0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000340)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 23:44:34 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x77, &(0x7f0000000080), 0x9c) 23:44:34 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x77, &(0x7f0000000080), 0x9c) 23:44:34 executing program 1: socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000003c0)={'yam0\x00', 0x200}) perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x8, 0xa, 0x1c3, 0x9, 0x0, 0x7, 0x8, 0x1, 0xfb40, 0x8, 0x4, 0x6, 0x5, 0xa4, 0x101, 0x5, 0x0, 0x200, 0x7, 0x1f, 0x0, 0x7fffffff, 0x8, 0x4, 0x7, 0x4, 0xfffffffffffeffff, 0x7ff, 0x875f, 0x1ff, 0x1f, 0x24489a9c, 0x7ff0000000000, 0x8, 0xffffffffffffffff, 0x1000, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x7}, 0x200c, 0x400, 0x6181, 0x4, 0x1, 0x1, 0x9}, 0x0, 0x3, r0, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffffd6) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r5, 0x1, r5, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r5, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x8953, &(0x7f0000000040)=0x2) 23:44:34 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2b, 0x10000000000001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1b, 0x2, &(0x7f0000000040)=@raw=[@map], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 23:44:34 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) r0 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x1f, 0xcb13, 0x2, 0x0, 0x7, 0x8, 0x3, 0xb081, 0x0, 0x10bf, 0x4, 0x80, 0x0, 0x0, 0x1, 0x8, 0x1f000000000, 0x0, 0x81, 0x2, 0x7fffffff, 0x5, 0x0, 0x1, 0x6, 0x0, 0x401, 0x0, 0x4, 0x10000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3f10, 0x1, @perf_bp={0x0, 0x1}, 0x0, 0x4, 0x0, 0x7, 0x0, 0xba}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_pid(r1, &(0x7f0000000400), 0x12) perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000340)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 23:44:34 executing program 0: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x37, &(0x7f0000000080)='^wlan1#vboxnet0{{eth0\\ppp0em0cpusetvmnet0$md5sumeth0lo\x00'}, 0x279) perf_event_open(0x0, 0x0, 0x0, r0, 0x8) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x83, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0xc34d, 0x0) socketpair(0xa, 0x6, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0xa0018000, 0x400000) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0xffffffffffffff81, 0x8001, 0x5, 0x1c, 0x0, 0x111a, 0x0, 0x8, 0x3, 0x0, 0x7b, 0x366, 0x401, 0x0, 0x3, 0x8, 0x0, 0x5, 0x0, 0x1, 0x100, 0x4, 0x5, 0x8, 0x0, 0x0, 0x0, 0x3f, 0x2, 0x4, 0x10, 0x3, 0x0, 0x1, 0x7, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}, 0x0, 0xffffffff, 0x1, 0x7, 0x9000000000000000, 0x0, 0x918f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:44:34 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) r0 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x1f, 0xcb13, 0x2, 0x0, 0x7, 0x8, 0x3, 0xb081, 0x0, 0x10bf, 0x4, 0x80, 0x0, 0x0, 0x1, 0x8, 0x1f000000000, 0x0, 0x81, 0x2, 0x7fffffff, 0x5, 0x0, 0x1, 0x6, 0x0, 0x401, 0x0, 0x4, 0x10000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3f10, 0x1, @perf_bp={0x0, 0x1}, 0x0, 0x4, 0x0, 0x7, 0x0, 0xba}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_pid(r1, &(0x7f0000000400), 0x12) perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000340)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 23:44:34 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x77, &(0x7f0000000080), 0x9c) 23:44:34 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2b, 0x10000000000001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1b, 0x2, &(0x7f0000000040)=@raw=[@map], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 23:44:34 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x77, &(0x7f0000000080), 0x9c) 23:44:34 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffff9c, &(0x7f00000000c0)='notify_on_release\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)={[{0x0, 'rdma'}, {0x2d, 'cpu'}, {0x2f, 'cpu'}]}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x241, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0xffffffffffffff63) close(0xffffffffffffffff) ioctl$TUNATTACHFILTER(r3, 0x401054d5, 0x0) socket$kcm(0x2, 0x3, 0x2) 23:44:34 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2b, 0x10000000000001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1b, 0x2, &(0x7f0000000040)=@raw=[@map], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 23:44:35 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8948, &(0x7f0000000580)='ip6_vti0\x00') 23:44:35 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8948, &(0x7f0000000580)='ip6_vti0\x00') 23:44:35 executing program 1: socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000003c0)={'yam0\x00', 0x200}) perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x8, 0xa, 0x1c3, 0x9, 0x0, 0x7, 0x8, 0x1, 0xfb40, 0x8, 0x4, 0x6, 0x5, 0xa4, 0x101, 0x5, 0x0, 0x200, 0x7, 0x1f, 0x0, 0x7fffffff, 0x8, 0x4, 0x7, 0x4, 0xfffffffffffeffff, 0x7ff, 0x875f, 0x1ff, 0x1f, 0x24489a9c, 0x7ff0000000000, 0x8, 0xffffffffffffffff, 0x1000, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x7}, 0x200c, 0x400, 0x6181, 0x4, 0x1, 0x1, 0x9}, 0x0, 0x3, r0, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffffd6) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r5, 0x1, r5, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r5, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x8953, &(0x7f0000000040)=0x2) 23:44:35 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) r0 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x1f, 0xcb13, 0x2, 0x0, 0x7, 0x8, 0x3, 0xb081, 0x0, 0x10bf, 0x4, 0x80, 0x0, 0x0, 0x1, 0x8, 0x1f000000000, 0x0, 0x81, 0x2, 0x7fffffff, 0x5, 0x0, 0x1, 0x6, 0x0, 0x401, 0x0, 0x4, 0x10000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3f10, 0x1, @perf_bp={0x0, 0x1}, 0x0, 0x4, 0x0, 0x7, 0x0, 0xba}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_pid(r1, &(0x7f0000000400), 0x12) perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000340)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 23:44:35 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12) r0 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x1f, 0xcb13, 0x2, 0x0, 0x7, 0x8, 0x3, 0xb081, 0x0, 0x10bf, 0x4, 0x80, 0x0, 0x0, 0x1, 0x8, 0x1f000000000, 0x0, 0x81, 0x2, 0x7fffffff, 0x5, 0x0, 0x1, 0x6, 0x0, 0x401, 0x0, 0x4, 0x10000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3f10, 0x1, @perf_bp={0x0, 0x1}, 0x0, 0x4, 0x0, 0x7, 0x0, 0xba}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_pid(r1, &(0x7f0000000400), 0x12) perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000340)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 23:44:35 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2b, 0x10000000000001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1b, 0x2, &(0x7f0000000040)=@raw=[@map], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 23:44:35 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffff9c, &(0x7f00000000c0)='notify_on_release\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)={[{0x0, 'rdma'}, {0x2d, 'cpu'}, {0x2f, 'cpu'}]}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x241, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0xffffffffffffff63) close(0xffffffffffffffff) ioctl$TUNATTACHFILTER(r3, 0x401054d5, 0x0) socket$kcm(0x2, 0x3, 0x2) 23:44:35 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8948, &(0x7f0000000580)='ip6_vti0\x00') 23:44:35 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8948, &(0x7f0000000580)='ip6_vti0\x00') 23:44:35 executing program 5: socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000003c0)={'yam0\x00', 0x200}) perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x8, 0xa, 0x1c3, 0x9, 0x0, 0x7, 0x8, 0x1, 0xfb40, 0x8, 0x4, 0x6, 0x5, 0xa4, 0x101, 0x5, 0x0, 0x200, 0x7, 0x1f, 0x0, 0x7fffffff, 0x8, 0x4, 0x7, 0x4, 0xfffffffffffeffff, 0x7ff, 0x875f, 0x1ff, 0x1f, 0x24489a9c, 0x7ff0000000000, 0x8, 0xffffffffffffffff, 0x1000, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x7}, 0x200c, 0x400, 0x6181, 0x4, 0x1, 0x1, 0x9}, 0x0, 0x3, r0, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffffd6) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r5, 0x1, r5, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r5, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x8953, &(0x7f0000000040)=0x2) 23:44:35 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffff9c, &(0x7f00000000c0)='notify_on_release\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)={[{0x0, 'rdma'}, {0x2d, 'cpu'}, {0x2f, 'cpu'}]}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x241, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0xffffffffffffff63) close(0xffffffffffffffff) ioctl$TUNATTACHFILTER(r3, 0x401054d5, 0x0) socket$kcm(0x2, 0x3, 0x2) 23:44:35 executing program 0: socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000003c0)={'yam0\x00', 0x200}) perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x8, 0xa, 0x1c3, 0x9, 0x0, 0x7, 0x8, 0x1, 0xfb40, 0x8, 0x4, 0x6, 0x5, 0xa4, 0x101, 0x5, 0x0, 0x200, 0x7, 0x1f, 0x0, 0x7fffffff, 0x8, 0x4, 0x7, 0x4, 0xfffffffffffeffff, 0x7ff, 0x875f, 0x1ff, 0x1f, 0x24489a9c, 0x7ff0000000000, 0x8, 0xffffffffffffffff, 0x1000, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x7}, 0x200c, 0x400, 0x6181, 0x4, 0x1, 0x1, 0x9}, 0x0, 0x3, r0, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffffd6) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r5, 0x1, r5, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r5, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x8953, &(0x7f0000000040)=0x2) 23:44:36 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffff9c, &(0x7f00000000c0)='notify_on_release\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)={[{0x0, 'rdma'}, {0x2d, 'cpu'}, {0x2f, 'cpu'}]}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x241, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0xffffffffffffff63) close(0xffffffffffffffff) ioctl$TUNATTACHFILTER(r3, 0x401054d5, 0x0) socket$kcm(0x2, 0x3, 0x2) 23:44:36 executing program 4: socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000003c0)={'yam0\x00', 0x200}) perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x8, 0xa, 0x1c3, 0x9, 0x0, 0x7, 0x8, 0x1, 0xfb40, 0x8, 0x4, 0x6, 0x5, 0xa4, 0x101, 0x5, 0x0, 0x200, 0x7, 0x1f, 0x0, 0x7fffffff, 0x8, 0x4, 0x7, 0x4, 0xfffffffffffeffff, 0x7ff, 0x875f, 0x1ff, 0x1f, 0x24489a9c, 0x7ff0000000000, 0x8, 0xffffffffffffffff, 0x1000, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x7}, 0x200c, 0x400, 0x6181, 0x4, 0x1, 0x1, 0x9}, 0x0, 0x3, r0, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffffd6) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r5, 0x1, r5, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r5, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x8953, &(0x7f0000000040)=0x2) 23:44:36 executing program 4: socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000003c0)={'yam0\x00', 0x200}) perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x8, 0xa, 0x1c3, 0x9, 0x0, 0x7, 0x8, 0x1, 0xfb40, 0x8, 0x4, 0x6, 0x5, 0xa4, 0x101, 0x5, 0x0, 0x200, 0x7, 0x1f, 0x0, 0x7fffffff, 0x8, 0x4, 0x7, 0x4, 0xfffffffffffeffff, 0x7ff, 0x875f, 0x1ff, 0x1f, 0x24489a9c, 0x7ff0000000000, 0x8, 0xffffffffffffffff, 0x1000, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x7}, 0x200c, 0x400, 0x6181, 0x4, 0x1, 0x1, 0x9}, 0x0, 0x3, r0, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffffd6) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r5, 0x1, r5, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r5, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x8953, &(0x7f0000000040)=0x2) 23:44:36 executing program 1: socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000003c0)={'yam0\x00', 0x200}) perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x8, 0xa, 0x1c3, 0x9, 0x0, 0x7, 0x8, 0x1, 0xfb40, 0x8, 0x4, 0x6, 0x5, 0xa4, 0x101, 0x5, 0x0, 0x200, 0x7, 0x1f, 0x0, 0x7fffffff, 0x8, 0x4, 0x7, 0x4, 0xfffffffffffeffff, 0x7ff, 0x875f, 0x1ff, 0x1f, 0x24489a9c, 0x7ff0000000000, 0x8, 0xffffffffffffffff, 0x1000, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x7}, 0x200c, 0x400, 0x6181, 0x4, 0x1, 0x1, 0x9}, 0x0, 0x3, r0, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffffd6) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r5, 0x1, r5, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r5, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x8953, &(0x7f0000000040)=0x2) 23:44:36 executing program 5: socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000003c0)={'yam0\x00', 0x200}) perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x8, 0xa, 0x1c3, 0x9, 0x0, 0x7, 0x8, 0x1, 0xfb40, 0x8, 0x4, 0x6, 0x5, 0xa4, 0x101, 0x5, 0x0, 0x200, 0x7, 0x1f, 0x0, 0x7fffffff, 0x8, 0x4, 0x7, 0x4, 0xfffffffffffeffff, 0x7ff, 0x875f, 0x1ff, 0x1f, 0x24489a9c, 0x7ff0000000000, 0x8, 0xffffffffffffffff, 0x1000, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x7}, 0x200c, 0x400, 0x6181, 0x4, 0x1, 0x1, 0x9}, 0x0, 0x3, r0, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffffd6) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r5, 0x1, r5, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r5, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x8953, &(0x7f0000000040)=0x2) 23:44:36 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000200)=[{&(0x7f0000000240)="8105", 0x2}], 0x1}, 0x8000) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000280)=@nl=@unspec, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="88e77e406201", 0x6}], 0x1}, 0x0) 23:44:36 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xa, 0xf, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) 23:44:36 executing program 0: socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000003c0)={'yam0\x00', 0x200}) perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x8, 0xa, 0x1c3, 0x9, 0x0, 0x7, 0x8, 0x1, 0xfb40, 0x8, 0x4, 0x6, 0x5, 0xa4, 0x101, 0x5, 0x0, 0x200, 0x7, 0x1f, 0x0, 0x7fffffff, 0x8, 0x4, 0x7, 0x4, 0xfffffffffffeffff, 0x7ff, 0x875f, 0x1ff, 0x1f, 0x24489a9c, 0x7ff0000000000, 0x8, 0xffffffffffffffff, 0x1000, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x7}, 0x200c, 0x400, 0x6181, 0x4, 0x1, 0x1, 0x9}, 0x0, 0x3, r0, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffffd6) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r5, 0x1, r5, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r5, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x8953, &(0x7f0000000040)=0x2) 23:44:36 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000200)=[{&(0x7f0000000240)="8105", 0x2}], 0x1}, 0x8000) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000280)=@nl=@unspec, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="88e77e406201", 0x6}], 0x1}, 0x0) 23:44:36 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xa, 0xf, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) 23:44:36 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000200)=[{&(0x7f0000000240)="8105", 0x2}], 0x1}, 0x8000) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000280)=@nl=@unspec, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="88e77e406201", 0x6}], 0x1}, 0x0) 23:44:37 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xa, 0xf, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) 23:44:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000200)=[{&(0x7f0000000240)="8105", 0x2}], 0x1}, 0x8000) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000280)=@nl=@unspec, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="88e77e406201", 0x6}], 0x1}, 0x0) 23:44:37 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xa, 0xf, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) 23:44:37 executing program 4: socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000003c0)={'yam0\x00', 0x200}) perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x8, 0xa, 0x1c3, 0x9, 0x0, 0x7, 0x8, 0x1, 0xfb40, 0x8, 0x4, 0x6, 0x5, 0xa4, 0x101, 0x5, 0x0, 0x200, 0x7, 0x1f, 0x0, 0x7fffffff, 0x8, 0x4, 0x7, 0x4, 0xfffffffffffeffff, 0x7ff, 0x875f, 0x1ff, 0x1f, 0x24489a9c, 0x7ff0000000000, 0x8, 0xffffffffffffffff, 0x1000, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x7}, 0x200c, 0x400, 0x6181, 0x4, 0x1, 0x1, 0x9}, 0x0, 0x3, r0, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffffd6) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r5, 0x1, r5, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r5, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x8953, &(0x7f0000000040)=0x2) 23:44:37 executing program 3: socket$kcm(0x2, 0x2, 0x0) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 23:44:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000480)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfffffffd}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r0) 23:44:37 executing program 5: socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000003c0)={'yam0\x00', 0x200}) perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x8, 0xa, 0x1c3, 0x9, 0x0, 0x7, 0x8, 0x1, 0xfb40, 0x8, 0x4, 0x6, 0x5, 0xa4, 0x101, 0x5, 0x0, 0x200, 0x7, 0x1f, 0x0, 0x7fffffff, 0x8, 0x4, 0x7, 0x4, 0xfffffffffffeffff, 0x7ff, 0x875f, 0x1ff, 0x1f, 0x24489a9c, 0x7ff0000000000, 0x8, 0xffffffffffffffff, 0x1000, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x7}, 0x200c, 0x400, 0x6181, 0x4, 0x1, 0x1, 0x9}, 0x0, 0x3, r0, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffffd6) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r5, 0x1, r5, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r5, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x8953, &(0x7f0000000040)=0x2) 23:44:37 executing program 0: socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000003c0)={'yam0\x00', 0x200}) perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x8, 0xa, 0x1c3, 0x9, 0x0, 0x7, 0x8, 0x1, 0xfb40, 0x8, 0x4, 0x6, 0x5, 0xa4, 0x101, 0x5, 0x0, 0x200, 0x7, 0x1f, 0x0, 0x7fffffff, 0x8, 0x4, 0x7, 0x4, 0xfffffffffffeffff, 0x7ff, 0x875f, 0x1ff, 0x1f, 0x24489a9c, 0x7ff0000000000, 0x8, 0xffffffffffffffff, 0x1000, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x7}, 0x200c, 0x400, 0x6181, 0x4, 0x1, 0x1, 0x9}, 0x0, 0x3, r0, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffffd6) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r5, 0x1, r5, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r5, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x8953, &(0x7f0000000040)=0x2) 23:44:37 executing program 1: socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000003c0)={'yam0\x00', 0x200}) perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x8, 0xa, 0x1c3, 0x9, 0x0, 0x7, 0x8, 0x1, 0xfb40, 0x8, 0x4, 0x6, 0x5, 0xa4, 0x101, 0x5, 0x0, 0x200, 0x7, 0x1f, 0x0, 0x7fffffff, 0x8, 0x4, 0x7, 0x4, 0xfffffffffffeffff, 0x7ff, 0x875f, 0x1ff, 0x1f, 0x24489a9c, 0x7ff0000000000, 0x8, 0xffffffffffffffff, 0x1000, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x7}, 0x200c, 0x400, 0x6181, 0x4, 0x1, 0x1, 0x9}, 0x0, 0x3, r0, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffffd6) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r5, 