.256184][ T2529] kobject: 'tx-0' (00000000df6cf2d6): kobject_cleanup, parent 000000007b341691 [ 629.283612][ T1040] __mutex_lock+0x726/0x1310 [ 629.288240][ T2529] kobject: 'tx-0' (00000000df6cf2d6): auto cleanup 'remove' event [ 629.288275][ T1040] ? rtnl_lock+0x17/0x20 [ 629.316760][ T2529] kobject: 'tx-0' (00000000df6cf2d6): kobject_uevent_env [ 629.343221][ T2529] kobject: 'tx-0' (00000000df6cf2d6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 629.358410][ T1040] ? mutex_trylock+0x1e0/0x1e0 [ 629.375864][ T1040] ? process_one_work+0x890/0x1790 [ 629.381001][ T1040] ? find_held_lock+0x35/0x130 [ 629.397696][ T2529] kobject: 'tx-0' (00000000df6cf2d6): auto cleanup kobject_del [ 629.419670][ T1040] ? process_one_work+0x890/0x1790 [ 629.430702][ T2529] kobject: 'tx-0' (00000000df6cf2d6): calling ktype release [ 629.446380][ T1040] mutex_lock_nested+0x16/0x20 [ 629.451168][ T1040] ? mutex_lock_nested+0x16/0x20 [ 629.472754][ T2529] kobject: 'tx-0': free name [ 629.477394][ T2529] kobject: 'queues' (000000007b341691): kobject_cleanup, parent 00000000797ebfa3 [ 629.482085][ T1040] rtnl_lock+0x17/0x20 [ 629.502858][ T1040] linkwatch_event+0xf/0x70 [ 629.507390][ T1040] process_one_work+0x989/0x1790 [ 629.512348][ T1040] ? pwq_dec_nr_in_flight+0x320/0x320 [ 629.524929][ T2529] kobject: 'queues' (000000007b341691): calling ktype release [ 629.547282][ T1040] ? lock_acquire+0x16f/0x3f0 [ 629.551997][ T1040] worker_thread+0x98/0xe40 [ 629.571458][ T2529] kobject: 'queues' (000000007b341691): kset_release [ 629.586812][ T1040] kthread+0x354/0x420 [ 629.590909][ T1040] ? process_one_work+0x1790/0x1790 [ 629.605282][ T2529] kobject: 'queues': free name [ 629.610709][ T2529] kobject: 'bridge0' (0000000028ea0351): kobject_uevent_env [ 629.621558][ T1040] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 629.644637][ T1040] ret_from_fork+0x24/0x30 [ 629.649127][ T1040] INFO: task kworker/0:6:14540 blocked for more than 143 seconds. [ 629.663609][ T2529] kobject: 'bridge0' (0000000028ea0351): kobject_uevent_env: uevent_suppress caused the event to drop! [ 629.694813][ T1040] Not tainted 5.2.0-rc1+ #6 [ 629.699850][ T1040] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 629.705365][ T2529] kobject: 'rx-0' (00000000ae926c65): kobject_cleanup, parent 00000000ab3ac724 [ 629.746194][ T1040] kworker/0:6 D26296 14540 2 0x80004000 [ 629.756879][ T2529] kobject: 'rx-0' (00000000ae926c65): auto cleanup 'remove' event [ 629.769584][ T1040] Workqueue: events switchdev_deferred_process_work [ 629.793580][ T1040] Call Trace: [ 629.796916][ T1040] __schedule+0x7cb/0x1560 [ 629.801351][ T1040] ? __sched_text_start+0x8/0x8 [ 629.804301][ T2529] kobject: 'rx-0' (00000000ae926c65): kobject_uevent_env [ 629.839027][ T1040] ? kasan_check_read+0x11/0x20 [ 629.847150][ T2529] kobject: 'rx-0' (00000000ae926c65): kobject_uevent_env: uevent_suppress caused the event to drop! [ 629.856641][ T1040] ? _raw_spin_unlock_irq+0x5e/0x90 [ 629.884542][ T1040] schedule+0xa8/0x260 [ 629.888644][ T1040] schedule_preempt_disabled+0x13/0x20 [ 629.895392][ T2529] kobject: 'rx-0' (00000000ae926c65): auto cleanup kobject_del [ 629.922636][ T2529] kobject: 'rx-0' (00000000ae926c65): calling ktype release [ 629.929950][ T2529] kobject: 'rx-0': free name [ 629.945332][ T1040] __mutex_lock+0x726/0x1310 [ 629.949957][ T1040] ? rtnl_lock+0x17/0x20 [ 629.977214][ T1040] ? mutex_trylock+0x1e0/0x1e0 [ 629.982025][ T1040] ? process_one_work+0x890/0x1790 [ 629.985107][ T2529] kobject: 'tx-0' (0000000043ce261c): kobject_cleanup, parent 00000000ab3ac724 [ 630.014475][ T1040] ? find_held_lock+0x35/0x130 [ 630.019962][ T1040] ? process_one_work+0x890/0x1790 [ 630.031427][ T2529] kobject: 'tx-0' (0000000043ce261c): auto cleanup 'remove' event [ 630.059702][ T2529] kobject: 'tx-0' (0000000043ce261c): kobject_uevent_env [ 630.067931][ T1040] mutex_lock_nested+0x16/0x20 [ 630.085803][ T2529] kobject: 'tx-0' (0000000043ce261c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 630.099226][ T1040] ? mutex_lock_nested+0x16/0x20 [ 630.119612][ T1040] rtnl_lock+0x17/0x20 [ 630.135599][ T1040] switchdev_deferred_process_work+0xe/0x20 [ 630.141537][ T1040] process_one_work+0x989/0x1790 [ 630.147247][ T2529] kobject: 'tx-0' (0000000043ce261c): auto cleanup kobject_del [ 630.174511][ T2529] kobject: 'tx-0' (0000000043ce261c): calling ktype release [ 630.181822][ T2529] kobject: 'tx-0': free name [ 630.195057][ T1040] ? pwq_dec_nr_in_flight+0x320/0x320 [ 630.200469][ T1040] ? lock_acquire+0x16f/0x3f0 [ 630.231613][ T1040] worker_thread+0x98/0xe40 [ 630.233779][ T2529] kobject: 'queues' (00000000ab3ac724): kobject_cleanup, parent 00000000797ebfa3 [ 630.248582][ T1040] kthread+0x354/0x420 [ 630.264578][ T1040] ? process_one_work+0x1790/0x1790 [ 630.269807][ T1040] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 630.287230][ T2529] kobject: 'queues' (00000000ab3ac724): calling ktype release [ 630.314240][ T2529] kobject: 'queues' (00000000ab3ac724): kset_release [ 630.315101][ T1040] ret_from_fork+0x24/0x30 [ 630.320950][ T2529] kobject: 'queues': free name [ 630.359084][ T1040] [ 630.359084][ T1040] Showing all locks held in the system: [ 630.359726][ T2529] kobject: 'lo' (000000001272db1c): kobject_uevent_env [ 630.387864][ T1040] 1 lock held by khungtaskd/1040: [ 630.407632][ T1040] #0: 0000000030728d93 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 630.425891][ T2529] kobject: 'lo' (000000001272db1c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 630.453349][ T1040] 4 locks held by kworker/u4:3/2529: [ 630.458701][ T1040] 1 lock held by rsyslogd/8668: [ 630.477430][ T2529] kobject: 'batman_adv' (00000000c8d465bc): kobject_uevent_env [ 630.499704][ T1040] #0: 00000000b1c97469 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 630.518131][ T2529] kobject: 'batman_adv' (00000000c8d465bc): kobject_uevent_env: filter function caused the event to drop! [ 630.543798][ T1040] 2 locks held by getty/8779: [ 630.548512][ T1040] #0: 00000000c90984f8 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 630.568918][ T2529] kobject: 'batman_adv' (00000000c8d465bc): kobject_cleanup, parent 00000000797ebfa3 [ 630.593233][ T1040] #1: 000000007fa3c317 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 630.615477][ T2529] kobject: 'batman_adv' (00000000c8d465bc): calling ktype release [ 630.628415][ T1040] 2 locks held by getty/8780: [ 630.643760][ T2529] kobject: (00000000c8d465bc): dynamic_kobj_release [ 630.648510][ T1040] #0: 0000000015ff378e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 630.650380][ T2529] kobject: 'batman_adv': free name [ 630.699530][ T1040] #1: 0000000000e6b6d4 