0x1, r5, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r5, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r7) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x8953, &(0x7f0000000040)=0x2) 23:44:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000480)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfffffffd}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r0) 23:44:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000480)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfffffffd}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r0) 23:44:37 executing program 3: socket$kcm(0x2, 0x2, 0x0) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 23:44:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000480)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfffffffd}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r0) 23:44:38 executing program 3: socket$kcm(0x2, 0x2, 0x0) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 23:44:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000480)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfffffffd}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r0) 23:44:38 executing program 3: socket$kcm(0x2, 0x2, 0x0) socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 23:44:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000480)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfffffffd}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r0) 23:44:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000480)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfffffffd}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r0) 23:44:38 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080), 0x4) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x80000001, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x0, 0x68e2ea6a, 0x0, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e00000036008182e4b1e6a9735082cf0224b0eba06ef9075b3f00169148790700d90080e2300000000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) unlink(&(0x7f0000000040)='\x00') ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000440)) 23:44:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002b008163e45ae08700000000100f0000000000bc4cc91b4dd65b2f0580cb7023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 23:44:38 executing program 4: socket$kcm(0x2, 0x140000000000000a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="e197dd5a926234bf6f5bd5dfdd650951985caf4d95b8bae68a13150319695a4fe5864bb782a116a8b871b3697329426b50791822fa266dd7999c52d69b37a494d6716abc900b1638d393a0a0f68487a3da5a67455900b8919c8767d0fa81be3c0016910e47d15cecfbd09b38b424fde9650165e76851d9dc97757704b33c73c56fee2c4938ed785fdf2873a17eb0"], 0x8e) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x7, 0x0, 0x7, 0x401, 0x0, 0xe35a, 0x1000, 0x0, 0x6, 0x6, 0x5, 0x0, 0x7fffffff, 0x4, 0x80, 0x0, 0x40, 0x874, 0x10001, 0x800, 0x0, 0x5, 0xfffffffffffffffd, 0x2, 0xfffffffffffffffc, 0x0, 0x800, 0x6, 0x1, 0x0, 0x8000, 0x7fff, 0x6, 0x3, 0x9, 0x8, 0x0, 0x1ff, 0x0, @perf_config_ext={0x200, 0x1}, 0x110, 0x40, 0x7, 0x6, 0x2, 0x3, 0x5ed0}, r2, 0x6, 0xffffffffffffffff, 0xb) [ 226.789402][T14685] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 226.848056][T14694] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 226.859536][T14697] syz-executor.4 uses obsolete (PF_INET,SOCK_PACKET) 23:44:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000480)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfffffffd}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r0) 23:44:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000480)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfffffffd}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r0) 23:44:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002b008163e45ae08700000000100f0000000000bc4cc91b4dd65b2f0580cb7023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 23:44:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002b008163e45ae08700000000100f0000000000bc4cc91b4dd65b2f0580cb7023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 23:44:38 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080), 0x4) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x80000001, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x0, 0x68e2ea6a, 0x0, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e00000036008182e4b1e6a9735082cf0224b0eba06ef9075b3f00169148790700d90080e2300000000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) unlink(&(0x7f0000000040)='\x00') ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000440)) 23:44:38 executing program 4: socket$kcm(0x2, 0x140000000000000a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="e197dd5a926234bf6f5bd5dfdd650951985caf4d95b8bae68a13150319695a4fe5864bb782a116a8b871b3697329426b50791822fa266dd7999c52d69b37a494d6716abc900b1638d393a0a0f68487a3da5a67455900b8919c8767d0fa81be3c0016910e47d15cecfbd09b38b424fde9650165e76851d9dc97757704b33c73c56fee2c4938ed785fdf2873a17eb0"], 0x8e) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x7, 0x0, 0x7, 0x401, 0x0, 0xe35a, 0x1000, 0x0, 0x6, 0x6, 0x5, 0x0, 0x7fffffff, 0x4, 0x80, 0x0, 0x40, 0x874, 0x10001, 0x800, 0x0, 0x5, 0xfffffffffffffffd, 0x2, 0xfffffffffffffffc, 0x0, 0x800, 0x6, 0x1, 0x0, 0x8000, 0x7fff, 0x6, 0x3, 0x9, 0x8, 0x0, 0x1ff, 0x0, @perf_config_ext={0x200, 0x1}, 0x110, 0x40, 0x7, 0x6, 0x2, 0x3, 0x5ed0}, r2, 0x6, 0xffffffffffffffff, 0xb) 23:44:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002b008163e45ae08700000000100f0000000000bc4cc91b4dd65b2f0580cb7023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 23:44:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002b008163e45ae08700000000100f0000000000bc4cc91b4dd65b2f0580cb7023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 23:44:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000480)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfffffffd}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r0) [ 227.213585][T14717] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 23:44:39 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080), 0x4) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x80000001, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x0, 0x68e2ea6a, 0x0, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e00000036008182e4b1e6a9735082cf0224b0eba06ef9075b3f00169148790700d90080e2300000000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) unlink(&(0x7f0000000040)='\x00') ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000440)) 23:44:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002b008163e45ae08700000000100f0000000000bc4cc91b4dd65b2f0580cb7023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 23:44:39 executing program 2: socket$kcm(0x2, 0x140000000000000a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="e197dd5a926234bf6f5bd5dfdd650951985caf4d95b8bae68a13150319695a4fe5864bb782a116a8b871b3697329426b50791822fa266dd7999c52d69b37a494d6716abc900b1638d393a0a0f68487a3da5a67455900b8919c8767d0fa81be3c0016910e47d15cecfbd09b38b424fde9650165e76851d9dc97757704b33c73c56fee2c4938ed785fdf2873a17eb0"], 0x8e) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x7, 0x0, 0x7, 0x401, 0x0, 0xe35a, 0x1000, 0x0, 0x6, 0x6, 0x5, 0x0, 0x7fffffff, 0x4, 0x80, 0x0, 0x40, 0x874, 0x10001, 0x800, 0x0, 0x5, 0xfffffffffffffffd, 0x2, 0xfffffffffffffffc, 0x0, 0x800, 0x6, 0x1, 0x0, 0x8000, 0x7fff, 0x6, 0x3, 0x9, 0x8, 0x0, 0x1ff, 0x0, @perf_config_ext={0x200, 0x1}, 0x110, 0x40, 0x7, 0x6, 0x2, 0x3, 0x5ed0}, r2, 0x6, 0xffffffffffffffff, 0xb) 23:44:39 executing program 4: socket$kcm(0x2, 0x140000000000000a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="e197dd5a926234bf6f5bd5dfdd650951985caf4d95b8bae68a13150319695a4fe5864bb782a116a8b871b3697329426b50791822fa266dd7999c52d69b37a494d6716abc900b1638d393a0a0f68487a3da5a67455900b8919c8767d0fa81be3c0016910e47d15cecfbd09b38b424fde9650165e76851d9dc97757704b33c73c56fee2c4938ed785fdf2873a17eb0"], 0x8e) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x7, 0x0, 0x7, 0x401, 0x0, 0xe35a, 0x1000, 0x0, 0x6, 0x6, 0x5, 0x0, 0x7fffffff, 0x4, 0x80, 0x0, 0x40, 0x874, 0x10001, 0x800, 0x0, 0x5, 0xfffffffffffffffd, 0x2, 0xfffffffffffffffc, 0x0, 0x800, 0x6, 0x1, 0x0, 0x8000, 0x7fff, 0x6, 0x3, 0x9, 0x8, 0x0, 0x1ff, 0x0, @perf_config_ext={0x200, 0x1}, 0x110, 0x40, 0x7, 0x6, 0x2, 0x3, 0x5ed0}, r2, 0x6, 0xffffffffffffffff, 0xb) 23:44:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002b008163e45ae08700000000100f0000000000bc4cc91b4dd65b2f0580cb7023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 23:44:39 executing program 5: socket$kcm(0x2, 0x140000000000000a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="e197dd5a926234bf6f5bd5dfdd650951985caf4d95b8bae68a13150319695a4fe5864bb782a116a8b871b3697329426b50791822fa266dd7999c52d69b37a494d6716abc900b1638d393a0a0f68487a3da5a67455900b8919c8767d0fa81be3c0016910e47d15cecfbd09b38b424fde9650165e76851d9dc97757704b33c73c56fee2c4938ed785fdf2873a17eb0"], 0x8e) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x7, 0x0, 0x7, 0x401, 0x0, 0xe35a, 0x1000, 0x0, 0x6, 0x6, 0x5, 0x0, 0x7fffffff, 0x4, 0x80, 0x0, 0x40, 0x874, 0x10001, 0x800, 0x0, 0x5, 0xfffffffffffffffd, 0x2, 0xfffffffffffffffc, 0x0, 0x800, 0x6, 0x1, 0x0, 0x8000, 0x7fff, 0x6, 0x3, 0x9, 0x8, 0x0, 0x1ff, 0x0, @perf_config_ext={0x200, 0x1}, 0x110, 0x40, 0x7, 0x6, 0x2, 0x3, 0x5ed0}, r2, 0x6, 0xffffffffffffffff, 0xb) [ 227.519079][T14734] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 23:44:39 executing program 0: socket$kcm(0x2, 0x140000000000000a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="e197dd5a926234bf6f5bd5dfdd650951985caf4d95b8bae68a13150319695a4fe5864bb782a116a8b871b3697329426b50791822fa266dd7999c52d69b37a494d6716abc900b1638d393a0a0f68487a3da5a67455900b8919c8767d0fa81be3c0016910e47d15cecfbd09b38b424fde9650165e76851d9dc97757704b33c73c56fee2c4938ed785fdf2873a17eb0"], 0x8e) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x7, 0x0, 0x7, 0x401, 0x0, 0xe35a, 0x1000, 0x0, 0x6, 0x6, 0x5, 0x0, 0x7fffffff, 0x4, 0x80, 0x0, 0x40, 0x874, 0x10001, 0x800, 0x0, 0x5, 0xfffffffffffffffd, 0x2, 0xfffffffffffffffc, 0x0, 0x800, 0x6, 0x1, 0x0, 0x8000, 0x7fff, 0x6, 0x3, 0x9, 0x8, 0x0, 0x1ff, 0x0, @perf_config_ext={0x200, 0x1}, 0x110, 0x40, 0x7, 0x6, 0x2, 0x3, 0x5ed0}, r2, 0x6, 0xffffffffffffffff, 0xb) 23:44:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) r2 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 23:44:39 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080), 0x4) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x80000001, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x0, 0x68e2ea6a, 0x0, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e00000036008182e4b1e6a9735082cf0224b0eba06ef9075b3f00169148790700d90080e2300000000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) unlink(&(0x7f0000000040)='\x00') ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000440)) 23:44:39 executing program 2: socket$kcm(0x2, 0x140000000000000a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="e197dd5a926234bf6f5bd5dfdd650951985caf4d95b8bae68a13150319695a4fe5864bb782a116a8b871b3697329426b50791822fa266dd7999c52d69b37a494d6716abc900b1638d393a0a0f68487a3da5a67455900b8919c8767d0fa81be3c0016910e47d15cecfbd09b38b424fde9650165e76851d9dc97757704b33c73c56fee2c4938ed785fdf2873a17eb0"], 0x8e) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x7, 0x0, 0x7, 0x401, 0x0, 0xe35a, 0x1000, 0x0, 0x6, 0x6, 0x5, 0x0, 0x7fffffff, 0x4, 0x80, 0x0, 0x40, 0x874, 0x10001, 0x800, 0x0, 0x5, 0xfffffffffffffffd, 0x2, 0xfffffffffffffffc, 0x0, 0x800, 0x6, 0x1, 0x0, 0x8000, 0x7fff, 0x6, 0x3, 0x9, 0x8, 0x0, 0x1ff, 0x0, @perf_config_ext={0x200, 0x1}, 0x110, 0x40, 0x7, 0x6, 0x2, 0x3, 0x5ed0}, r2, 0x6, 0xffffffffffffffff, 0xb) 23:44:39 executing program 4: socket$kcm(0x2, 0x140000000000000a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="e197dd5a926234bf6f5bd5dfdd650951985caf4d95b8bae68a13150319695a4fe5864bb782a116a8b871b3697329426b50791822fa266dd7999c52d69b37a494d6716abc900b1638d393a0a0f68487a3da5a67455900b8919c8767d0fa81be3c0016910e47d15cecfbd09b38b424fde9650165e76851d9dc97757704b33c73c56fee2c4938ed785fdf2873a17eb0"], 0x8e) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x7, 0x0, 0x7, 0x401, 0x0, 0xe35a, 0x1000, 0x0, 0x6, 0x6, 0x5, 0x0, 0x7fffffff, 0x4, 0x80, 0x0, 0x40, 0x874, 0x10001, 0x800, 0x0, 0x5, 0xfffffffffffffffd, 0x2, 0xfffffffffffffffc, 0x0, 0x800, 0x6, 0x1, 0x0, 0x8000, 0x7fff, 0x6, 0x3, 0x9, 0x8, 0x0, 0x1ff, 0x0, @perf_config_ext={0x200, 0x1}, 0x110, 0x40, 0x7, 0x6, 0x2, 0x3, 0x5ed0}, r2, 0x6, 0xffffffffffffffff, 0xb) 23:44:39 executing program 5: socket$kcm(0x2, 0x140000000000000a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="e197dd5a926234bf6f5bd5dfdd650951985caf4d95b8bae68a13150319695a4fe5864bb782a116a8b871b3697329426b50791822fa266dd7999c52d69b37a494d6716abc900b1638d393a0a0f68487a3da5a67455900b8919c8767d0fa81be3c0016910e47d15cecfbd09b38b424fde9650165e76851d9dc97757704b33c73c56fee2c4938ed785fdf2873a17eb0"], 0x8e) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x7, 0x0, 0x7, 0x401, 0x0, 0xe35a, 0x1000, 0x0, 0x6, 0x6, 0x5, 0x0, 0x7fffffff, 0x4, 0x80, 0x0, 0x40, 0x874, 0x10001, 0x800, 0x0, 0x5, 0xfffffffffffffffd, 0x2, 0xfffffffffffffffc, 0x0, 0x800, 0x6, 0x1, 0x0, 0x8000, 0x7fff, 0x6, 0x3, 0x9, 0x8, 0x0, 0x1ff, 0x0, @perf_config_ext={0x200, 0x1}, 0x110, 0x40, 0x7, 0x6, 0x2, 0x3, 0x5ed0}, r2, 0x6, 0xffffffffffffffff, 0xb) [ 227.845490][T14755] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 227.913273][ T26] audit: type=1804 audit(1562111079.783:59): pid=14760 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir872538318/syzkaller.ZpPgXD/248/memory.events" dev="sda1" ino=16609 res=1 23:44:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x603, 0x1}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f00000000c0)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x1}, 0x2c) 23:44:39 executing program 2: socket$kcm(0x2, 0x140000000000000a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="e197dd5a926234bf6f5bd5dfdd650951985caf4d95b8bae68a13150319695a4fe5864bb782a116a8b871b3697329426b50791822fa266dd7999c52d69b37a494d6716abc900b1638d393a0a0f68487a3da5a67455900b8919c8767d0fa81be3c0016910e47d15cecfbd09b38b424fde9650165e76851d9dc97757704b33c73c56fee2c4938ed785fdf2873a17eb0"], 0x8e) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x7, 0x0, 0x7, 0x401, 0x0, 0xe35a, 0x1000, 0x0, 0x6, 0x6, 0x5, 0x0, 0x7fffffff, 0x4, 0x80, 0x0, 0x40, 0x874, 0x10001, 0x800, 0x0, 0x5, 0xfffffffffffffffd, 0x2, 0xfffffffffffffffc, 0x0, 0x800, 0x6, 0x1, 0x0, 0x8000, 0x7fff, 0x6, 0x3, 0x9, 0x8, 0x0, 0x1ff, 0x0, @perf_config_ext={0x200, 0x1}, 0x110, 0x40, 0x7, 0x6, 0x2, 0x3, 0x5ed0}, r2, 0x6, 0xffffffffffffffff, 0xb) 23:44:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) r2 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) [ 227.985807][ T26] audit: type=1804 audit(1562111079.833:60): pid=14765 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir872538318/syzkaller.ZpPgXD/248/memory.events" dev="sda1" ino=16609 res=1 23:44:39 executing program 5: socket$kcm(0x2, 0x140000000000000a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="e197dd5a926234bf6f5bd5dfdd650951985caf4d95b8bae68a13150319695a4fe5864bb782a116a8b871b3697329426b50791822fa266dd7999c52d69b37a494d6716abc900b1638d393a0a0f68487a3da5a67455900b8919c8767d0fa81be3c0016910e47d15cecfbd09b38b424fde9650165e76851d9dc97757704b33c73c56fee2c4938ed785fdf2873a17eb0"], 0x8e) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x7, 0x0, 0x7, 0x401, 0x0, 0xe35a, 0x1000, 0x0, 0x6, 0x6, 0x5, 0x0, 0x7fffffff, 0x4, 0x80, 0x0, 0x40, 0x874, 0x10001, 0x800, 0x0, 0x5, 0xfffffffffffffffd, 0x2, 0xfffffffffffffffc, 0x0, 0x800, 0x6, 0x1, 0x0, 0x8000, 0x7fff, 0x6, 0x3, 0x9, 0x8, 0x0, 0x1ff, 0x0, @perf_config_ext={0x200, 0x1}, 0x110, 0x40, 0x7, 0x6, 0x2, 0x3, 0x5ed0}, r2, 0x6, 0xffffffffffffffff, 0xb) 23:44:40 executing program 0: socket$kcm(0x2, 0x140000000000000a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="e197dd5a926234bf6f5bd5dfdd650951985caf4d95b8bae68a13150319695a4fe5864bb782a116a8b871b3697329426b50791822fa266dd7999c52d69b37a494d6716abc900b1638d393a0a0f68487a3da5a67455900b8919c8767d0fa81be3c0016910e47d15cecfbd09b38b424fde9650165e76851d9dc97757704b33c73c56fee2c4938ed785fdf2873a17eb0"], 0x8e) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x7, 0x0, 0x7, 0x401, 0x0, 0xe35a, 0x1000, 0x0, 0x6, 0x6, 0x5, 0x0, 0x7fffffff, 0x4, 0x80, 0x0, 0x40, 0x874, 0x10001, 0x800, 0x0, 0x5, 0xfffffffffffffffd, 0x2, 0xfffffffffffffffc, 0x0, 0x800, 0x6, 0x1, 0x0, 0x8000, 0x7fff, 0x6, 0x3, 0x9, 0x8, 0x0, 0x1ff, 0x0, @perf_config_ext={0x200, 0x1}, 0x110, 0x40, 0x7, 0x6, 0x2, 0x3, 0x5ed0}, r2, 0x6, 0xffffffffffffffff, 0xb) 23:44:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) r2 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 23:44:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x603, 0x1}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f00000000c0)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x1}, 0x2c) 23:44:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xf, 0x100000001, 0x2a8}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000040), 0x0}, 0x18) [ 228.267666][ T26] audit: type=1804 audit(1562111080.133:61): pid=14779 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir872538318/syzkaller.ZpPgXD/249/memory.events" dev="sda1" ino=16619 res=1 23:44:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) r2 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 23:44:40 executing program 5: r0 = socket$kcm(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 23:44:40 executing program 0: socket$kcm(0x2, 0x140000000000000a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="e197dd5a926234bf6f5bd5dfdd650951985caf4d95b8bae68a13150319695a4fe5864bb782a116a8b871b3697329426b50791822fa266dd7999c52d69b37a494d6716abc900b1638d393a0a0f68487a3da5a67455900b8919c8767d0fa81be3c0016910e47d15cecfbd09b38b424fde9650165e76851d9dc97757704b33c73c56fee2c4938ed785fdf2873a17eb0"], 0x8e) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x7, 0x0, 0x7, 0x401, 0x0, 0xe35a, 0x1000, 0x0, 0x6, 0x6, 0x5, 0x0, 0x7fffffff, 0x4, 0x80, 0x0, 0x40, 0x874, 0x10001, 0x800, 0x0, 0x5, 0xfffffffffffffffd, 0x2, 0xfffffffffffffffc, 0x0, 0x800, 0x6, 0x1, 0x0, 0x8000, 0x7fff, 0x6, 0x3, 0x9, 0x8, 0x0, 0x1ff, 0x0, @perf_config_ext={0x200, 0x1}, 0x110, 0x40, 0x7, 0x6, 0x2, 0x3, 0x5ed0}, r2, 0x6, 0xffffffffffffffff, 0xb) 23:44:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x603, 0x1}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f00000000c0)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x1}, 0x2c) [ 228.460232][ T26] audit: type=1804 audit(1562111080.323:62): pid=14789 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459116751/syzkaller.qaRZYR/255/memory.events" dev="sda1" ino=16530 res=1 23:44:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) r2 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 23:44:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xf, 0x100000001, 0x2a8}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000040), 0x0}, 0x18) [ 228.631209][ T26] audit: type=1804 audit(1562111080.503:63): pid=14803 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir872538318/syzkaller.ZpPgXD/250/memory.events" dev="sda1" ino=16547 res=1 23:44:40 executing program 5: r0 = socket$kcm(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 23:44:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x603, 0x1}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f00000000c0)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x1}, 0x2c) 23:44:40 executing program 0: r0 = socket$kcm(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 228.739766][ T26] audit: type=1804 audit(1562111080.603:64): pid=14810 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459116751/syzkaller.qaRZYR/256/memory.events" dev="sda1" ino=16613 res=1 23:44:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) r2 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 23:44:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) r2 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 23:44:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xf, 0x100000001, 0x2a8}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000040), 0x0}, 0x18) 23:44:40 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xf, 0x100000001, 0x2a8}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000040), 0x0}, 0x18) [ 229.072599][ T26] audit: type=1804 audit(1562111080.943:65): pid=14833 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir459116751/syzkaller.qaRZYR/257/memory.events" dev="sda1" ino=16616 res=1 23:44:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xf, 0x100000001, 0x2a8}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000040), 0x0}, 0x18) 23:44:41 executing program 0: r0 = socket$kcm(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 23:44:41 executing program 5: r0 = socket$kcm(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 23:44:41 executing program 4: r0 = gettid() r1 = perf_event_open$cgroup(&(0x7f0000000580)={0x7, 0x70, 0x3, 0x0, 0x1000, 0x7, 0x0, 0x7, 0x1020, 0x0, 0x2, 0x7, 0x3, 0x0, 0x3, 0x6, 0x7, 0x80000000, 0x9, 0x5, 0x2, 0x0, 0x8001, 0x3ddd, 0x8001, 0x0, 0x3f, 0x42, 0x6, 0x2, 0xe, 0x8, 0x80000001, 0xb1c, 0x7fff, 0x3ff, 0x3, 0xffff, 0x0, 0x7, 0x1, @perf_bp={0x0, 0x2}, 0x1193, 0x1, 0x3, 0x7, 0xffff, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x2) perf_event_open(0x0, r0, 0x2, r1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r2, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) 23:44:41 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000004c0)) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000bc40)={0x12, 0xf, &(0x7f0000000100)=ANY=[@ANYBLOB="950000000000a3bdcd4dc1d36a88e74bfc5200000ed02d72c1e65e59488dfdad16657c4b5d738cfc1b06d24dc48476fdbe33277b6d32539c877696c630a8ce2dabc83747245b2f7396ab70993afc59e00018b40fa83d1a303734e1fe468587aede270232a3f97e1ae25ebe3c82187b4d6b1dae8e90db0884940b6b73cc1be0"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x2, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000400)={0x7, 0x70, 0x80000001, 0x8, 0x1f, 0x0, 0x0, 0x4, 0x10000, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x1fe00000000, 0x401, 0xfffffffffffffffe, 0x8, 0x400, 0x3, 0x0, 0x2, 0x3, 0x0, 0x9, 0x1, 0x79, 0x0, 0x5, 0x1, 0x100000000, 0x9, 0x1, 0x0, 0x8001, 0x80000000000004, @perf_bp={0x0}, 0x10, 0x1ffc0000000, 0x5, 0x0, 0x2, 0x8, 0x80000001}, 0x0, 0xc, r1, 0x200b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='procsecuritytrusted\x00', r2}, 0x10) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x3, 0xff, 0xffffffff, 0x81, 0x0, 0x6, 0x0, 0x1, 0x1, 0x100, 0x1, 0x1, 0x1, 0xe24, 0x5, 0x7be, 0x0, 0x9ca, 0x3, 0x9, 0x401, 0x0, 0x2, 0x4, 0x0, 0x4, 0x100000000, 0xffffffffffff3403, 0x10001, 0x100000001, 0x3f, 0x85, 0x7, 0x9, 0x7, 0x200, 0x0, 0x5, 0x1, @perf_bp={0x0, 0x8}, 0x8000, 0x2, 0x7, 0x0, 0x0, 0x401, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x9) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x20, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r3, &(0x7f0000000500)="f2a7043473b889e64db28925a6d0f0652d89d95295c95be995da7ba0e3d1adad91f3bbe8e88018ac15e97b634e774481c7320eb06133ebf4c9502cc755f88ec0c258efe9938c9edbf6ec55685be2812771e7a575f393a50ea80eeaa28b18a2b0cd85855e5902b9f0902f", 0x0}, 0x18) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000240)=0x101) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) getpid() bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/114}, 0x18) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) sendmsg$kcm(r6, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r6, &(0x7f0000000280)={[{0x67dc0000, 'memory'}]}, 0xfdef) [ 229.232754][ T26] audit: type=1804 audit(1562111081.033:66): pid=14830 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir872538318/syzkaller.ZpPgXD/251/memory.events" dev="sda1" ino=16624 res=1 23:44:41 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xf, 0x100000001, 0x2a8}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000040), 0x0}, 0x18) 23:44:41 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="230000001e0081ae00060c74000f0005020000006c0000f28701086fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) [ 229.490536][ C0] net_ratelimit: 10 callbacks suppressed [ 229.490545][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 229.502231][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:44:41 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xf, 0x100000001, 0x2a8}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000040), 0x0}, 0x18) [ 229.608892][T14864] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.2'. 23:44:41 executing program 0: r0 = socket$kcm(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 23:44:41 executing program 4: r0 = gettid() r1 = perf_event_open$cgroup(&(0x7f0000000580)={0x7, 0x70, 0x3, 0x0, 0x1000, 0x7, 0x0, 0x7, 0x1020, 0x0, 0x2, 0x7, 0x3, 0x0, 0x3, 0x6, 0x7, 0x80000000, 0x9, 0x5, 0x2, 0x0, 0x8001, 0x3ddd, 0x8001, 0x0, 0x3f, 0x42, 0x6, 0x2, 0xe, 0x8, 0x80000001, 0xb1c, 0x7fff, 0x3ff, 0x3, 0xffff, 0x0, 0x7, 0x1, @perf_bp={0x0, 0x2}, 0x1193, 0x1, 0x3, 0x7, 0xffff, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x2) perf_event_open(0x0, r0, 0x2, r1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r2, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) 23:44:41 executing program 5: r0 = socket$kcm(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 229.650558][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 229.656534][ C1] protocol 88fb is buggy, dev hsr_slave_1 23:44:41 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="230000001e0081ae00060c74000f0005020000006c0000f28701086fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 23:44:41 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000004c0)) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000bc40)={0x12, 0xf, &(0x7f0000000100)=ANY=[@ANYBLOB="950000000000a3bdcd4dc1d36a88e74bfc5200000ed02d72c1e65e59488dfdad16657c4b5d738cfc1b06d24dc48476fdbe33277b6d32539c877696c630a8ce2dabc83747245b2f7396ab70993afc59e00018b40fa83d1a303734e1fe468587aede270232a3f97e1ae25ebe3c82187b4d6b1dae8e90db0884940b6b73cc1be0"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x2, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000400)={0x7, 0x70, 0x80000001, 0x8, 0x1f, 0x0, 0x0, 0x4, 0x10000, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x1fe00000000, 0x401, 0xfffffffffffffffe, 0x8, 0x400, 0x3, 0x0, 0x2, 0x3, 0x0, 0x9, 0x1, 0x79, 0x0, 0x5, 0x1, 0x100000000, 0x9, 0x1, 0x0, 0x8001, 0x80000000000004, @perf_bp={0x0}, 0x10, 0x1ffc0000000, 0x5, 0x0, 0x2, 0x8, 0x80000001}, 0x0, 0xc, r1, 0x200b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='procsecuritytrusted\x00', r2}, 0x10) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x3, 0xff, 0xffffffff, 0x81, 0x0, 0x6, 0x0, 0x1, 0x1, 0x100, 0x1, 0x1, 0x1, 0xe24, 0x5, 0x7be, 0x0, 0x9ca, 0x3, 0x9, 0x401, 0x0, 0x2, 0x4, 0x0, 0x4, 0x100000000, 0xffffffffffff3403, 0x10001, 0x100000001, 0x3f, 0x85, 0x7, 0x9, 0x7, 0x200, 0x0, 0x5, 0x1, @perf_bp={0x0, 0x8}, 0x8000, 0x2, 0x7, 0x0, 0x0, 0x401, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x9) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x20, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r3, &(0x7f0000000500)="f2a7043473b889e64db28925a6d0f0652d89d95295c95be995da7ba0e3d1adad91f3bbe8e88018ac15e97b634e774481c7320eb06133ebf4c9502cc755f88ec0c258efe9938c9edbf6ec55685be2812771e7a575f393a50ea80eeaa28b18a2b0cd85855e5902b9f0902f", 0x0}, 0x18) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000240)=0x101) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) getpid() bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/114}, 0x18) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) sendmsg$kcm(r6, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r6, &(0x7f0000000280)={[{0x67dc0000, 'memory'}]}, 0xfdef) 23:44:41 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 23:44:41 executing program 4: r0 = gettid() r1 = perf_event_open$cgroup(&(0x7f0000000580)={0x7, 0x70, 0x3, 0x0, 0x1000, 0x7, 0x0, 0x7, 0x1020, 0x0, 0x2, 0x7, 0x3, 0x0, 0x3, 0x6, 0x7, 0x80000000, 0x9, 0x5, 0x2, 0x0, 0x8001, 0x3ddd, 0x8001, 0x0, 0x3f, 0x42, 0x6, 0x2, 0xe, 0x8, 0x80000001, 0xb1c, 0x7fff, 0x3ff, 0x3, 0xffff, 0x0, 0x7, 0x1, @perf_bp={0x0, 0x2}, 0x1193, 0x1, 0x3, 0x7, 0xffff, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x2) perf_event_open(0x0, r0, 0x2, r1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r2, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) [ 229.961982][T14885] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.2'. 23:44:41 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="230000001e0081ae00060c74000f0005020000006c0000f28701086fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 23:44:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xf, 0x4, 0x4000000004, 0xffff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x3c) 23:44:42 executing program 0: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) r4 = socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000004c0)={0x2, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={0x0, 0x0, 0xa}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r5, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dff"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r4, &(0x7f0000000900)={&(0x7f0000000700)=@sco={0x1f, {0x0, 0x5, 0x1, 0x3ff, 0x5, 0x8bf1}}, 0x80, 0x0, 0x0, &(0x7f0000000780)}, 0x40000) 23:44:42 executing program 4: r0 = gettid() r1 = perf_event_open$cgroup(&(0x7f0000000580)={0x7, 0x70, 0x3, 0x0, 0x1000, 0x7, 0x0, 0x7, 0x1020, 0x0, 0x2, 0x7, 0x3, 0x0, 0x3, 0x6, 0x7, 0x80000000, 0x9, 0x5, 0x2, 0x0, 0x8001, 0x3ddd, 0x8001, 0x0, 0x3f, 0x42, 0x6, 0x2, 0xe, 0x8, 0x80000001, 0xb1c, 0x7fff, 0x3ff, 0x3, 0xffff, 0x0, 0x7, 0x1, @perf_bp={0x0, 0x2}, 0x1193, 0x1, 0x3, 0x7, 0xffff, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x2) perf_event_open(0x0, r0, 0x2, r1, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r2, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) 23:44:42 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000004c0)) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000bc40)={0x12, 0xf, &(0x7f0000000100)=ANY=[@ANYBLOB="950000000000a3bdcd4dc1d36a88e74bfc5200000ed02d72c1e65e59488dfdad16657c4b5d738cfc1b06d24dc48476fdbe33277b6d32539c877696c630a8ce2dabc83747245b2f7396ab70993afc59e00018b40fa83d1a303734e1fe468587aede270232a3f97e1ae25ebe3c82187b4d6b1dae8e90db0884940b6b73cc1be0"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x2, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000400)={0x7, 0x70, 0x80000001, 0x8, 0x1f, 0x0, 0x0, 0x4, 0x10000, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x1fe00000000, 0x401, 0xfffffffffffffffe, 0x8, 0x400, 0x3, 0x0, 0x2, 0x3, 0x0, 0x9, 0x1, 0x79, 0x0, 0x5, 0x1, 0x100000000, 0x9, 0x1, 0x0, 0x8001, 0x80000000000004, @perf_bp={0x0}, 0x10, 0x1ffc0000000, 0x5, 0x0, 0x2, 0x8, 0x80000001}, 0x0, 0xc, r1, 0x200b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='procsecuritytrusted\x00', r2}, 0x10) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x3, 0xff, 0xffffffff, 0x81, 0x0, 0x6, 0x0, 0x1, 0x1, 0x100, 0x1, 0x1, 0x1, 0xe24, 0x5, 0x7be, 0x0, 0x9ca, 0x3, 0x9, 0x401, 0x0, 0x2, 0x4, 0x0, 0x4, 0x100000000, 0xffffffffffff3403, 0x10001, 0x100000001, 0x3f, 0x85, 0x7, 0x9, 0x7, 0x200, 0x0, 0x5, 0x1, @perf_bp={0x0, 0x8}, 0x8000, 0x2, 0x7, 0x0, 0x0, 0x401, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x9) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x20, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r3, &(0x7f0000000500)="f2a7043473b889e64db28925a6d0f0652d89d95295c95be995da7ba0e3d1adad91f3bbe8e88018ac15e97b634e774481c7320eb06133ebf4c9502cc755f88ec0c258efe9938c9edbf6ec55685be2812771e7a575f393a50ea80eeaa28b18a2b0cd85855e5902b9f0902f", 0x0}, 0x18) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000240)=0x101) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) getpid() bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/114}, 0x18) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) sendmsg$kcm(r6, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r6, &(0x7f0000000280)={[{0x67dc0000, 'memory'}]}, 0xfdef) [ 230.411620][T14905] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.2'. 23:44:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xf, 0x4, 0x4000000004, 0xffff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x3c) 23:44:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="230000001e0081ae00060c74000f0005020000006c0000f28701086fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 23:44:42 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 23:44:42 executing program 4: socket$kcm(0x10, 0x0, 0x4) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x20004040) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x20000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 230.691898][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 230.697748][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 230.727050][T14911] device nr0 entered promiscuous mode [ 230.765965][T14919] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.2'. [ 230.777083][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 230.777141][ C1] protocol 88fb is buggy, dev hsr_slave_1 23:44:42 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000004c0)) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000bc40)={0x12, 0xf, &(0x7f0000000100)=ANY=[@ANYBLOB="950000000000a3bdcd4dc1d36a88e74bfc5200000ed02d72c1e65e59488dfdad16657c4b5d738cfc1b06d24dc48476fdbe33277b6d32539c877696c630a8ce2dabc83747245b2f7396ab70993afc59e00018b40fa83d1a303734e1fe468587aede270232a3f97e1ae25ebe3c82187b4d6b1dae8e90db0884940b6b73cc1be0"], 0x0, 0x0, 0x0, 0x0, 0x41f00, 0x2, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000400)={0x7, 0x70, 0x80000001, 0x8, 0x1f, 0x0, 0x0, 0x4, 0x10000, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x1fe00000000, 0x401, 0xfffffffffffffffe, 0x8, 0x400, 0x3, 0x0, 0x2, 0x3, 0x0, 0x9, 0x1, 0x79, 0x0, 0x5, 0x1, 0x100000000, 0x9, 0x1, 0x0, 0x8001, 0x80000000000004, @perf_bp={0x0}, 0x10, 0x1ffc0000000, 0x5, 0x0, 0x2, 0x8, 0x80000001}, 0x0, 0xc, r1, 0x200b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='procsecuritytrusted\x00', r2}, 0x10) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x3, 0xff, 0xffffffff, 0x81, 0x0, 0x6, 0x0, 0x1, 0x1, 0x100, 0x1, 0x1, 0x1, 0xe24, 0x5, 0x7be, 0x0, 0x9ca, 0x3, 0x9, 0x401, 0x0, 0x2, 0x4, 0x0, 0x4, 0x100000000, 0xffffffffffff3403, 0x10001, 0x100000001, 0x3f, 0x85, 0x7, 0x9, 0x7, 0x200, 0x0, 0x5, 0x1, @perf_bp={0x0, 0x8}, 0x8000, 0x2, 0x7, 0x0, 0x0, 0x401, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x9) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x20, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r3, &(0x7f0000000500)="f2a7043473b889e64db28925a6d0f0652d89d95295c95be995da7ba0e3d1adad91f3bbe8e88018ac15e97b634e774481c7320eb06133ebf4c9502cc755f88ec0c258efe9938c9edbf6ec55685be2812771e7a575f393a50ea80eeaa28b18a2b0cd85855e5902b9f0902f", 0x0}, 0x18) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000240)=0x101) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) getpid() bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/114}, 0x18) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) sendmsg$kcm(r6, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r6, &(0x7f0000000280)={[{0x67dc0000, 'memory'}]}, 0xfdef) [ 230.850502][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 230.856400][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:44:42 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) 23:44:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xf, 0x4, 0x4000000004, 0xffff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x3c) 23:44:42 executing program 2: socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x5, 0x10}, 0xc) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x48024, 0x8, 0x3, 0x0, 0x145, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x1, 0x0, 0x7f, 0x5, 0x5, 0x200, 0x101, 0x101, 0xffffffffffffffff, 0x7, 0x8001, 0x4, 0x3, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x22, 0x2, @perf_bp={0x0, 0x8}, 0x8000, 0x0, 0x7, 0x4, 0x10001, 0x0, 0x100000000}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x681, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) 23:44:43 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) [ 231.520224][T14940] device nr0 entered promiscuous mode 23:44:43 executing program 0: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) r4 = socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000004c0)={0x2, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={0x0, 0x0, 0xa}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r5, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dff"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r4, &(0x7f0000000900)={&(0x7f0000000700)=@sco={0x1f, {0x0, 0x5, 0x1, 0x3ff, 0x5, 0x8bf1}}, 0x80, 0x0, 0x0, &(0x7f0000000780)}, 0x40000) 23:44:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xf, 0x4, 0x4000000004, 0xffff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x3c) 23:44:43 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0980c37023072a556d1c958c00"/46, 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) 23:44:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair(0x10, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x10d, 0x2, &(0x7f0000000040)=r0, 0x5d) 23:44:43 executing program 4: socket$kcm(0x10, 0x0, 0x4) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x20004040) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x20000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 231.737716][T14939] device nr0 entered promiscuous mode 23:44:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair(0x10, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x10d, 0x2, &(0x7f0000000040)=r0, 0x5d) 23:44:43 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0980c37023072a556d1c958c00"/46, 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) 23:44:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair(0x10, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x10d, 0x2, &(0x7f0000000040)=r0, 0x5d) 23:44:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair(0x10, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x10d, 