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 630.746190][ T1040] 2 locks held by getty/8781: [ 630.750907][ T1040] #0: 00000000dd2598f4 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 630.795761][ T1040] #1: 00000000389dba14 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 630.830543][ T1040] 2 locks held by getty/8782: [ 630.851664][ T1040] #0: 00000000eda9b50f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 630.884076][ T1040] #1: 0000000092c6df1b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 630.919549][ T1040] 2 locks held by getty/8783: [ 630.936635][ T1040] #0: 00000000a229e02b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 630.968928][ T1040] #1: 00000000984b1817 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 631.003448][ T1040] 2 locks held by getty/8784: [ 631.048899][ T1040] #0: 000000005ecebe6b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 631.081380][ T1040] #1: 00000000c2220f6d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 631.116159][ T1040] 2 locks held by getty/8785: [ 631.120878][ T1040] #0: 0000000057f6fa0b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 631.165571][ T1040] #1: 00000000c3635ad6 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 631.200820][ T1040] 3 locks held by kworker/0:3/8831: [ 631.220388][ T1040] #0: 000000004fc32041 ((wq_completion)events){+.+.}, at: process_one_work+0x87e/0x1790 [ 631.255781][ T1040] #1: 000000005c6b5cbd ((linkwatch_work).work){+.+.}, at: process_one_work+0x8b4/0x1790 [ 631.291525][ T1040] #2: 00000000eafaa8c0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 631.321110][ T1040] 3 locks held by kworker/u4:6/8894: [ 631.340391][ T1040] 2 locks held by kworker/1:6/14503: [ 631.359776][ T1040] #0: 000000006ecedf27 (&rq->lock){-.-.}, at: __schedule+0x1f5/0x1560 [ 631.389754][ T1040] #1: 0000000030728d93 (rcu_read_lock){....}, at: update_curr+0x2ce/0x8a0 [ 631.420887][ T1040] 3 locks held by kworker/0:5/14539: [ 631.441466][ T1040] #0: 0000000078956349 ((wq_completion)ipv6_addrconf){+.+.}, at: process_one_work+0x87e/0x1790 [ 631.479715][ T1040] #1: 000000009db1a1f9 ((addr_chk_work).work){+.+.}, at: process_one_work+0x8b4/0x1790 [ 631.515375][ T1040] #2: 00000000eafaa8c0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 631.544542][ T1040] 3 locks held by kworker/0:6/14540: [ 631.549874][ T1040] #0: 000000004fc32041 ((wq_completion)events){+.+.}, at: process_one_work+0x87e/0x1790 [ 631.599699][ T1040] #1: 00000000cc3a1930 (deferred_process_work){+.+.}, at: process_one_work+0x8b4/0x1790 [ 631.635064][ T1040] #2: 00000000eafaa8c0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 631.664279][ T1040] 2 locks held by syz-executor.4/19435: [ 631.669907][ T1040] 2 locks held by syz-executor.1/19443: [ 631.705332][ T1040] 1 lock held by syz-executor.0/19444: [ 631.710824][ T1040] #0: 00000000eafaa8c0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 631.754092][ T1040] 3 locks held by syz-executor.3/19445: [ 631.759680][ T1040] 2 locks held by syz-executor.5/19611: [ 631.793818][ T1040] [ 631.796179][ T1040] ============================================= [ 631.796179][ T1040] [ 631.822599][ T2529] kobject: 'rx-0' (00000000f0c9270a): kobject_cleanup, parent 000000003231232b [ 631.831565][ T2529] kobject: 'rx-0' (00000000f0c9270a): auto cleanup 'remove' event [ 631.833300][ T1040] NMI backtrace for cpu 0 [ 631.843921][ T1040] CPU: 0 PID: 1040 Comm: khungtaskd Not tainted 5.2.0-rc1+ #6 [ 631.851385][ T1040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.861495][ T1040] Call Trace: [ 631.864809][ T1040] dump_stack+0x172/0x1f0 [ 631.869158][ T1040] nmi_cpu_backtrace.cold+0x63/0xa4 [ 631.874211][ T2529] kobject: 'rx-0' (00000000f0c9270a): kobject_uevent_env [ 631.874374][ T1040] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 631.881388][ T2529] kobject: 'rx-0' (00000000f0c9270a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 631.887009][ T1040] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 631.887036][ T1040] arch_trigger_cpumask_backtrace+0x14/0x20 [ 631.887050][ T1040] watchdog+0x9b7/0xec0 [ 631.887074][ T1040] kthread+0x354/0x420 [ 631.917960][ T1040] ? reset_hung_task_detector+0x30/0x30 [ 631.923512][ T1040] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 631.929847][ T1040] ret_from_fork+0x24/0x30 [ 631.934336][ T1040] Sending NMI from CPU 0 to CPUs 1: [ 631.941030][ C1] INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 1.233 msecs [ 631.941673][ T1040] NMI backtrace for cpu 1 [ 631.941680][ T1040] CPU: 1 PID: 19443 Comm: syz-executor.1 Not tainted 5.2.0-rc1+ #6 [ 631.941688][ T1040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.941694][ T1040] RIP: 0010:__lock_acquire+0xb1c/0x5490 [ 631.941707][ T1040] Code: ff 0f 84 f9 d2 00 00 45 31 ff 48 b8 00 00 00 00 00 fc ff df 48 03 84 24 90 00 00 00 48 c7 00 00 00 00 00 c7 40 08 00 00 00 00 <48> c7 40 10 00 00 00 00 44 89 f8 48 8b 9c 24 78 01 00 00 65 48 33 [ 631.941712][ T1040] RSP: 0018:ffff888062ffec10 EFLAGS: 00000086 [ 631.941721][ T1040] RAX: ffffed100c5ffd96 RBX: ffffffff8a2ee6b0 RCX: ffff888071f66a40 [ 631.941728][ T1040] RDX: 1ffff1100e3ecd47 RSI: 0000000000000001 RDI: ffffffff8a2ee6f0 [ 631.941734][ T1040] RBP: ffff888062ffedb8 R08: 000000006aa232c8 R09: ffff888071f66a88 [ 631.941739][ T1040] R10: ffff888071f66a68 R11: ffff888071f661c0 R12: ffff888071f66a60 [ 631.941746][ T1040] R13: 00000000afbbc295 R14: ffffffff8980bbf0 R15: 0000000000000001 [ 631.941752][ T1040] FS: 0000555555c64940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 631.941758][ T1040] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 631.941764][ T1040] CR2: ffffffffff600400 CR3: 00000000611d9000 CR4: 00000000001406e0 [ 631.941767][ T1040] Call Trace: [ 631.941771][ T1040] ? mark_held_locks+0xf0/0xf0 [ 631.941776][ T1040] ? list_lru_count_one+0x1cd/0x380 [ 631.941780][ T1040] ? mark_held_locks+0xf0/0xf0 [ 631.941784][ T1040] ? shrink_slab+0x579/0x5e0 [ 631.941788][ T1040] ? find_held_lock+0x35/0x130 [ 631.941792][ T1040] ? shrink_slab+0x579/0x5e0 [ 631.941796][ T1040] ? lock_downgrade+0x880/0x880 [ 631.941801][ T1040] lock_acquire+0x16f/0x3f0 [ 631.941805][ T1040] ? mem_cgroup_oom_control_write+0x110/0x110 [ 631.941810][ T1040] ? kasan_check_write+0x14/0x20 [ 631.941813][ T1040] rcu_read_lock+0x29/0x70 [ 631.941818][ T1040] ? mem_cgroup_oom_control_write+0x110/0x110 [ 631.941822][ T1040] mem_cgroup_iter+0x19a/0xb00 [ 631.941827][ T1040] ? unregister_memcg_shrinker.isra.0+0x50/0x50 [ 631.941832][ T1040] ? uncharge_page+0x7e0/0x7e0 [ 631.941836][ T1040] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 631.941840][ T1040] ? vmpressure+0x19f/0x350 [ 631.941844][ T1040] shrink_node+0x3fa/0x1570 [ 631.941849][ T1040] ? shrink_node_memcg+0x1430/0x1430 [ 631.941853][ T1040] do_try_to_free_pages+0x3cb/0x11e0 [ 631.941858][ T1040] ? shrink_node+0x1570/0x1570 [ 631.941862][ T1040] ? _raw_spin_unlock_irq+0x5e/0x90 [ 631.941867][ T1040] try_to_free_mem_cgroup_pages+0x2dd/0x9f0 [ 631.941871][ T1040] ? try_to_free_pages+0x8e0/0x8e0 [ 631.941876][ T1040] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 631.941880][ T1040] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 631.941885][ T1040] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 631.941889][ T1040] ? cgroup_file_notify+0x140/0x1b0 [ 631.941893][ T1040] try_charge+0x564/0x15c0 [ 631.941898][ T1040] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 631.941902][ T1040] ? should_fail+0x1de/0x852 [ 631.941907][ T1040] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 631.941911][ T1040] ? rcu_read_lock_sched_held+0x110/0x130 [ 631.941916][ T1040] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 631.941921][ T1040] __memcg_kmem_charge_memcg+0x7c/0x130 [ 631.941925][ T1040] ? memcg_kmem_put_cache+0xb0/0xb0 [ 631.941929][ T1040] ? cache_grow_begin+0x3d6/0x650 [ 631.941934][ T1040] ? lockdep_hardirqs_on+0x418/0x5d0 [ 631.941938][ T1040] ? trace_hardirqs_on+0x67/0x220 [ 631.941942][ T1040] cache_grow_begin+0x402/0x650 [ 631.941947][ T1040] ? __cpuset_node_allowed+0x136/0x540 [ 631.941951][ T1040] fallback_alloc+0x1fd/0x2d0 [ 631.941955][ T1040] ____cache_alloc_node+0x1be/0x1e0 [ 631.941960][ T1040] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 631.941964][ T1040] kmem_cache_alloc+0x1e8/0x6f0 [ 631.941968][ T1040] ? ratelimit_state_init+0xb0/0xb0 [ 631.941973][ T1040] ext4_alloc_inode+0x1f/0x640 [ 631.941977][ T1040] ? ratelimit_state_init+0xb0/0xb0 [ 631.941981][ T1040] alloc_inode+0x68/0x1e0 [ 631.941985][ T1040] iget_locked+0x196/0x4a0 [ 631.941989][ T1040] __ext4_iget+0x273/0x3f10 [ 631.941993][ T1040] ? __ext4_find_entry+0x926/0x1050 [ 631.941998][ T1040] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 631.942002][ T1040] ? ext4_get_projid+0x190/0x190 [ 631.942007][ T1040] ? ext4_fname_prepare_lookup+0x238/0x320 [ 631.942017][ T1040] ? ext4_lookup+0x51d/0x760 [ 631.942021][ T1040] ? ext4_lookup+0x51d/0x760 [ 631.942025][ T1040] ext4_lookup+0x39e/0x760 [ 631.942030][ T1040] ? ext4_cross_rename+0x1330/0x1330 [ 631.942034][ T1040] ? mark_held_locks+0xf0/0xf0 [ 631.942038][ T1040] ? lockdep_init_map+0x1be/0x6d0 [ 631.942042][ T1040] __lookup_slow+0x279/0x500 [ 631.942045][ T1040] ? vfs_unlink+0x560/0x560 [ 631.942049][ T1040] ? kasan_check_write+0x14/0x20 [ 631.942053][ T1040] lookup_slow+0x58/0x80 [ 631.942057][ T1040] path_mountpoint+0x5d2/0x1e60 [ 631.942061][ T1040] ? path_openat+0x46d0/0x46d0 [ 631.942066][ T1040] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 631.942070][ T1040] filename_mountpoint+0x190/0x3c0 [ 631.942075][ T1040] ? filename_parentat.isra.0+0x410/0x410 [ 631.942080][ T1040] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 631.942085][ T1040] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 631.942089][ T1040] ? __phys_addr_symbol+0x30/0x70 [ 631.942094][ T1040] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 631.942098][ T1040] ? __check_object_size+0x3d/0x42f [ 631.942102][ T1040] ? strncpy_from_user+0x2ac/0x380 [ 631.942107][ T1040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 631.942111][ T1040] ? getname_flags+0x277/0x5b0 [ 631.942116][ T1040] user_path_mountpoint_at+0x3a/0x50 [ 631.942120][ T1040] ksys_umount+0x167/0xf00 [ 631.942125][ T1040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 631.942129][ T1040] ? __detach_mounts+0x320/0x320 [ 631.942133][ T1040] ? up_read+0xc4/0x200 [ 631.942137][ T1040] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 631.942142][ T1040] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 631.942146][ T1040] ? do_syscall_64+0x26/0x680 [ 631.942151][ T1040] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 631.942155][ T1040] ? do_syscall_64+0x26/0x680 [ 631.942159][ T1040] ? lockdep_hardirqs_on+0x418/0x5d0 [ 631.942163][ T1040] __x64_sys_umount+0x54/0x80 [ 631.942167][ T1040] do_syscall_64+0xfd/0x680 [ 631.942172][ T1040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 631.942175][ T1040] RIP: 0033:0x45bca7 [ 631.942188][ T1040] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 631.942193][ T1040] RSP: 002b:00007fff6ee63d88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 631.942204][ T1040] RAX: ffffffffffffffda RBX: 000000000006ce10 RCX: 000000000045bca7 [ 631.942210][ T1040] RDX: 00000000004036a0 RSI: 0000000000000002 RDI: 00007fff6ee63e30 [ 631.942216][ T1040] RBP: 0000000000000021 R08: 0000000000000000 R09: 000000000000000f [ 631.942222][ T1040] R10: 000000000000000a R11: 0000000000000206 R12: 00007fff6ee64ec0 [ 631.942228][ T1040] R13: 0000555555c65940 R14: 0000000000000000 R15: 00007fff6ee64ec0 [ 632.206499][ T1040] Kernel panic - not syncing: hung_task: blocked tasks [ 632.249087][ T2529] kobject: 'rx-0' (00000000f0c9270a): auto cleanup kobject_del [ 632.252056][ T1040] CPU: 0 PID: 1040 Comm: khungtaskd Not tainted 5.2.0-rc1+ #6 [ 632.294487][ T2529] kobject: 'rx-0' (00000000f0c9270a): calling ktype release [ 632.298564][ T1040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.298575][ T1040] Call Trace: [ 632.342885][ T2529] kobject: 'rx-0': free name [ 632.343232][ T1040] dump_stack+0x172/0x1f0 [ 632.349526][ T2529] kobject: 'tx-0' (000000006e8b9c11): kobject_cleanup, parent 000000003231232b [ 632.354387][ T1040] panic+0x2cb/0x744 [ 632.354404][ T1040] ? __warn_printk+0xf3/0xf3 [ 632.354419][ T1040] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 632.354437][ T1040] ? ___preempt_schedule+0x16/0x18 [ 632.354459][ T1040] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 632.425308][ T2529] kobject: 'tx-0' (000000006e8b9c11): auto cleanup 'remove' event [ 632.427400][ T1040] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 632.453456][ T2529] kobject: 'tx-0' (000000006e8b9c11): kobject_uevent_env [ 632.455844][ T1040] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 632.461034][ T2529] kobject: 'tx-0' (000000006e8b9c11): kobject_uevent_env: uevent_suppress caused the event to drop! [ 632.466133][ T1040] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 632.466153][ T1040] watchdog+0x9c8/0xec0 [ 632.466176][ T1040] kthread+0x354/0x420 [ 632.466189][ T1040] ? reset_hung_task_detector+0x30/0x30 [ 632.466201][ T1040] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 632.466217][ T1040] ret_from_fork+0x24/0x30 [ 632.473459][ T1040] Kernel Offset: disabled [ 632.779133][ T1040] Rebooting in 86400 seconds..