0x2, &(0x7f0000000040)=r0, 0x5d) 23:44:44 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0980c37023072a556d1c958c00"/46, 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) 23:44:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair(0x10, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x10d, 0x2, &(0x7f0000000040)=r0, 0x5d) 23:44:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair(0x10, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x10d, 0x2, &(0x7f0000000040)=r0, 0x5d) [ 232.482424][T14973] device nr0 entered promiscuous mode 23:44:44 executing program 0: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) r4 = socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000004c0)={0x2, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={0x0, 0x0, 0xa}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r5, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dff"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r4, &(0x7f0000000900)={&(0x7f0000000700)=@sco={0x1f, {0x0, 0x5, 0x1, 0x3ff, 0x5, 0x8bf1}}, 0x80, 0x0, 0x0, &(0x7f0000000780)}, 0x40000) 23:44:44 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0980c37023072a556d1c958c00"/46, 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) 23:44:44 executing program 2: socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x5, 0x10}, 0xc) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x48024, 0x8, 0x3, 0x0, 0x145, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x1, 0x0, 0x7f, 0x5, 0x5, 0x200, 0x101, 0x101, 0xffffffffffffffff, 0x7, 0x8001, 0x4, 0x3, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x22, 0x2, @perf_bp={0x0, 0x8}, 0x8000, 0x0, 0x7, 0x4, 0x10001, 0x0, 0x100000000}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x681, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) 23:44:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair(0x10, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x10d, 0x2, &(0x7f0000000040)=r0, 0x5d) 23:44:44 executing program 1: socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x5, 0x10}, 0xc) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x48024, 0x8, 0x3, 0x0, 0x145, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x1, 0x0, 0x7f, 0x5, 0x5, 0x200, 0x101, 0x101, 0xffffffffffffffff, 0x7, 0x8001, 0x4, 0x3, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x22, 0x2, @perf_bp={0x0, 0x8}, 0x8000, 0x0, 0x7, 0x4, 0x10001, 0x0, 0x100000000}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x681, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) 23:44:44 executing program 4: socket$kcm(0x10, 0x0, 0x4) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x20004040) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x20000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 23:44:44 executing program 3: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) r4 = socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000004c0)={0x2, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={0x0, 0x0, 0xa}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r5, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dff"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r4, &(0x7f0000000900)={&(0x7f0000000700)=@sco={0x1f, {0x0, 0x5, 0x1, 0x3ff, 0x5, 0x8bf1}}, 0x80, 0x0, 0x0, &(0x7f0000000780)}, 0x40000) 23:44:44 executing program 5: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) r4 = socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000004c0)={0x2, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={0x0, 0x0, 0xa}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r5, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dff"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r4, &(0x7f0000000900)={&(0x7f0000000700)=@sco={0x1f, {0x0, 0x5, 0x1, 0x3ff, 0x5, 0x8bf1}}, 0x80, 0x0, 0x0, &(0x7f0000000780)}, 0x40000) [ 233.166483][T15004] device nr0 entered promiscuous mode [ 233.296529][T15022] device nr0 entered promiscuous mode [ 233.334650][T15021] device nr0 entered promiscuous mode 23:44:45 executing program 4: socket$kcm(0x10, 0x0, 0x4) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x20004040) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x20000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 233.389404][T15036] device nr0 entered promiscuous mode [ 233.636043][T15041] device nr0 entered promiscuous mode 23:44:45 executing program 2: socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x5, 0x10}, 0xc) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x48024, 0x8, 0x3, 0x0, 0x145, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x1, 0x0, 0x7f, 0x5, 0x5, 0x200, 0x101, 0x101, 0xffffffffffffffff, 0x7, 0x8001, 0x4, 0x3, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x22, 0x2, @perf_bp={0x0, 0x8}, 0x8000, 0x0, 0x7, 0x4, 0x10001, 0x0, 0x100000000}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x681, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) 23:44:45 executing program 1: socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x5, 0x10}, 0xc) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x48024, 0x8, 0x3, 0x0, 0x145, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x1, 0x0, 0x7f, 0x5, 0x5, 0x200, 0x101, 0x101, 0xffffffffffffffff, 0x7, 0x8001, 0x4, 0x3, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x22, 0x2, @perf_bp={0x0, 0x8}, 0x8000, 0x0, 0x7, 0x4, 0x10001, 0x0, 0x100000000}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x681, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) 23:44:45 executing program 4: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) r4 = socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000004c0)={0x2, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={0x0, 0x0, 0xa}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r5, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dff"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r4, &(0x7f0000000900)={&(0x7f0000000700)=@sco={0x1f, {0x0, 0x5, 0x1, 0x3ff, 0x5, 0x8bf1}}, 0x80, 0x0, 0x0, &(0x7f0000000780)}, 0x40000) 23:44:46 executing program 0: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) r4 = socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000004c0)={0x2, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={0x0, 0x0, 0xa}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r5, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dff"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r4, &(0x7f0000000900)={&(0x7f0000000700)=@sco={0x1f, {0x0, 0x5, 0x1, 0x3ff, 0x5, 0x8bf1}}, 0x80, 0x0, 0x0, &(0x7f0000000780)}, 0x40000) 23:44:46 executing program 3: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) r4 = socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000004c0)={0x2, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={0x0, 0x0, 0xa}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r5, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dff"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r4, &(0x7f0000000900)={&(0x7f0000000700)=@sco={0x1f, {0x0, 0x5, 0x1, 0x3ff, 0x5, 0x8bf1}}, 0x80, 0x0, 0x0, &(0x7f0000000780)}, 0x40000) 23:44:46 executing program 5: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) r4 = socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000004c0)={0x2, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={0x0, 0x0, 0xa}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r5, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dff"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r4, &(0x7f0000000900)={&(0x7f0000000700)=@sco={0x1f, {0x0, 0x5, 0x1, 0x3ff, 0x5, 0x8bf1}}, 0x80, 0x0, 0x0, &(0x7f0000000780)}, 0x40000) [ 234.597741][T15062] device nr0 entered promiscuous mode [ 234.621510][T15065] device nr0 entered promiscuous mode [ 234.707510][T15061] device nr0 entered promiscuous mode [ 235.099994][T15090] device nr0 entered promiscuous mode [ 235.137101][T15095] device nr0 entered promiscuous mode 23:44:47 executing program 4: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) r4 = socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000004c0)={0x2, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={0x0, 0x0, 0xa}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r5, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dff"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r4, &(0x7f0000000900)={&(0x7f0000000700)=@sco={0x1f, {0x0, 0x5, 0x1, 0x3ff, 0x5, 0x8bf1}}, 0x80, 0x0, 0x0, &(0x7f0000000780)}, 0x40000) 23:44:47 executing program 1: socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x5, 0x10}, 0xc) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x48024, 0x8, 0x3, 0x0, 0x145, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x1, 0x0, 0x7f, 0x5, 0x5, 0x200, 0x101, 0x101, 0xffffffffffffffff, 0x7, 0x8001, 0x4, 0x3, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x22, 0x2, @perf_bp={0x0, 0x8}, 0x8000, 0x0, 0x7, 0x4, 0x10001, 0x0, 0x100000000}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x681, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) 23:44:47 executing program 3: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) r4 = socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000004c0)={0x2, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={0x0, 0x0, 0xa}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r5, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dff"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r4, &(0x7f0000000900)={&(0x7f0000000700)=@sco={0x1f, {0x0, 0x5, 0x1, 0x3ff, 0x5, 0x8bf1}}, 0x80, 0x0, 0x0, &(0x7f0000000780)}, 0x40000) 23:44:47 executing program 0: socket$kcm(0x10, 0x0, 0x4) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x20004040) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x20000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 23:44:47 executing program 2: socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x5, 0x10}, 0xc) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x48024, 0x8, 0x3, 0x0, 0x145, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x1, 0x0, 0x7f, 0x5, 0x5, 0x200, 0x101, 0x101, 0xffffffffffffffff, 0x7, 0x8001, 0x4, 0x3, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x22, 0x2, @perf_bp={0x0, 0x8}, 0x8000, 0x0, 0x7, 0x4, 0x10001, 0x0, 0x100000000}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x681, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) [ 235.890553][ C1] net_ratelimit: 8 callbacks suppressed [ 235.890563][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 235.902044][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 235.967106][T15109] device nr0 entered promiscuous mode [ 235.993167][T15110] device nr0 entered promiscuous mode 23:44:47 executing program 5: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) r4 = socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000004c0)={0x2, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={0x0, 0x0, 0xa}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r5, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dff"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r4, &(0x7f0000000900)={&(0x7f0000000700)=@sco={0x1f, {0x0, 0x5, 0x1, 0x3ff, 0x5, 0x8bf1}}, 0x80, 0x0, 0x0, &(0x7f0000000780)}, 0x40000) [ 236.143019][T15123] device nr0 entered promiscuous mode [ 236.482004][T15134] device nr0 entered promiscuous mode 23:44:48 executing program 1: socket$kcm(0x10, 0x0, 0x4) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x20004040) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x20000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 236.692414][T15142] device nr0 entered promiscuous mode 23:44:48 executing program 0: socket$kcm(0x10, 0x0, 0x4) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x20004040) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x20000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 236.930593][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 236.936396][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:44:48 executing program 3: socket$kcm(0x10, 0x0, 0x4) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x20004040) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x20000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 237.010559][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 237.016421][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 237.091106][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 237.097375][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:44:49 executing program 4: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002f008163e44cc91b4dd65b2f0680c37023072a556d1c958c000000000000000000004003000000000000", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) r4 = socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x3fff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000004c0)={0x2, &(0x7f0000000400)=[{0x4, 0x7, 0x0, 0x5}, {0x5, 0x7de, 0x8, 0x14000000000000}]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={0x0, 0x0, 0xa}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r5, &(0x7f0000000240)="999c2407c586e49d5114d212ccdad0d1d5d2922d3874702fcd67146b625c0a219cd459d753255851a63d5b266815d7ec7b0727e0c7033fbb50ed7ce482871be31e0de57c3d79b05dff"}, 0x10) socket$kcm(0xa, 0x2, 0x11) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r4, &(0x7f0000000900)={&(0x7f0000000700)=@sco={0x1f, {0x0, 0x5, 0x1, 0x3ff, 0x5, 0x8bf1}}, 0x80, 0x0, 0x0, &(0x7f0000000780)}, 0x40000) 23:44:49 executing program 1: socket$kcm(0x10, 0x0, 0x4) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x20004040) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x20000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 23:44:49 executing program 3: socket$kcm(0x10, 0x0, 0x4) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x20004040) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x20000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 23:44:49 executing program 2: socket$kcm(0x10, 0x0, 0x4) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x20004040) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x20000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 23:44:49 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x7, 0x5, &(0x7f0000000000)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000080)='GPL\x00', 0x6, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 23:44:49 executing program 0: socket$kcm(0x10, 0x0, 0x4) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x20004040) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x20000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 237.570549][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 237.576419][ C1] protocol 88fb is buggy, dev hsr_slave_1 23:44:49 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x7, 0x5, &(0x7f0000000000)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000080)='GPL\x00', 0x6, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 23:44:49 executing program 2: socket$kcm(0x10, 0x0, 0x4) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x20004040) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x20000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 237.905130][T15174] device nr0 entered promiscuous mode 23:44:49 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x7, 0x5, &(0x7f0000000000)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000080)='GPL\x00', 0x6, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 23:44:49 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x7, 0x5, &(0x7f0000000000)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000080)='GPL\x00', 0x6, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 23:44:49 executing program 1: socket$kcm(0x10, 0x0, 0x4) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x20004040) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x20000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 23:44:50 executing program 3: socket$kcm(0x10, 0x0, 0x4) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x20004040) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x20000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 23:44:50 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x7, 0x5, &(0x7f0000000000)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000080)='GPL\x00', 0x6, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 23:44:50 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x7, 0x5, &(0x7f0000000000)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000080)='GPL\x00', 0x6, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 23:44:50 executing program 2: socket$kcm(0x10, 0x0, 0x4) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0}, 0x20004040) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x20000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 23:44:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000003100817ee45ae087185082cf0424b0eba06ec400002339e00586f9075b3f00169148790700d90080e230", 0x2e}], 0x1}, 0x0) 23:44:50 executing program 1: r0 = socket$kcm(0x2, 0x0, 0x84) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={0x0}, 0x10) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000400)={r0}) setsockopt$sock_attach_bpf(r3, 0x84, 0xd, &(0x7f0000000180), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000005c00)={&(0x7f00000058c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000005b40)=[{&(0x7f0000005940)=""/90, 0x5a}, {0x0}, {&(0x7f0000005a00)=""/149, 0x95}], 0x3, &(0x7f0000005b80)=""/100, 0x64}, 0x2000) sendmsg$kcm(r0, &(0x7f0000006040)={&(0x7f0000005c40)=@ll={0x11, 0xf7, r4, 0x1, 0x9}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000005f80)}], 0x1}, 0x20004050) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080), 0x4) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4000000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r2, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x3, 0x3, 0x7f6}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x3}}, 0x10) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) [ 238.652377][T15218] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 23:44:50 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001740)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000003100818be45ae087185082cf0324b0eba06ec400002339ef0586f9075b3f00169148790700d90080e230", 0x2e}], 0x1}, 0x0) 23:44:50 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x7, 0x5, &(0x7f0000000000)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000080)='GPL\x00', 0x6, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 238.787582][T15227] sctp: [Deprecated]: syz-executor.1 (pid 15227) Use of int in maxseg socket option. [ 238.787582][T15227] Use struct sctp_assoc_value instead 23:44:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x80000001, 0x1, 0xfffffffffffffffa, 0xfffffffffffffffa, 0x0, 0x8, 0x40020, 0x2, 0x3, 0x85, 0x966b, 0x4, 0x5, 0x1, 0x737, 0x0, 0x5, 0x1ff, 0x3, 0x2, 0x4, 0x8000, 0x2, 0x5, 0x1, 0xfffffffffffff001, 0x40, 0x6, 0x1ff, 0x9, 0x6, 0x8000, 0x3, 0xfffffffffffffff7, 0x12f, 0x3ff, 0x0, 0xab3, 0x5, @perf_bp={0x0, 0x4}, 0x0, 0x200, 0x1, 0xf, 0x0, 0x19}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb2d, 0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001740)={r1, &(0x7f0000000700)="a23753b16f600fb4db1eab33bbcdab6d18dda500eb700f205b2a06d2f89f1c218237106eee3d9d5bc336ea31aac615f71d9d7b5705f3f217997be9f5726709544f6c0cabfca6a6e31b17a381908fc9101c65f49b1472684880cfb994ef190798528a7d92e800ec2727367e25f9f727f0f651ba2617982b70416867f8a769761570af5d0324161d89bf47250556bc976d762f7e75c2851c5da36e567f5aa0b397f8462ee9910d614d467fdcc118b2a6c40931cdf1c561cecf225dc9c8b47e29e9dca1766a1b96a7ba8df4a1f193367fbc88e6f155c510864ce77366c42df00a7519ab5cbd88bb02c1428d692c5e444eaad49354edb87af1b115d65775fc65abbb28ca4c3858e0b65b554f80b3af68009c10531993669cfbf73934a4d6065595acec6b37253d7a81f3221bd13d183165556e5cc7a58ccf7fc31ef4101ba9095763f0fdca09c7434ec1428621a06b65e59737b9da08b9827913fd2524aea35950f33fc7caf479f38f555194196b85b79bc8a805c0a0d75ce8aed788c7e3702cc8e465afde07a2da01c9f370b09f75eae5b83ffa268c8f8df67d10a82d3e64d51d6a6001810fddc9016edfa358b9743849c88c93af9f6289901cecf1c050ce4a2aa41eef54076c9c661ceaf22041260692bf7d5ec54696c10d89bc1ae959b08583094a684760b429e3f55b7f5d2fa6ad0ec2359ab7298a3491409fb3f25a7815ff2a5c37684c109ed6bcbf140518261d2a74d7c332f58b099114da6806cdb51107b44525c43c6c314cdc51852bcf38c876077a409b6d230c51f4c81d1052ded1c9382ac05b305d9b930a9b20802dbe872be5f55a1ec3a051b4a61ddeef4e1001f187cf8a6a4a68c8375432a858df7b4ec668d0e5c8b5648814ea7f5866120aa1d81e00b973aedd75b7abe4c2b971aa8523e682e006e3fb95f19a45dd6522067e3e34254ca5233335711295b329bdcd2ee63ad0549c96824611813e983747d27bd19c520a25979f4fb0b8526b17ba48f53b20f5d9166ba0980ca88551eac7ab9d1b036edb61e95db44accd0e1203f1647f2f939c8de0ae6d1878664b1ffb8d05944070864844936eb81d7bf7b750a0c1ed9095b29282dadde6df81a88dcba974f0706164d2e4d8c32c31f097c599a0335ce8f9a367a894df37e344fb74959c0433e90b3d7fe242826ce938131496f962c7b9dcb7eae14aa4e4da9e0f3957d936a4254af429376a357ac0af69d919fb7119d02dbe81dd1e664c07088d77f5e3510fbb2d4080a052fe67b360650957f436ff7477ac75e007e5d38d5a0f4dd637a02e914e34deace274a573421667dd188ec1576edff545ea6ac496e38b961cd161d2126029a481689119b63155703bdff6e4479a113aafdf387fd8741194e87e610daa1cfd4e1b845a161ff1935f15fb190565bfe9568f07754315b75fe20841534b252fbbad8bcd3e7406729bc6a74f11a21d19ab703e7d2c7076ec97fcc435537c2f8f8af3195c914fb57ea3aca02c02a0e8565db94c40e99bc8039f3d6091f873e18f8e2972fb330e9d9b3ade7ef06cf05742a6b008858ba666d47748cc2849656d7d434cbbfb2800b0cbde60cbc9bbddf1918e2371e7f356c8772fd6a47b0bec6e228a0248a03324012f5b4a6b727ac1875f36f762d1281db445416a273500ca82208d6f7bc9b1167d4f621229ceba6e7de6f02108a1fdbf0741210b48ed27a74e4005849bd27dd007b179099dd1cdd86f10bca4fad9e9efc1bbc7c690e5fd88c443215c28872ab33e149fb8bf90d0af75d81d6b8dc4e373ca7dd7f58f8ddf0c47ba7a3b99b25e966c60f9fbbeeb2fc6f83a697515b02e5687eff61033df0c2b674dcc04fa33682805ad9e13914399158b8d10e1ad12dd6bd80a9d50275a0dc2e7c61c6c5f17859668d625933ed51128177e0d6ec7d003bb64d8ab366b8494bd70ed8afb43774da9226e9bc7f99e05d9fb101fd62799d2078269599a0a40ba3c4f6674630c35143547504cc976e7d7e4e6119a329727e816790ca3f0d67fa663dcc4cf1949e54e1155d769d8539a0cca974a1b7eba20ae8bb48c78c9eb5062dfb97200278b4e2cce6e611a4b06ca0707d50cd1e293021e84e885296efcfed17905afa15d07f941ad4026b51fbad7e571f070c911540e6aa81d4d6265e06fbf71edaaa6ca4df26a56b5d0d5a50e1e4f366b27bfb025f476f589e80706dd20bd422711eefaddb6d9d497ed6031f03ab343c588887be432b3409c174286920251433288db2c760738fd6d6b69b34b305f6372c12c9b63d45aab5dc8b82dd482103647c32b992c06540a2e009f52757d26b1c71c6dc9686ff7c485ca6b500d5d1a355986133922b8e997863615f9c61ce192929d2fb0a3f5d0dc48e69dbd5b7f5bb964643b1d2dda2675b1a3eb22f133600da67374c7aed59bb4e5cd1036009d0f7a37ea86d769e2216f4782ed3483a73e647147a5821f8ea4e5458e47cec602a6652a5f0f2a92c6362fa443df94d177c068c83ca7043e3016f5e28190ec54cba267928de044db0514d7f77f5f8c24aade3d68eddbbf6c4bb17197e6ec2e9225b59d8660ac5b82a3d47ea6f2f194d89af92c52e3c6e9d4c7969b805fb40127edb38786f6d4a0f30ee5e1652bcff21772a1c71b4ff458f1697af36b3550f9312a3ca72ded0cb64dc26ac70c47b4770904590870b14831494a6cebea2410d32171a89e0f932157fcd087fd7223de0c93a66295b27a77c05c0024c19223863d53c3efc968af097ed8399c49a26e79cc826c97733771c302ed31959b4e6cea46a795f0d0eb217eb84efc7ece13819519c40676fa9a57b0ae614bf9b3c8911ce7853dd38dcaf5aaa1c723c3fc458257beb69de78c76c481a6427aecaf2c5834a60487db9d3d9"}, 0x10) r4 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) recvmsg$kcm(r5, &(0x7f000000d080)={&(0x7f000000bd80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000cf40)=[{&(0x7f000000be00)=""/37, 0x25}, {&(0x7f000000be40)=""/4096, 0x1000}, {&(0x7f000000ce40)=""/238, 0xee}], 0x3, &(0x7f000000cf80)=""/193, 0xc1}, 0x40000002) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r3, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000001c00)={0x17, 0x0, &(0x7f0000000080), &(0x7f0000000340)='syzkaller\x00', 0x57, 0xf0, &(0x7f0000001780)=""/240, 0x41100, 0x2, [], 0x0, 0xc, r4, 0x8, &(0x7f0000001700)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000001bc0)={0x2, 0x9, 0x10001, 0x8}, 0x10}, 0x70) 23:44:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000003100817ee45ae087185082cf0424b0eba06ec400002339e00586f9075b3f00169148790700d90080e230", 0x2e}], 0x1}, 0x0) 23:44:50 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e00000010008108040f80ecdb4cb9c00a480e1811000000e8bd6efb120009000e002100400000ff050005bf0086", 0x2e}], 0x1}, 0x0) [ 238.971678][T15227] sctp: [Deprecated]: syz-executor.1 (pid 15227) Use of int in maxseg socket option. [ 238.971678][T15227] Use struct sctp_assoc_value instead 23:44:50 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001740)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000003100818be45ae087185082cf0324b0eba06ec400002339ef0586f9075b3f00169148790700d90080e230", 0x2e}], 0x1}, 0x0) 23:44:50 executing program 3: close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x167) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x6, [@typedef={0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0x3}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0xca}}, @func_proto]}, {0x0, [0xb55e109fe4e8d9d1, 0x61, 0x0, 0x7f]}}, &(0x7f00000003c0)=""/4096, 0x66, 0x1000, 0x1}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x1}) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x4, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000200)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 239.059970][T15245] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 23:44:51 executing program 1: r0 = socket$kcm(0x2, 0x0, 0x84) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={0x0}, 0x10) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000400)={r0}) setsockopt$sock_attach_bpf(r3, 0x84, 0xd, &(0x7f0000000180), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000005c00)={&(0x7f00000058c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000005b40)=[{&(0x7f0000005940)=""/90, 0x5a}, {0x0}, {&(0x7f0000005a00)=""/149, 0x95}], 0x3, &(0x7f0000005b80)=""/100, 0x64}, 0x2000) sendmsg$kcm(r0, &(0x7f0000006040)={&(0x7f0000005c40)=@ll={0x11, 0xf7, r4, 0x1, 0x9}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000005f80)}], 0x1}, 0x20004050) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080), 0x4) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4000000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r2, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x3, 0x3, 0x7f6}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x3}}, 0x10) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) [ 239.188100][T15250] validate_nla: 18 callbacks suppressed [ 239.188149][T15250] netlink: 'syz-executor.2': attribute type 33 has an invalid length. 23:44:51 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e00000010008108040f80ecdb4cb9c00a480e1811000000e8bd6efb120009000e002100400000ff050005bf0086", 0x2e}], 0x1}, 0x0) 23:44:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000003100817ee45ae087185082cf0424b0eba06ec400002339e00586f9075b3f00169148790700d90080e230", 0x2e}], 0x1}, 0x0) 23:44:51 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001740)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000003100818be45ae087185082cf0324b0eba06ec400002339ef0586f9075b3f00169148790700d90080e230", 0x2e}], 0x1}, 0x0) [ 239.363726][T15261] sctp: [Deprecated]: syz-executor.1 (pid 15261) Use of int in maxseg socket option. [ 239.363726][T15261] Use struct sctp_assoc_value instead [ 239.369020][T15264] netlink: 'syz-executor.2': attribute type 33 has an invalid length. 23:44:51 executing program 3: close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x167) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x6, [@typedef={0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0x3}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0xca}}, @func_proto]}, {0x0, [0xb55e109fe4e8d9d1, 0x61, 0x0, 0x7f]}}, &(0x7f00000003c0)=""/4096, 0x66, 0x1000, 0x1}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x1}) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x4, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000200)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 239.438362][T15267] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 23:44:51 executing program 3: close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x167) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x6, [@typedef={0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0x3}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0xca}}, @func_proto]}, {0x0, [0xb55e109fe4e8d9d1, 0x61, 0x0, 0x7f]}}, &(0x7f00000003c0)=""/4096, 0x66, 0x1000, 0x1}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x1}) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x4, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000200)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(0xffffffffffffffff, 0x0, 0x0) 23:44:51 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e00000010008108040f80ecdb4cb9c00a480e1811000000e8bd6efb120009000e002100400000ff050005bf0086", 0x2e}], 0x1}, 0x0) 23:44:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x80000001, 0x1, 0xfffffffffffffffa, 0xfffffffffffffffa, 0x0, 0x8, 0x40020, 0x2, 0x3, 0x85, 0x966b, 0x4, 0x5, 0x1, 0x737, 0x0, 0x5, 0x1ff, 0x3, 0x2, 0x4, 0x8000, 0x2, 0x5, 0x1, 0xfffffffffffff001, 0x40, 0x6, 0x1ff, 0x9, 0x6, 0x8000, 0x3, 0xfffffffffffffff7, 0x12f, 0x3ff, 0x0, 0xab3, 0x5, @perf_bp={0x0, 0x4}, 0x0, 0x200, 0x1, 0xf, 0x0, 0x19}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb2d, 0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001740)={r1, &(0x7f0000000700)="a23753b16f600fb4db1eab33bbcdab6d18dda500eb700f205b2a06d2f89f1c218237106eee3d9d5bc336ea31aac615f71d9d7b5705f3f217997be9f5726709544f6c0cabfca6a6e31b17a381908fc9101c65f49b1472684880cfb994ef190798528a7d92e800ec2727367e25f9f727f0f651ba2617982b70416867f8a769761570af5d0324161d89bf47250556bc976d762f7e75c2851c5da36e567f5aa0b397f8462ee9910d614d467fdcc118b2a6c40931cdf1c561cecf225dc9c8b47e29e9dca1766a1b96a7ba8df4a1f193367fbc88e6f155c510864ce77366c42df00a7519ab5cbd88bb02c1428d692c5e444eaad49354edb87af1b115d65775fc65abbb28ca4c3858e0b65b554f80b3af68009c10531993669cfbf73934a4d6065595acec6b37253d7a81f3221bd13d183165556e5cc7a58ccf7fc31ef4101ba9095763f0fdca09c7434ec1428621a06b65e59737b9da08b9827913fd2524aea35950f33fc7caf479f38f555194196b85b79bc8a805c0a0d75ce8aed788c7e3702cc8e465afde07a2da01c9f370b09f75eae5b83ffa268c8f8df67d10a82d3e64d51d6a6001810fddc9016edfa358b9743849c88c93af9f6289901cecf1c050ce4a2aa41eef54076c9c661ceaf22041260692bf7d5ec54696c10d89bc1ae959b08583094a684760b429e3f55b7f5d2fa6ad0ec2359ab7298a3491409fb3f25a7815ff2a5c37684c109ed6bcbf140518261d2a74d7c332f58b099114da6806cdb51107b44525c43c6c314cdc51852bcf38c876077a409b6d230c51f4c81d1052ded1c9382ac05b305d9b930a9b20802dbe872be5f55a1ec3a051b4a61ddeef4e1001f187cf8a6a4a68c8375432a858df7b4ec668d0e5c8b5648814ea7f5866120aa1d81e00b973aedd75b7abe4c2b971aa8523e682e006e3fb95f19a45dd6522067e3e34254ca5233335711295b329bdcd2ee63ad0549c96824611813e983747d27bd19c520a25979f4fb0b8526b17ba48f53b20f5d9166ba0980ca88551eac7ab9d1b036edb61e95db44accd0e1203f1647f2f939c8de0ae6d1878664b1ffb8d05944070864844936eb81d7bf7b750a0c1ed9095b29282dadde6df81a88dcba974f0706164d2e4d8c32c31f097c599a0335ce8f9a367a894df37e344fb74959c0433e90b3d7fe242826ce938131496f962c7b9dcb7eae14aa4e4da9e0f3957d936a4254af429376a357ac0af69d919fb7119d02dbe81dd1e664c07088d77f5e3510fbb2d4080a052fe67b360650957f436ff7477ac75e007e5d38d5a0f4dd637a02e914e34deace274a573421667dd188ec1576edff545ea6ac496e38b961cd161d2126029a481689119b63155703bdff6e4479a113aafdf387fd8741194e87e610daa1cfd4e1b845a161ff1935f15fb190565bfe9568f07754315b75fe20841534b252fbbad8bcd3e7406729bc6a74f11a21d19ab703e7d2c7076ec97fcc435537c2f8f8af3195c914fb57ea3aca02c02a0e8565db94c40e99bc8039f3d6091f873e18f8e2972fb330e9d9b3ade7ef06cf05742a6b008858ba666d47748cc2849656d7d434cbbfb2800b0cbde60cbc9bbddf1918e2371e7f356c8772fd6a47b0bec6e228a0248a03324012f5b4a6b727ac1875f36f762d1281db445416a273500ca82208d6f7bc9b1167d4f621229ceba6e7de6f02108a1fdbf0741210b48ed27a74e4005849bd27dd007b179099dd1cdd86f10bca4fad9e9efc1bbc7c690e5fd88c443215c28872ab33e149fb8bf90d0af75d81d6b8dc4e373ca7dd7f58f8ddf0c47ba7a3b99b25e966c60f9fbbeeb2fc6f83a697515b02e5687eff61033df0c2b674dcc04fa33682805ad9e13914399158b8d10e1ad12dd6bd80a9d50275a0dc2e7c61c6c5f17859668d625933ed51128177e0d6ec7d003bb64d8ab366b8494bd70ed8afb43774da9226e9bc7f99e05d9fb101fd62799d2078269599a0a40ba3c4f6674630c35143547504cc976e7d7e4e6119a329727e816790ca3f0d67fa663dcc4cf1949e54e1155d769d8539a0cca974a1b7eba20ae8bb48c78c9eb5062dfb97200278b4e2cce6e611a4b06ca0707d50cd1e293021e84e885296efcfed17905afa15d07f941ad4026b51fbad7e571f070c911540e6aa81d4d6265e06fbf71edaaa6ca4df26a56b5d0d5a50e1e4f366b27bfb025f476f589e80706dd20bd422711eefaddb6d9d497ed6031f03ab343c588887be432b3409c174286920251433288db2c760738fd6d6b69b34b305f6372c12c9b63d45aab5dc8b82dd482103647c32b992c06540a2e009f52757d26b1c71c6dc9686ff7c485ca6b500d5d1a355986133922b8e997863615f9c61ce192929d2fb0a3f5d0dc48e69dbd5b7f5bb964643b1d2dda2675b1a3eb22f133600da67374c7aed59bb4e5cd1036009d0f7a37ea86d769e2216f4782ed3483a73e647147a5821f8ea4e5458e47cec602a6652a5f0f2a92c6362fa443df94d177c068c83ca7043e3016f5e28190ec54cba267928de044db0514d7f77f5f8c24aade3d68eddbbf6c4bb17197e6ec2e9225b59d8660ac5b82a3d47ea6f2f194d89af92c52e3c6e9d4c7969b805fb40127edb38786f6d4a0f30ee5e1652bcff21772a1c71b4ff458f1697af36b3550f9312a3ca72ded0cb64dc26ac70c47b4770904590870b14831494a6cebea2410d32171a89e0f932157fcd087fd7223de0c93a66295b27a77c05c0024c19223863d53c3efc968af097ed8399c49a26e79cc826c97733771c302ed31959b4e6cea46a795f0d0eb217eb84efc7ece13819519c40676fa9a57b0ae614bf9b3c8911ce7853dd38dcaf5aaa1c723c3fc458257beb69de78c76c481a6427aecaf2c5834a60487db9d3d9"}, 0x10) r4 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) recvmsg$kcm(r5, &(0x7f000000d080)={&(0x7f000000bd80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000cf40)=[{&(0x7f000000be00)=""/37, 0x25}, {&(0x7f000000be40)=""/4096, 0x1000}, {&(0x7f000000ce40)=""/238, 0xee}], 0x3, &(0x7f000000cf80)=""/193, 0xc1}, 0x40000002) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r3, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000001c00)={0x17, 0x0, &(0x7f0000000080), &(0x7f0000000340)='syzkaller\x00', 0x57, 0xf0, &(0x7f0000001780)=""/240, 0x41100, 0x2, [], 0x0, 0xc, r4, 0x8, &(0x7f0000001700)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000001bc0)={0x2, 0x9, 0x10001, 0x8}, 0x10}, 0x70) 23:44:51 executing program 1: r0 = socket$kcm(0x2, 0x0, 0x84) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={0x0}, 0x10) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000400)={r0}) setsockopt$sock_attach_bpf(r3, 0x84, 0xd, &(0x7f0000000180), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000005c00)={&(0x7f00000058c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000005b40)=[{&(0x7f0000005940)=""/90, 0x5a}, {0x0}, {&(0x7f0000005a00)=""/149, 0x95}], 0x3, &(0x7f0000005b80)=""/100, 0x64}, 0x2000) sendmsg$kcm(r0, &(0x7f0000006040)={&(0x7f0000005c40)=@ll={0x11, 0xf7, r4, 0x1, 0x9}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000005f80)}], 0x1}, 0x20004050) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080), 0x4) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4000000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r2, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x3, 0x3, 0x7f6}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x3}}, 0x10) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 23:44:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000003100817ee45ae087185082cf0424b0eba06ec400002339e00586f9075b3f00169148790700d90080e230", 0x2e}], 0x1}, 0x0) 23:44:51 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001740)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000003100818be45ae087185082cf0324b0eba06ec400002339ef0586f9075b3f00169148790700d90080e230", 0x2e}], 0x1}, 0x0) [ 239.684138][T15283] netlink: 'syz-executor.2': attribute type 33 has an invalid length. 23:44:51 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e00000010008108040f80ecdb4cb9c00a480e1811000000e8bd6efb120009000e002100400000ff050005bf0086", 0x2e}], 0x1}, 0x0) 23:44:51 executing program 3: close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x167) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x6, [@typedef={0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0x3}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0xca}}, @func_proto]}, {0x0, [0xb55e109fe4e8d9d1, 0x61, 0x0, 0x7f]}}, &(0x7f00000003c0)=""/4096, 0x66, 0x1000, 0x1}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x1}) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x4, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000200)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 239.830481][T15294] sctp: [Deprecated]: syz-executor.1 (pid 15294) Use of int in maxseg socket option. [ 239.830481][T15294] Use struct sctp_assoc_value instead 23:44:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x80000001, 0x1, 0xfffffffffffffffa, 0xfffffffffffffffa, 0x0, 0x8, 0x40020, 0x2, 0x3, 0x85, 0x966b, 0x4, 0x5, 0x1, 0x737, 0x0, 0x5, 0x1ff, 0x3, 0x2, 0x4, 0x8000, 0x2, 0x5, 0x1, 0xfffffffffffff001, 0x40, 0x6, 0x1ff, 0x9, 0x6, 0x8000, 0x3, 0xfffffffffffffff7, 0x12f, 0x3ff, 0x0, 0xab3, 0x5, @perf_bp={0x0, 0x4}, 0x0, 0x200, 0x1, 0xf, 0x0, 0x19}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb2d, 0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001740)={r1, &(0x7f0000000700)="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"}, 0x10) r4 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) recvmsg$kcm(r5, &(0x7f000000d080)={&(0x7f000000bd80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000cf40)=[{&(0x7f000000be00)=""/37, 0x25}, {&(0x7f000000be40)=""/4096, 0x1000}, {&(0x7f000000ce40)=""/238, 0xee}], 0x3, &(0x7f000000cf80)=""/193, 0xc1}, 0x40000002) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r3, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000001c00)={0x17, 0x0, &(0x7f0000000080), &(0x7f0000000340)='syzkaller\x00', 0x57, 0xf0, &(0x7f0000001780)=""/240, 0x41100, 0x2, [], 0x0, 0xc, r4, 0x8, &(0x7f0000001700)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000001bc0)={0x2, 0x9, 0x10001, 0x8}, 0x10}, 0x70) [ 239.937717][T15302] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 239.993356][T15305] netlink: 'syz-executor.2': attribute type 33 has an invalid length. 23:44:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x80000001, 0x1, 0xfffffffffffffffa, 0xfffffffffffffffa, 0x0, 0x8, 0x40020, 0x2, 0x3, 0x85, 0x966b, 0x4, 0x5, 0x1, 0x737, 0x0, 0x5, 0x1ff, 0x3, 0x2, 0x4, 0x8000, 0x2, 0x5, 0x1, 0xfffffffffffff001, 0x40, 0x6, 0x1ff, 0x9, 0x6, 0x8000, 0x3, 0xfffffffffffffff7, 0x12f, 0x3ff, 0x0, 0xab3, 0x5, @perf_bp={0x0, 0x4}, 0x0, 0x200, 0x1, 0xf, 0x0, 0x19}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb2d, 0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001740)={r1, &(0x7f0000000700)="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"}, 0x10) r4 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) recvmsg$kcm(r5, &(0x7f000000d080)={&(0x7f000000bd80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000cf40)=[{&(0x7f000000be00)=""/37, 0x25}, {&(0x7f000000be40)=""/4096, 0x1000}, {&(0x7f000000ce40)=""/238, 0xee}], 0x3, &(0x7f000000cf80)=""/193, 0xc1}, 0x40000002) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r3, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000001c00)={0x17, 0x0, &(0x7f0000000080), &(0x7f0000000340)='syzkaller\x00', 0x57, 0xf0, &(0x7f0000001780)=""/240, 0x41100, 0x2, [], 0x0, 0xc, r4, 0x8, &(0x7f0000001700)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000001bc0)={0x2, 0x9, 0x10001, 0x8}, 0x10}, 0x70) 23:44:51 executing program 1: r0 = socket$kcm(0x2, 0x0, 0x84) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={0x0}, 0x10) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000400)={r0}) setsockopt$sock_attach_bpf(r3, 0x84, 0xd, &(0x7f0000000180), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000005c00)={&(0x7f00000058c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000005b40)=[{&(0x7f0000005940)=""/90, 0x5a}, {0x0}, {&(0x7f0000005a00)=""/149, 0x95}], 0x3, &(0x7f0000005b80)=""/100, 0x64}, 0x2000) sendmsg$kcm(r0, &(0x7f0000006040)={&(0x7f0000005c40)=@ll={0x11, 0xf7, r4, 0x1, 0x9}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000005f80)}], 0x1}, 0x20004050) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080), 0x4) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4000000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r2, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x3, 0x3, 0x7f6}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x3}}, 0x10) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 23:44:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x80000001, 0x1, 0xfffffffffffffffa, 0xfffffffffffffffa, 0x0, 0x8, 0x40020, 0x2, 0x3, 0x85, 0x966b, 0x4, 0x5, 0x1, 0x737, 0x0, 0x5, 0x1ff, 0x3, 0x2, 0x4, 0x8000, 0x2, 0x5, 0x1, 0xfffffffffffff001, 0x40, 0x6, 0x1ff, 0x9, 0x6, 0x8000, 0x3, 0xfffffffffffffff7, 0x12f, 0x3ff, 0x0, 0xab3, 0x5, @perf_bp={0x0, 0x4}, 0x0, 0x200, 0x1, 0xf, 0x0, 0x19}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb2d, 0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001740)={r1, &(0x7f0000000700)="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"}, 0x10) r4 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) recvmsg$kcm(r5, &(0x7f000000d080)={&(0x7f000000bd80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000cf40)=[{&(0x7f000000be00)=""/37, 0x25}, {&(0x7f000000be40)=""/4096, 0x1000}, {&(0x7f000000ce40)=""/238, 0xee}], 0x3, &(0x7f000000cf80)=""/193, 0xc1}, 0x40000002) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r3, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000001c00)={0x17, 0x0, &(0x7f0000000080), &(0x7f0000000340)='syzkaller\x00', 0x57, 0xf0, &(0x7f0000001780)=""/240, 0x41100, 0x2, [], 0x0, 0xc, r4, 0x8, &(0x7f0000001700)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000001bc0)={0x2, 0x9, 0x10001, 0x8}, 0x10}, 0x70) 23:44:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x80000001, 0x1, 0xfffffffffffffffa, 0xfffffffffffffffa, 0x0, 0x8, 0x40020, 0x2, 0x3, 0x85, 0x966b, 0x4, 0x5, 0x1, 0x737, 0x0, 0x5, 0x1ff, 0x3, 0x2, 0x4, 0x8000, 0x2, 0x5, 0x1, 0xfffffffffffff001, 0x40, 0x6, 0x1ff, 0x9, 0x6, 0x8000, 0x3, 0xfffffffffffffff7, 0x12f, 0x3ff, 0x0, 0xab3, 0x5, @perf_bp={0x0, 0x4}, 0x0, 0x200, 0x1, 0xf, 0x0, 0x19}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb2d, 0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001740)={r1, &(0x7f0000000700)="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"}, 0x10) r4 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) recvmsg$kcm(r5, &(0x7f000000d080)={&(0x7f000000bd80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000cf40)=[{&(0x7f000000be00)=""/37, 0x25}, {&(0x7f000000be40)=""/4096, 0x1000}, {&(0x7f000000ce40)=""/238, 0xee}], 0x3, &(0x7f000000cf80)=""/193, 0xc1}, 0x40000002) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r3, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000001c00)={0x17, 0x0, &(0x7f0000000080), &(0x7f0000000340)='syzkaller\x00', 0x57, 0xf0, &(0x7f0000001780)=""/240, 0x41100, 0x2, [], 0x0, 0xc, r4, 0x8, &(0x7f0000001700)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000001bc0)={0x2, 0x9, 0x10001, 0x8}, 0x10}, 0x70) 23:44:52 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000022c0)={0x0, 0x0, &(0x7f0000002280)=[{&(0x7f0000000100)="230000003200ffffff7f00000000aee4058c00130f00010000000000000000008b1832", 0x23}], 0x1, 0x0, 0x0, 0x12}, 0x0) [ 240.276748][T15322] sctp: [Deprecated]: syz-executor.1 (pid 15322) Use of int in maxseg socket option. [ 240.276748][T15322] Use struct sctp_assoc_value instead 23:44:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x80000001, 0x1, 0xfffffffffffffffa, 0xfffffffffffffffa, 0x0, 0x8, 0x40020, 0x2, 0x3, 0x85, 0x966b, 0x4, 0x5, 0x1, 0x737, 0x0, 0x5, 0x1ff, 0x3, 0x2, 0x4, 0x8000, 0x2, 0x5, 0x1, 0xfffffffffffff001, 0x40, 0x6, 0x1ff, 0x9, 0x6, 0x8000, 0x3, 0xfffffffffffffff7, 0x12f, 0x3ff, 0x0, 0xab3, 0x5, @perf_bp={0x0, 0x4}, 0x0, 0x200, 0x1, 0xf, 0x0, 0x19}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb2d, 0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001740)={r1, &(0x7f0000000700)="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"}, 0x10) r4 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) recvmsg$kcm(r5, &(0x7f000000d080)={&(0x7f000000bd80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000cf40)=[{&(0x7f000000be00)=""/37, 0x25}, {&(0x7f000000be40)=""/4096, 0x1000}, {&(0x7f000000ce40)=""/238, 0xee}], 0x3, &(0x7f000000cf80)=""/193, 0xc1}, 0x40000002) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r3, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000001c00)={0x17, 0x0, &(0x7f0000000080), &(0x7f0000000340)='syzkaller\x00', 0x57, 0xf0, &(0x7f0000001780)=""/240, 0x41100, 0x2, [], 0x0, 0xc, r4, 0x8, &(0x7f0000001700)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000001bc0)={0x2, 0x9, 0x10001, 0x8}, 0x10}, 0x70) 23:44:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x80000001, 0x1, 0xfffffffffffffffa, 0xfffffffffffffffa, 0x0, 0x8, 0x40020, 0x2, 0x3, 0x85, 0x966b, 0x4, 0x5, 0x1, 0x737, 0x0, 0x5, 0x1ff, 0x3, 0x2, 0x4, 0x8000, 0x2, 0x5, 0x1, 0xfffffffffffff001, 0x40, 0x6, 0x1ff, 0x9, 0x6, 0x8000, 0x3, 0xfffffffffffffff7, 0x12f, 0x3ff, 0x0, 0xab3, 0x5, @perf_bp={0x0, 0x4}, 0x0, 0x200, 0x1, 0xf, 0x0, 0x19}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb2d, 0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001740)={r1, &(0x7f0000000700)="a23753b16f600fb4db1eab33bbcdab6d18dda500eb700f205b2a06d2f89f1c218237106eee3d9d5bc336ea31aac615f71d9d7b5705f3f217997be9f5726709544f6c0cabfca6a6e31b17a381908fc9101c65f49b1472684880cfb994ef190798528a7d92e800ec2727367e25f9f727f0f651ba2617982b70416867f8a769761570af5d0324161d89bf47250556bc976d762f7e75c2851c5da36e567f5aa0b397f8462ee9910d614d467fdcc118b2a6c40931cdf1c561cecf225dc9c8b47e29e9dca1766a1b96a7ba8df4a1f193367fbc88e6f155c510864ce77366c42df00a7519ab5cbd88bb02c1428d692c5e444eaad49354edb87af1b115d65775fc65abbb28ca4c3858e0b65b554f80b3af68009c10531993669cfbf73934a4d6065595acec6b37253d7a81f3221bd13d183165556e5cc7a58ccf7fc31ef4101ba9095763f0fdca09c7434ec1428621a06b65e59737b9da08b9827913fd2524aea35950f33fc7caf479f38f555194196b85b79bc8a805c0a0d75ce8aed788c7e3702cc8e465afde07a2da01c9f370b09f75eae5b83ffa268c8f8df67d10a82d3e64d51d6a6001810fddc9016edfa358b9743849c88c93af9f6289901cecf1c050ce4a2aa41eef54076c9c661ceaf22041260692bf7d5ec54696c10d89bc1ae959b08583094a684760b429e3f55b7f5d2fa6ad0ec2359ab7298a3491409fb3f25a7815ff2a5c37684c109ed6bcbf140518261d2a74d7c332f58b099114da6806cdb51107b44525c43c6c314cdc51852bcf38c876077a409b6d230c51f4c81d1052ded1c9382ac05b305d9b930a9b20802dbe872be5f55a1ec3a051b4a61ddeef4e1001f187cf8a6a4a68c8375432a858df7b4ec668d0e5c8b5648814ea7f5866120aa1d81e00b973aedd75b7abe4c2b971aa8523e682e006e3fb95f19a45dd6522067e3e34254ca5233335711295b329bdcd2ee63ad0549c96824611813e983747d27bd19c520a25979f4fb0b8526b17ba48f53b20f5d9166ba0980ca88551eac7ab9d1b036edb61e95db44accd0e1203f1647f2f939c8de0ae6d1878664b1ffb8d05944070864844936eb81d7bf7b750a0c1ed9095b29282dadde6df81a88dcba974f0706164d2e4d8c32c31f097c599a0335ce8f9a367a894df37e344fb74959c0433e90b3d7fe242826ce938131496f962c7b9dcb7eae14aa4e4da9e0f3957d936a4254af429376a357ac0af69d919fb7119d02dbe81dd1e664c07088d77f5e3510fbb2d4080a052fe67b360650957f436ff7477ac75e007e5d38d5a0f4dd637a02e914e34deace274a573421667dd188ec1576edff545ea6ac496e38b961cd161d2126029a481689119b63155703bdff6e4479a113aafdf387fd8741194e87e610daa1cfd4e1b845a161ff1935f15fb190565bfe9568f07754315b75fe20841534b252fbbad8bcd3e7406729bc6a74f11a21d19ab703e7d2c7076ec97fcc435537c2f8f8af3195c914fb57ea3aca02c02a0e8565db94c40e99bc8039f3d6091f873e18f8e2972fb330e9d9b3ade7ef06cf05742a6b008858ba666d47748cc2849656d7d434cbbfb2800b0cbde60cbc9bbddf1918e2371e7f356c8772fd6a47b0bec6e228a0248a03324012f5b4a6b727ac1875f36f762d1281db445416a273500ca82208d6f7bc9b1167d4f621229ceba6e7de6f02108a1fdbf0741210b48ed27a74e4005849bd27dd007b179099dd1cdd86f10bca4fad9e9efc1bbc7c690e5fd88c443215c28872ab33e149fb8bf90d0af75d81d6b8dc4e373ca7dd7f58f8ddf0c47ba7a3b99b25e966c60f9fbbeeb2fc6f83a697515b02e5687eff61033df0c2b674dcc04fa33682805ad9e13914399158b8d10e1ad12dd6bd80a9d50275a0dc2e7c61c6c5f17859668d625933ed51128177e0d6ec7d003bb64d8ab366b8494bd70ed8afb43774da9226e9bc7f99e05d9fb101fd62799d2078269599a0a40ba3c4f6674630c35143547504cc976e7d7e4e6119a329727e816790ca3f0d67fa663dcc4cf1949e54e1155d769d8539a0cca974a1b7eba20ae8bb48c78c9eb5062dfb97200278b4e2cce6e611a4b06ca0707d50cd1e293021e84e885296efcfed17905afa15d07f941ad4026b51fbad7e571f070c911540e6aa81d4d6265e06fbf71edaaa6ca4df26a56b5d0d5a50e1e4f366b27bfb025f476f589e80706dd20bd422711eefaddb6d9d497ed6031f03ab343c588887be432b3409c174286920251433288db2c760738fd6d6b69b34b305f6372c12c9b63d45aab5dc8b82dd482103647c32b992c06540a2e009f52757d26b1c71c6dc9686ff7c485ca6b500d5d1a355986133922b8e997863615f9c61ce192929d2fb0a3f5d0dc48e69dbd5b7f5bb964643b1d2dda2675b1a3eb22f133600da67374c7aed59bb4e5cd1036009d0f7a37ea86d769e2216f4782ed3483a73e647147a5821f8ea4e5458e47cec602a6652a5f0f2a92c6362fa443df94d177c068c83ca7043e3016f5e28190ec54cba267928de044db0514d7f77f5f8c24aade3d68eddbbf6c4bb17197e6ec2e9225b59d8660ac5b82a3d47ea6f2f194d89af92c52e3c6e9d4c7969b805fb40127edb38786f6d4a0f30ee5e1652bcff21772a1c71b4ff458f1697af36b3550f9312a3ca72ded0cb64dc26ac70c47b4770904590870b14831494a6cebea2410d32171a89e0f932157fcd087fd7223de0c93a66295b27a77c05c0024c19223863d53c3efc968af097ed8399c49a26e79cc826c97733771c302ed31959b4e6cea46a795f0d0eb217eb84efc7ece13819519c40676fa9a57b0ae614bf9b3c8911ce7853dd38dcaf5aaa1c723c3fc458257beb69de78c76c481a6427aecaf2c5834a60487db9d3d9"}, 0x10) r4 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) recvmsg$kcm(r5, &(0x7f000000d080)={&(0x7f000000bd80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000cf40)=[{&(0x7f000000be00)=""/37, 0x25}, {&(0x7f000000be40)=""/4096, 0x1000}, {&(0x7f000000ce40)=""/238, 0xee}], 0x3, &(0x7f000000cf80)=""/193, 0xc1}, 0x40000002) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r3, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000001c00)={0x17, 0x0, &(0x7f0000000080), &(0x7f0000000340)='syzkaller\x00', 0x57, 0xf0, &(0x7f0000001780)=""/240, 0x41100, 0x2, [], 0x0, 0xc, r4, 0x8, &(0x7f0000001700)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000001bc0)={0x2, 0x9, 0x10001, 0x8}, 0x10}, 0x70) 23:44:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x80000001, 0x1, 0xfffffffffffffffa, 0xfffffffffffffffa, 0x0, 0x8, 0x40020, 0x2, 0x3, 0x85, 0x966b, 0x4, 0x5, 0x1, 0x737, 0x0, 0x5, 0x1ff, 0x3, 0x2, 0x4, 0x8000, 0x2, 0x5, 0x1, 0xfffffffffffff001, 0x40, 0x6, 0x1ff, 0x9, 0x6, 0x8000, 0x3, 0xfffffffffffffff7, 0x12f, 0x3ff, 0x0, 0xab3, 0x5, @perf_bp={0x0, 0x4}, 0x0, 0x200, 0x1, 0xf, 0x0, 0x19}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb2d, 0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001740)={r1, &(0x7f0000000700)="a23753b16f600fb4db1eab33bbcdab6d18dda500eb700f205b2a06d2f89f1c218237106eee3d9d5bc336ea31aac615f71d9d7b5705f3f217997be9f5726709544f6c0cabfca6a6e31b17a381908fc9101c65f49b1472684880cfb994ef190798528a7d92e800ec2727367e25f9f727f0f651ba2617982b70416867f8a769761570af5d0324161d89bf47250556bc976d762f7e75c2851c5da36e567f5aa0b397f8462ee9910d614d467fdcc118b2a6c40931cdf1c561cecf225dc9c8b47e29e9dca1766a1b96a7ba8df4a1f193367fbc88e6f155c510864ce77366c42df00a7519ab5cbd88bb02c1428d692c5e444eaad49354edb87af1b115d65775fc65abbb28ca4c3858e0b65b554f80b3af68009c10531993669cfbf73934a4d6065595acec6b37253d7a81f3221bd13d183165556e5cc7a58ccf7fc31ef4101ba9095763f0fdca09c7434ec1428621a06b65e59737b9da08b9827913fd2524aea35950f33fc7caf479f38f555194196b85b79bc8a805c0a0d75ce8aed788c7e3702cc8e465afde07a2da01c9f370b09f75eae5b83ffa268c8f8df67d10a82d3e64d51d6a6001810fddc9016edfa358b9743849c88c93af9f6289901cecf1c050ce4a2aa41eef54076c9c661ceaf22041260692bf7d5ec54696c10d89bc1ae959b08583094a684760b429e3f55b7f5d2fa6ad0ec2359ab7298a3491409fb3f25a7815ff2a5c37684c109ed6bcbf140518261d2a74d7c332f58b099114da6806cdb51107b44525c43c6c314cdc51852bcf38c876077a409b6d230c51f4c81d1052ded1c9382ac05b305d9b930a9b20802dbe872be5f55a1ec3a051b4a61ddeef4e1001f187cf8a6a4a68c8375432a858df7b4ec668d0e5c8b5648814ea7f5866120aa1d81e00b973aedd75b7abe4c2b971aa8523e682e006e3fb95f19a45dd6522067e3e34254ca5233335711295b329bdcd2ee63ad0549c96824611813e983747d27bd19c520a25979f4fb0b8526b17ba48f53b20f5d9166ba0980ca88551eac7ab9d1b036edb61e95db44accd0e1203f1647f2f939c8de0ae6d1878664b1ffb8d05944070864844936eb81d7bf7b750a0c1ed9095b29282dadde6df81a88dcba974f0706164d2e4d8c32c31f097c599a0335ce8f9a367a894df37e344fb74959c0433e90b3d7fe242826ce938131496f962c7b9dcb7eae14aa4e4da9e0f3957d936a4254af429376a357ac0af69d919fb7119d02dbe81dd1e664c07088d77f5e3510fbb2d4080a052fe67b360650957f436ff7477ac75e007e5d38d5a0f4dd637a02e914e34deace274a573421667dd188ec1576edff545ea6ac496e38b961cd161d2126029a481689119b63155703bdff6e4479a113aafdf387fd8741194e87e610daa1cfd4e1b845a161ff1935f15fb190565bfe9568f07754315b75fe20841534b252fbbad8bcd3e7406729bc6a74f11a21d19ab703e7d2c7076ec97fcc435537c2f8f8af3195c914fb57ea3aca02c02a0e8565db94c40e99bc8039f3d6091f873e18f8e2972fb330e9d9b3ade7ef06cf05742a6b008858ba666d47748cc2849656d7d434cbbfb2800b0cbde60cbc9bbddf1918e2371e7f356c8772fd6a47b0bec6e228a0248a03324012f5b4a6b727ac1875f36f762d1281db445416a273500ca82208d6f7bc9b1167d4f621229ceba6e7de6f02108a1fdbf0741210b48ed27a74e4005849bd27dd007b179099dd1cdd86f10bca4fad9e9efc1bbc7c690e5fd88c443215c28872ab33e149fb8bf90d0af75d81d6b8dc4e373ca7dd7f58f8ddf0c47ba7a3b99b25e966c60f9fbbeeb2fc6f83a697515b02e5687eff61033df0c2b674dcc04fa33682805ad9e13914399158b8d10e1ad12dd6bd80a9d50275a0dc2e7c61c6c5f17859668d625933ed51128177e0d6ec7d003bb64d8ab366b8494bd70ed8afb43774da9226e9bc7f99e05d9fb101fd62799d2078269599a0a40ba3c4f6674630c35143547504cc976e7d7e4e6119a329727e816790ca3f0d67fa663dcc4cf1949e54e1155d769d8539a0cca974a1b7eba20ae8bb48c78c9eb5062dfb97200278b4e2cce6e611a4b06ca0707d50cd1e293021e84e885296efcfed17905afa15d07f941ad4026b51fbad7e571f070c911540e6aa81d4d6265e06fbf71edaaa6ca4df26a56b5d0d5a50e1e4f366b27bfb025f476f589e80706dd20bd422711eefaddb6d9d497ed6031f03ab343c588887be432b3409c174286920251433288db2c760738fd6d6b69b34b305f6372c12c9b63d45aab5dc8b82dd482103647c32b992c06540a2e009f52757d26b1c71c6dc9686ff7c485ca6b500d5d1a355986133922b8e997863615f9c61ce192929d2fb0a3f5d0dc48e69dbd5b7f5bb964643b1d2dda2675b1a3eb22f133600da67374c7aed59bb4e5cd1036009d0f7a37ea86d769e2216f4782ed3483a73e647147a5821f8ea4e5458e47cec602a6652a5f0f2a92c6362fa443df94d177c068c83ca7043e3016f5e28190ec54cba267928de044db0514d7f77f5f8c24aade3d68eddbbf6c4bb17197e6ec2e9225b59d8660ac5b82a3d47ea6f2f194d89af92c52e3c6e9d4c7969b805fb40127edb38786f6d4a0f30ee5e1652bcff21772a1c71b4ff458f1697af36b3550f9312a3ca72ded0cb64dc26ac70c47b4770904590870b14831494a6cebea2410d32171a89e0f932157fcd087fd7223de0c93a66295b27a77c05c0024c19223863d53c3efc968af097ed8399c49a26e79cc826c97733771c302ed31959b4e6cea46a795f0d0eb217eb84efc7ece13819519c40676fa9a57b0ae614bf9b3c8911ce7853dd38dcaf5aaa1c723c3fc458257beb69de78c76c481a6427aecaf2c5834a60487db9d3d9"}, 0x10) r4 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) recvmsg$kcm(r5, &(0x7f000000d080)={&(0x7f000000bd80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000cf40)=[{&(0x7f000000be00)=""/37, 0x25}, {&(0x7f000000be40)=""/4096, 0x1000}, {&(0x7f000000ce40)=""/238, 0xee}], 0x3, &(0x7f000000cf80)=""/193, 0xc1}, 0x40000002) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r3, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000001c00)={0x17, 0x0, &(0x7f0000000080), &(0x7f0000000340)='syzkaller\x00', 0x57, 0xf0, &(0x7f0000001780)=""/240, 0x41100, 0x2, [], 0x0, 0xc, r4, 0x8, &(0x7f0000001700)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000001bc0)={0x2, 0x9, 0x10001, 0x8}, 0x10}, 0x70) [ 240.392083][T15330] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 240.419640][T15330] tc_dump_action: action bad kind 23:44:52 executing program 1: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 240.527259][T15338] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 240.566284][T15338] tc_dump_action: action bad kind 23:44:52 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000022c0)={0x0, 0x0, &(0x7f0000002280)=[{&(0x7f0000000100)="230000003200ffffff7f00000000aee4058c00130f00010000000000000000008b1832", 0x23}], 0x1, 0x0, 0x0, 0x12}, 0x0) 23:44:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x80000001, 0x1, 0xfffffffffffffffa, 0xfffffffffffffffa, 0x0, 0x8, 0x40020, 0x2, 0x3, 0x85, 0x966b, 0x4, 0x5, 0x1, 0x737, 0x0, 0x5, 0x1ff, 0x3, 0x2, 0x4, 0x8000, 0x2, 0x5, 0x1, 0xfffffffffffff001, 0x40, 0x6, 0x1ff, 0x9, 0x6, 0x8000, 0x3, 0xfffffffffffffff7, 0x12f, 0x3ff, 0x0, 0xab3, 0x5, @perf_bp={0x0, 0x4}, 0x0, 0x200, 0x1, 0xf, 0x0, 0x19}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb2d, 0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001740)={r1, &(0x7f0000000700)="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"}, 0x10) r4 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) recvmsg$kcm(r5, &(0x7f000000d080)={&(0x7f000000bd80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000cf40)=[{&(0x7f000000be00)=""/37, 0x25}, {&(0x7f000000be40)=""/4096, 0x1000}, {&(0x7f000000ce40)=""/238, 0xee}], 0x3, &(0x7f000000cf80)=""/193, 0xc1}, 0x40000002) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r3, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000001c00)={0x17, 0x0, &(0x7f0000000080), &(0x7f0000000340)='syzkaller\x00', 0x57, 0xf0, &(0x7f0000001780)=""/240, 0x41100, 0x2, [], 0x0, 0xc, r4, 0x8, &(0x7f0000001700)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000001bc0)={0x2, 0x9, 0x10001, 0x8}, 0x10}, 0x70) 23:44:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x80000001, 0x1, 0xfffffffffffffffa, 0xfffffffffffffffa, 0x0, 0x8, 0x40020, 0x2, 0x3, 0x85, 0x966b, 0x4, 0x5, 0x1, 0x737, 0x0, 0x5, 0x1ff, 0x3, 0x2, 0x4, 0x8000, 0x2, 0x5, 0x1, 0xfffffffffffff001, 0x40, 0x6, 0x1ff, 0x9, 0x6, 0x8000, 0x3, 0xfffffffffffffff7, 0x12f, 0x3ff, 0x0, 0xab3, 0x5, @perf_bp={0x0, 0x4}, 0x0, 0x200, 0x1, 0xf, 0x0, 0x19}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb2d, 0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001740)={r1, &(0x7f0000000700)="a23753b16f600fb4db1eab33bbcdab6d18dda500eb700f205b2a06d2f89f1c218237106eee3d9d5bc336ea31aac615f71d9d7b5705f3f217997be9f5726709544f6c0cabfca6a6e31b17a381908fc9101c65f49b1472684880cfb994ef190798528a7d92e800ec2727367e25f9f727f0f651ba2617982b70416867f8a769761570af5d0324161d89bf47250556bc976d762f7e75c2851c5da36e567f5aa0b397f8462ee9910d614d467fdcc118b2a6c40931cdf1c561cecf225dc9c8b47e29e9dca1766a1b96a7ba8df4a1f193367fbc88e6f155c510864ce77366c42df00a7519ab5cbd88bb02c1428d692c5e444eaad49354edb87af1b115d65775fc65abbb28ca4c3858e0b65b554f80b3af68009c10531993669cfbf73934a4d6065595acec6b37253d7a81f3221bd13d183165556e5cc7a58ccf7fc31ef4101ba9095763f0fdca09c7434ec1428621a06b65e59737b9da08b9827913fd2524aea35950f33fc7caf479f38f555194196b85b79bc8a805c0a0d75ce8aed788c7e3702cc8e465afde07a2da01c9f370b09f75eae5b83ffa268c8f8df67d10a82d3e64d51d6a6001810fddc9016edfa358b9743849c88c93af9f6289901cecf1c050ce4a2aa41eef54076c9c661ceaf22041260692bf7d5ec54696c10d89bc1ae959b08583094a684760b429e3f55b7f5d2fa6ad0ec2359ab7298a3491409fb3f25a7815ff2a5c37684c109ed6bcbf140518261d2a74d7c332f58b099114da6806cdb51107b44525c43c6c314cdc51852bcf38c876077a409b6d230c51f4c81d1052ded1c9382ac05b305d9b930a9b20802dbe872be5f55a1ec3a051b4a61ddeef4e1001f187cf8a6a4a68c8375432a858df7b4ec668d0e5c8b5648814ea7f5866120aa1d81e00b973aedd75b7abe4c2b971aa8523e682e006e3fb95f19a45dd6522067e3e34254ca5233335711295b329bdcd2ee63ad0549c96824611813e983747d27bd19c520a25979f4fb0b8526b17ba48f53b20f5d9166ba0980ca88551eac7ab9d1b036edb61e95db44accd0e1203f1647f2f939c8de0ae6d1878664b1ffb8d05944070864844936eb81d7bf7b750a0c1ed9095b29282dadde6df81a88dcba974f0706164d2e4d8c32c31f097c599a0335ce8f9a367a894df37e344fb74959c0433e90b3d7fe242826ce938131496f962c7b9dcb7eae14aa4e4da9e0f3957d936a4254af429376a357ac0af69d919fb7119d02dbe81dd1e664c07088d77f5e3510fbb2d4080a052fe67b360650957f436ff7477ac75e007e5d38d5a0f4dd637a02e914e34deace274a573421667dd188ec1576edff545ea6ac496e38b961cd161d2126029a481689119b63155703bdff6e4479a113aafdf387fd8741194e87e610daa1cfd4e1b845a161ff1935f15fb190565bfe9568f07754315b75fe20841534b252fbbad8bcd3e7406729bc6a74f11a21d19ab703e7d2c7076ec97fcc435537c2f8f8af3195c914fb57ea3aca02c02a0e8565db94c40e99bc8039f3d6091f873e18f8e2972fb330e9d9b3ade7ef06cf05742a6b008858ba666d47748cc2849656d7d434cbbfb2800b0cbde60cbc9bbddf1918e2371e7f356c8772fd6a47b0bec6e228a0248a03324012f5b4a6b727ac1875f36f762d1281db445416a273500ca82208d6f7bc9b1167d4f621229ceba6e7de6f02108a1fdbf0741210b48ed27a74e4005849bd27dd007b179099dd1cdd86f10bca4fad9e9efc1bbc7c690e5fd88c443215c28872ab33e149fb8bf90d0af75d81d6b8dc4e373ca7dd7f58f8ddf0c47ba7a3b99b25e966c60f9fbbeeb2fc6f83a697515b02e5687eff61033df0c2b674dcc04fa33682805ad9e13914399158b8d10e1ad12dd6bd80a9d50275a0dc2e7c61c6c5f17859668d625933ed51128177e0d6ec7d003bb64d8ab366b8494bd70ed8afb43774da9226e9bc7f99e05d9fb101fd62799d2078269599a0a40ba3c4f6674630c35143547504cc976e7d7e4e6119a329727e816790ca3f0d67fa663dcc4cf1949e54e1155d769d8539a0cca974a1b7eba20ae8bb48c78c9eb5062dfb97200278b4e2cce6e611a4b06ca0707d50cd1e293021e84e885296efcfed17905afa15d07f941ad4026b51fbad7e571f070c911540e6aa81d4d6265e06fbf71edaaa6ca4df26a56b5d0d5a50e1e4f366b27bfb025f476f589e80706dd20bd422711eefaddb6d9d497ed6031f03ab343c588887be432b3409c174286920251433288db2c760738fd6d6b69b34b305f6372c12c9b63d45aab5dc8b82dd482103647c32b992c06540a2e009f52757d26b1c71c6dc9686ff7c485ca6b500d5d1a355986133922b8e997863615f9c61ce192929d2fb0a3f5d0dc48e69dbd5b7f5bb964643b1d2dda2675b1a3eb22f133600da67374c7aed59bb4e5cd1036009d0f7a37ea86d769e2216f4782ed3483a73e647147a5821f8ea4e5458e47cec602a6652a5f0f2a92c6362fa443df94d177c068c83ca7043e3016f5e28190ec54cba267928de044db0514d7f77f5f8c24aade3d68eddbbf6c4bb17197e6ec2e9225b59d8660ac5b82a3d47ea6f2f194d89af92c52e3c6e9d4c7969b805fb40127edb38786f6d4a0f30ee5e1652bcff21772a1c71b4ff458f1697af36b3550f9312a3ca72ded0cb64dc26ac70c47b4770904590870b14831494a6cebea2410d32171a89e0f932157fcd087fd7223de0c93a66295b27a77c05c0024c19223863d53c3efc968af097ed8399c49a26e79cc826c97733771c302ed31959b4e6cea46a795f0d0eb217eb84efc7ece13819519c40676fa9a57b0ae614bf9b3c8911ce7853dd38dcaf5aaa1c723c3fc458257beb69de78c76c481a6427aecaf2c5834a60487db9d3d9"}, 0x10) r4 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) recvmsg$kcm(r5, &(0x7f000000d080)={&(0x7f000000bd80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000cf40)=[{&(0x7f000000be00)=""/37, 0x25}, {&(0x7f000000be40)=""/4096, 0x1000}, {&(0x7f000000ce40)=""/238, 0xee}], 0x3, &(0x7f000000cf80)=""/193, 0xc1}, 0x40000002) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r3, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000001c00)={0x17, 0x0, &(0x7f0000000080), &(0x7f0000000340)='syzkaller\x00', 0x57, 0xf0, &(0x7f0000001780)=""/240, 0x41100, 0x2, [], 0x0, 0xc, r4, 0x8, &(0x7f0000001700)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000001bc0)={0x2, 0x9, 0x10001, 0x8}, 0x10}, 0x70) [ 240.841251][T15351] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 23:44:52 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{0x0}, {0x0}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000140)}, {&(0x7f00000002c0)=""/6, 0x6}, {0x0}], 0x6}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(r1, 0x0, 0x0) r3 = socket$kcm(0x11, 0x6, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f8"], 0x0, 0x44}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, r0, 0x0, 0x3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a2, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 240.950606][T15351] tc_dump_action: action bad kind 23:44:52 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000022c0)={0x0, 0x0, &(0x7f0000002280)=[{&(0x7f0000000100)="230000003200ffffff7f00000000aee4058c00130f00010000000000000000008b1832", 0x23}], 0x1, 0x0, 0x0, 0x12}, 0x0) 23:44:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x80000001, 0x1, 0xfffffffffffffffa, 0xfffffffffffffffa, 0x0, 0x8, 0x40020, 0x2, 0x3, 0x85, 0x966b, 0x4, 0x5, 0x1, 0x737, 0x0, 0x5, 0x1ff, 0x3, 0x2, 0x4, 0x8000, 0x2, 0x5, 0x1, 0xfffffffffffff001, 0x40, 0x6, 0x1ff, 0x9, 0x6, 0x8000, 0x3, 0xfffffffffffffff7, 0x12f, 0x3ff, 0x0, 0xab3, 0x5, @perf_bp={0x0, 0x4}, 0x0, 0x200, 0x1, 0xf, 0x0, 0x19}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb2d, 0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001740)={r1, &(0x7f0000000700)="a23753b16f600fb4db1eab33bbcdab6d18dda500eb700f205b2a06d2f89f1c218237106eee3d9d5bc336ea31aac615f71d9d7b5705f3f217997be9f5726709544f6c0cabfca6a6e31b17a381908fc9101c65f49b1472684880cfb994ef190798528a7d92e800ec2727367e25f9f727f0f651ba2617982b70416867f8a769761570af5d0324161d89bf47250556bc976d762f7e75c2851c5da36e567f5aa0b397f8462ee9910d614d467fdcc118b2a6c40931cdf1c561cecf225dc9c8b47e29e9dca1766a1b96a7ba8df4a1f193367fbc88e6f155c510864ce77366c42df00a7519ab5cbd88bb02c1428d692c5e444eaad49354edb87af1b115d65775fc65abbb28ca4c3858e0b65b554f80b3af68009c10531993669cfbf73934a4d6065595acec6b37253d7a81f3221bd13d183165556e5cc7a58ccf7fc31ef4101ba9095763f0fdca09c7434ec1428621a06b65e59737b9da08b9827913fd2524aea35950f33fc7caf479f38f555194196b85b79bc8a805c0a0d75ce8aed788c7e3702cc8e465afde07a2da01c9f370b09f75eae5b83ffa268c8f8df67d10a82d3e64d51d6a6001810fddc9016edfa358b9743849c88c93af9f6289901cecf1c050ce4a2aa41eef54076c9c661ceaf22041260692bf7d5ec54696c10d89bc1ae959b08583094a684760b429e3f55b7f5d2fa6ad0ec2359ab7298a3491409fb3f25a7815ff2a5c37684c109ed6bcbf140518261d2a74d7c332f58b099114da6806cdb51107b44525c43c6c314cdc51852bcf38c876077a409b6d230c51f4c81d1052ded1c9382ac05b305d9b930a9b20802dbe872be5f55a1ec3a051b4a61ddeef4e1001f187cf8a6a4a68c8375432a858df7b4ec668d0e5c8b5648814ea7f5866120aa1d81e00b973aedd75b7abe4c2b971aa8523e682e006e3fb95f19a45dd6522067e3e34254ca5233335711295b329bdcd2ee63ad0549c96824611813e983747d27bd19c520a25979f4fb0b8526b17ba48f53b20f5d9166ba0980ca88551eac7ab9d1b036edb61e95db44accd0e1203f1647f2f939c8de0ae6d1878664b1ffb8d05944070864844936eb81d7bf7b750a0c1ed9095b29282dadde6df81a88dcba974f0706164d2e4d8c32c31f097c599a0335ce8f9a367a894df37e344fb74959c0433e90b3d7fe242826ce938131496f962c7b9dcb7eae14aa4e4da9e0f3957d936a4254af429376a357ac0af69d919fb7119d02dbe81dd1e664c07088d77f5e3510fbb2d4080a052fe67b360650957f436ff7477ac75e007e5d38d5a0f4dd637a02e914e34deace274a573421667dd188ec1576edff545ea6ac496e38b961cd161d2126029a481689119b63155703bdff6e4479a113aafdf387fd8741194e87e610daa1cfd4e1b845a161ff1935f15fb190565bfe9568f07754315b75fe20841534b252fbbad8bcd3e7406729bc6a74f11a21d19ab703e7d2c7076ec97fcc435537c2f8f8af3195c914fb57ea3aca02c02a0e8565db94c40e99bc8039f3d6091f873e18f8e2972fb330e9d9b3ade7ef06cf05742a6b008858ba666d47748cc2849656d7d434cbbfb2800b0cbde60cbc9bbddf1918e2371e7f356c8772fd6a47b0bec6e228a0248a03324012f5b4a6b727ac1875f36f762d1281db445416a273500ca82208d6f7bc9b1167d4f621229ceba6e7de6f02108a1fdbf0741210b48ed27a74e4005849bd27dd007b179099dd1cdd86f10bca4fad9e9efc1bbc7c690e5fd88c443215c28872ab33e149fb8bf90d0af75d81d6b8dc4e373ca7dd7f58f8ddf0c47ba7a3b99b25e966c60f9fbbeeb2fc6f83a697515b02e5687eff61033df0c2b674dcc04fa33682805ad9e13914399158b8d10e1ad12dd6bd80a9d50275a0dc2e7c61c6c5f17859668d625933ed51128177e0d6ec7d003bb64d8ab366b8494bd70ed8afb43774da9226e9bc7f99e05d9fb101fd62799d2078269599a0a40ba3c4f6674630c35143547504cc976e7d7e4e6119a329727e816790ca3f0d67fa663dcc4cf1949e54e1155d769d8539a0cca974a1b7eba20ae8bb48c78c9eb5062dfb97200278b4e2cce6e611a4b06ca0707d50cd1e293021e84e885296efcfed17905afa15d07f941ad4026b51fbad7e571f070c911540e6aa81d4d6265e06fbf71edaaa6ca4df26a56b5d0d5a50e1e4f366b27bfb025f476f589e80706dd20bd422711eefaddb6d9d497ed6031f03ab343c588887be432b3409c174286920251433288db2c760738fd6d6b69b34b305f6372c12c9b63d45aab5dc8b82dd482103647c32b992c06540a2e009f52757d26b1c71c6dc9686ff7c485ca6b500d5d1a355986133922b8e997863615f9c61ce192929d2fb0a3f5d0dc48e69dbd5b7f5bb964643b1d2dda2675b1a3eb22f133600da67374c7aed59bb4e5cd1036009d0f7a37ea86d769e2216f4782ed3483a73e647147a5821f8ea4e5458e47cec602a6652a5f0f2a92c6362fa443df94d177c068c83ca7043e3016f5e28190ec54cba267928de044db0514d7f77f5f8c24aade3d68eddbbf6c4bb17197e6ec2e9225b59d8660ac5b82a3d47ea6f2f194d89af92c52e3c6e9d4c7969b805fb40127edb38786f6d4a0f30ee5e1652bcff21772a1c71b4ff458f1697af36b3550f9312a3ca72ded0cb64dc26ac70c47b4770904590870b14831494a6cebea2410d32171a89e0f932157fcd087fd7223de0c93a66295b27a77c05c0024c19223863d53c3efc968af097ed8399c49a26e79cc826c97733771c302ed31959b4e6cea46a795f0d0eb217eb84efc7ece13819519c40676fa9a57b0ae614bf9b3c8911ce7853dd38dcaf5aaa1c723c3fc458257beb69de78c76c481a6427aecaf2c5834a60487db9d3d9"}, 0x10) r4 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) recvmsg$kcm(r5, &(0x7f000000d080)={&(0x7f000000bd80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000cf40)=[{&(0x7f000000be00)=""/37, 0x25}, {&(0x7f000000be40)=""/4096, 0x1000}, {&(0x7f000000ce40)=""/238, 0xee}], 0x3, &(0x7f000000cf80)=""/193, 0xc1}, 0x40000002) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r3, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000001c00)={0x17, 0x0, &(0x7f0000000080), &(0x7f0000000340)='syzkaller\x00', 0x57, 0xf0, &(0x7f0000001780)=""/240, 0x41100, 0x2, [], 0x0, 0xc, r4, 0x8, &(0x7f0000001700)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000001bc0)={0x2, 0x9, 0x10001, 0x8}, 0x10}, 0x70) [ 241.242794][T15370] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 241.290677][T15370] tc_dump_action: action bad kind 23:44:53 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{0x0}, {0x0}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000140)}, {&(0x7f00000002c0)=""/6, 0x6}, {0x0}], 0x6}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(r1, 0x0, 0x0) r3 = socket$kcm(0x11, 0x6, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f8"], 0x0, 0x44}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, r0, 0x0, 0x3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a2, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:44:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x80000001, 0x1, 0xfffffffffffffffa, 0xfffffffffffffffa, 0x0, 0x8, 0x40020, 0x2, 0x3, 0x85, 0x966b, 0x4, 0x5, 0x1, 0x737, 0x0, 0x5, 0x1ff, 0x3, 0x2, 0x4, 0x8000, 0x2, 0x5, 0x1, 0xfffffffffffff001, 0x40, 0x6, 0x1ff, 0x9, 0x6, 0x8000, 0x3, 0xfffffffffffffff7, 0x12f, 0x3ff, 0x0, 0xab3, 0x5, @perf_bp={0x0, 0x4}, 0x0, 0x200, 0x1, 0xf, 0x0, 0x19}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb2d, 0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001740)={r1, &(0x7f0000000700)="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"}, 0x10) r4 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) recvmsg$kcm(r5, &(0x7f000000d080)={&(0x7f000000bd80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000cf40)=[{&(0x7f000000be00)=""/37, 0x25}, {&(0x7f000000be40)=""/4096, 0x1000}, {&(0x7f000000ce40)=""/238, 0xee}], 0x3, &(0x7f000000cf80)=""/193, 0xc1}, 0x40000002) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r3, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000001c00)={0x17, 0x0, &(0x7f0000000080), &(0x7f0000000340)='syzkaller\x00', 0x57, 0xf0, &(0x7f0000001780)=""/240, 0x41100, 0x2, [], 0x0, 0xc, r4, 0x8, &(0x7f0000001700)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000001bc0)={0x2, 0x9, 0x10001, 0x8}, 0x10}, 0x70) 23:44:53 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000022c0)={0x0, 0x0, &(0x7f0000002280)=[{&(0x7f0000000100)="230000003200ffffff7f00000000aee4058c00130f00010000000000000000008b1832", 0x23}], 0x1, 0x0, 0x0, 0x12}, 0x0) 23:44:53 executing program 1: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:44:53 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{0x0}, {0x0}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000140)}, {&(0x7f00000002c0)=""/6, 0x6}, {0x0}], 0x6}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(r1, 0x0, 0x0) r3 = socket$kcm(0x11, 0x6, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f8"], 0x0, 0x44}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, r0, 0x0, 0x3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a2, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 241.634804][T15389] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 23:44:53 executing program 5: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 241.679830][T15389] tc_dump_action: action bad kind [ 241.735320][T15394] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:44:53 executing program 4: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:44:53 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{0x0}, {0x0}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000140)}, {&(0x7f00000002c0)=""/6, 0x6}, {0x0}], 0x6}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(r1, 0x0, 0x0) r3 = socket$kcm(0x11, 0x6, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f8"], 0x0, 0x44}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, r0, 0x0, 0x3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a2, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:44:53 executing program 2: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:44:54 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{0x0}, {0x0}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000140)}, {&(0x7f00000002c0)=""/6, 0x6}, {0x0}], 0x6}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(r1, 0x0, 0x0) r3 = socket$kcm(0x11, 0x6, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f8"], 0x0, 0x44}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, r0, 0x0, 0x3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a2, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:44:54 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{0x0}, {0x0}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000140)}, {&(0x7f00000002c0)=""/6, 0x6}, {0x0}], 0x6}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(r1, 0x0, 0x0) r3 = socket$kcm(0x11, 0x6, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f8"], 0x0, 0x44}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, r0, 0x0, 0x3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a2, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:44:54 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{0x0}, {0x0}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000140)}, {&(0x7f00000002c0)=""/6, 0x6}, {0x0}], 0x6}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(r1, 0x0, 0x0) r3 = socket$kcm(0x11, 0x6, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f8"], 0x0, 0x44}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, r0, 0x0, 0x3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a2, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:44:54 executing program 0: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:44:54 executing program 5: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:44:54 executing program 4: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:44:54 executing program 1: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:44:54 executing program 2: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:44:54 executing program 3: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:44:55 executing program 0: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:44:55 executing program 5: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:44:55 executing program 1: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:44:55 executing program 4: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:44:56 executing program 2: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:44:56 executing program 3: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:44:57 executing program 0: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:44:57 executing program 3: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:44:57 executing program 5: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:44:57 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{0x0}, {0x0}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000140)}, {&(0x7f00000002c0)=""/6, 0x6}, {0x0}], 0x6}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(r1, 0x0, 0x0) r3 = socket$kcm(0x11, 0x6, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f8"], 0x0, 0x44}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, r0, 0x0, 0x3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a2, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:44:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) r1 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e96dff7665a741787d4f51713f861f44601f84f1ba1c2cb25f09707778f1", 0x1e}], 0x1}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x9) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x3, 0x1, 0xfffffffffffffffd, 0x0, 0x0, 0x922, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x0, 0x0, 0x68e2ea6a, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x62) openat$cgroup_type(r4, 0x0, 0x2, 0x0) recvmsg$kcm(r2, 0x0, 0x40) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) 23:44:57 executing program 4: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x6, 0x5}, 0x38) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000500)="33000000190081ae08060c04000f000480207f03fe0400058701546f07001b4e7d06a6a336656596bc014e18bbdfede6efb4f4", 0x33}], 0x1}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='\xea\x155\xd5\x93\xa8\xd1L', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) socket$kcm(0x29, 0x7, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)) [ 245.594845][T15501] netlink: 15 bytes leftover after parsing attributes in process `syz-executor.4'. [ 245.711701][T15501] netlink: 15 bytes leftover after parsing attributes in process `syz-executor.4'. 23:44:57 executing program 4: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x6, 0x5}, 0x38) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000500)="33000000190081ae08060c04000f000480207f03fe0400058701546f07001b4e7d06a6a336656596bc014e18bbdfede6efb4f4", 0x33}], 0x1}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='\xea\x155\xd5\x93\xa8\xd1L', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) socket$kcm(0x29, 0x7, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)) 23:44:57 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{0x0}, {0x0}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000140)}, {&(0x7f00000002c0)=""/6, 0x6}, {0x0}], 0x6}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(r1, 0x0, 0x0) r3 = socket$kcm(0x11, 0x6, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f8"], 0x0, 0x44}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, r0, 0x0, 0x3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a2, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 246.090147][T15519] netlink: 15 bytes leftover after parsing attributes in process `syz-executor.4'. 23:44:58 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="23000000210081ae00060c00f20e000002000000000000018001006fabeb264e7d06a4", 0x23}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00\x00\xc3\x00'}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x4, 0x0, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="2d637075202df24875202d696f202b72646d6120"], 0x14) r5 = socket$kcm(0x2, 0x3, 0x2) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r7) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)=0xff, 0x4) openat$cgroup_procs(r3, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) openat$cgroup_procs(r6, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5451, 0x0) 23:44:58 executing program 4: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x6, 0x5}, 0x38) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000500)="33000000190081ae08060c04000f000480207f03fe0400058701546f07001b4e7d06a6a336656596bc014e18bbdfede6efb4f4", 0x33}], 0x1}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='\xea\x155\xd5\x93\xa8\xd1L', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) socket$kcm(0x29, 0x7, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)) 23:44:58 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{0x0}, {0x0}, {&(0x7f0000000540)=""/194, 0xc2}, {&(0x7f0000000140)}, {&(0x7f00000002c0)=""/6, 0x6}, {0x0}], 0x6}, 0xf4ad1e69669fbe32) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg(r1, 0x0, 0x0) r3 = socket$kcm(0x11, 0x6, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800007f1836c390000000004a8fc4de5415d00bf205a54b818b69d31a7c811c2f08e4ca975b6f5e7351fde14086b34e18ef779f9a532ff1c3a0d790ca43e7f8"], 0x0, 0x44}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, r0, 0x0, 0x3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a2, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 246.429533][T15528] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.3'. 23:44:58 executing program 5: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:44:58 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x3d7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa6cb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socket$kcm(0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000340)=0xc697) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/105, 0x38e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000480)=""/138, 0x8a}], 0x3, &(0x7f0000000580)=""/110, 0x16}, 0x2003) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@random="71e5ad9d8a19"]}) openat$cgroup(r0, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) close(r1) [ 246.677083][T15530] netlink: 15 bytes leftover after parsing attributes in process `syz-executor.4'. 23:44:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) r1 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e96dff7665a741787d4f51713f861f44601f84f1ba1c2cb25f09707778f1", 0x1e}], 0x1}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x9) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x3, 0x1, 0xfffffffffffffffd, 0x0, 0x0, 0x922, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x0, 0x0, 0x68e2ea6a, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x62) openat$cgroup_type(r4, 0x0, 0x2, 0x0) recvmsg$kcm(r2, 0x0, 0x40) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) 23:44:58 executing program 4: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x6, 0x5}, 0x38) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000500)="33000000190081ae08060c04000f000480207f03fe0400058701546f07001b4e7d06a6a336656596bc014e18bbdfede6efb4f4", 0x33}], 0x1}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='\xea\x155\xd5\x93\xa8\xd1L', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) socket$kcm(0x29, 0x7, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)) [ 246.772761][T15532] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.3'. 23:44:58 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x3d7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa6cb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socket$kcm(0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000340)=0xc697) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/105, 0x38e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000480)=""/138, 0x8a}], 0x3, &(0x7f0000000580)=""/110, 0x16}, 0x2003) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@random="71e5ad9d8a19"]}) openat$cgroup(r0, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) close(r1) 23:44:58 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x3d7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa6cb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socket$kcm(0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000340)=0xc697) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/105, 0x38e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000480)=""/138, 0x8a}], 0x3, &(0x7f0000000580)=""/110, 0x16}, 0x2003) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@random="71e5ad9d8a19"]}) openat$cgroup(r0, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) close(r1) [ 246.987776][T15558] netlink: 15 bytes leftover after parsing attributes in process `syz-executor.4'. 23:44:58 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="23000000210081ae00060c00f20e000002000000000000018001006fabeb264e7d06a4", 0x23}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00\x00\xc3\x00'}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x4, 0x0, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="2d637075202df24875202d696f202b72646d6120"], 0x14) r5 = socket$kcm(0x2, 0x3, 0x2) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r7) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)=0xff, 0x4) openat$cgroup_procs(r3, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) openat$cgroup_procs(r6, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5451, 0x0) [ 247.177921][T15570] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.3'. 23:44:59 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x3d7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa6cb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socket$kcm(0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000340)=0xc697) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/105, 0x38e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000480)=""/138, 0x8a}], 0x3, &(0x7f0000000580)=""/110, 0x16}, 0x2003) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@random="71e5ad9d8a19"]}) openat$cgroup(r0, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) close(r1) 23:44:59 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x3d7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa6cb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socket$kcm(0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000340)=0xc697) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/105, 0x38e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000480)=""/138, 0x8a}], 0x3, &(0x7f0000000580)=""/110, 0x16}, 0x2003) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@random="71e5ad9d8a19"]}) openat$cgroup(r0, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) close(r1) 23:44:59 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="23000000210081ae00060c00f20e000002000000000000018001006fabeb264e7d06a4", 0x23}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00\x00\xc3\x00'}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x4, 0x0, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="2d637075202df24875202d696f202b72646d6120"], 0x14) r5 = socket$kcm(0x2, 0x3, 0x2) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r7) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)=0xff, 0x4) openat$cgroup_procs(r3, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) openat$cgroup_procs(r6, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5451, 0x0) 23:44:59 executing program 5: openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x8, 0x209e20}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x8, 0xf70, 0xffffffffffffdd33, 0x0, 0x1ff, 0x1010, 0x4, 0x1, 0x4, 0x3, 0x401, 0x9af, 0x5, 0x200, 0xfffffffffffffffd, 0x5, 0x100000001, 0x8, 0x1f, 0x1f, 0x6, 0x2, 0x8, 0x10000, 0x603e, 0x8, 0x7, 0x5, 0x6, 0x8, 0x0, 0x1, 0x101, 0xb3ef535, 0x3, 0x0, 0x101, 0x4, @perf_config_ext={0xfff, 0x9}, 0x800, 0x5, 0x6, 0x7, 0x6, 0xffffffffffffff91, 0x3}, r2, 0x6, r1, 0xa) r3 = openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x81a}]}) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x2490, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x6, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x81) write$cgroup_type(r5, &(0x7f0000000000)='threade\x00\x88', 0x20000009) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 247.467553][T15578] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.4'. 23:44:59 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="23000000210081ae00060c00f20e000002000000000000018001006fabeb264e7d06a4", 0x23}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00\x00\xc3\x00'}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x4, 0x0, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="2d637075202df24875202d696f202b72646d6120"], 0x14) r5 = socket$kcm(0x2, 0x3, 0x2) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r7) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)=0xff, 0x4) openat$cgroup_procs(r3, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) openat$cgroup_procs(r6, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5451, 0x0) 23:44:59 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x3d7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa6cb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socket$kcm(0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000340)=0xc697) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/105, 0x38e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000480)=""/138, 0x8a}], 0x3, &(0x7f0000000580)=""/110, 0x16}, 0x2003) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@random="71e5ad9d8a19"]}) openat$cgroup(r0, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) close(r1) 23:44:59 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x3d7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa6cb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socket$kcm(0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000340)=0xc697) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/105, 0x38e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000480)=""/138, 0x8a}], 0x3, &(0x7f0000000580)=""/110, 0x16}, 0x2003) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@random="71e5ad9d8a19"]}) openat$cgroup(r0, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) close(r1) [ 247.753334][T15589] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.3'. 23:44:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) r1 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e96dff7665a741787d4f51713f861f44601f84f1ba1c2cb25f09707778f1", 0x1e}], 0x1}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x9) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x3, 0x1, 0xfffffffffffffffd, 0x0, 0x0, 0x922, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x0, 0x0, 0x68e2ea6a, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x62) openat$cgroup_type(r4, 0x0, 0x2, 0x0) recvmsg$kcm(r2, 0x0, 0x40) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) 23:44:59 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="23000000210081ae00060c00f20e000002000000000000018001006fabeb264e7d06a4", 0x23}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00\x00\xc3\x00'}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x4, 0x0, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="2d637075202df24875202d696f202b72646d6120"], 0x14) r5 = socket$kcm(0x2, 0x3, 0x2) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r7) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)=0xff, 0x4) openat$cgroup_procs(r3, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) openat$cgroup_procs(r6, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5451, 0x0) 23:45:00 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="23000000210081ae00060c00f20e000002000000000000018001006fabeb264e7d06a4", 0x23}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00\x00\xc3\x00'}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x4, 0x0, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="2d637075202df24875202d696f202b72646d6120"], 0x14) r5 = socket$kcm(0x2, 0x3, 0x2) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r7) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)=0xff, 0x4) openat$cgroup_procs(r3, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) openat$cgroup_procs(r6, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5451, 0x0) 23:45:00 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="23000000210081ae00060c00f20e000002000000000000018001006fabeb264e7d06a4", 0x23}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00\x00\xc3\x00'}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x4, 0x0, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="2d637075202df24875202d696f202b72646d6120"], 0x14) r5 = socket$kcm(0x2, 0x3, 0x2) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r7) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)=0xff, 0x4) openat$cgroup_procs(r3, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) openat$cgroup_procs(r6, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5451, 0x0) 23:45:00 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x3d7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa6cb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socket$kcm(0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000340)=0xc697) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/105, 0x38e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000480)=""/138, 0x8a}], 0x3, &(0x7f0000000580)=""/110, 0x16}, 0x2003) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@random="71e5ad9d8a19"]}) openat$cgroup(r0, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) close(r1) 23:45:00 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x3d7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa6cb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socket$kcm(0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000340)=0xc697) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/105, 0x38e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000480)=""/138, 0x8a}], 0x3, &(0x7f0000000580)=""/110, 0x16}, 0x2003) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@random="71e5ad9d8a19"]}) openat$cgroup(r0, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) close(r1) 23:45:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) r1 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e96dff7665a741787d4f51713f861f44601f84f1ba1c2cb25f09707778f1", 0x1e}], 0x1}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x9) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x3, 0x1, 0xfffffffffffffffd, 0x0, 0x0, 0x922, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x0, 0x0, 0x68e2ea6a, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x62) openat$cgroup_type(r4, 0x0, 0x2, 0x0) recvmsg$kcm(r2, 0x0, 0x40) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) 23:45:00 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="23000000210081ae00060c00f20e000002000000000000018001006fabeb264e7d06a4", 0x23}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00\x00\xc3\x00'}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x4, 0x0, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="2d637075202df24875202d696f202b72646d6120"], 0x14) r5 = socket$kcm(0x2, 0x3, 0x2) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r7) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)=0xff, 0x4) openat$cgroup_procs(r3, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) openat$cgroup_procs(r6, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5451, 0x0) 23:45:00 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x3d7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa6cb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socket$kcm(0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000340)=0xc697) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/105, 0x38e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000480)=""/138, 0x8a}], 0x3, &(0x7f0000000580)=""/110, 0x16}, 0x2003) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@random="71e5ad9d8a19"]}) openat$cgroup(r0, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) close(r1) 23:45:00 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x3d7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa6cb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socket$kcm(0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000340)=0xc697) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/105, 0x38e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000480)=""/138, 0x8a}], 0x3, &(0x7f0000000580)=""/110, 0x16}, 0x2003) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@random="71e5ad9d8a19"]}) openat$cgroup(r0, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) close(r1) 23:45:00 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="23000000210081ae00060c00f20e000002000000000000018001006fabeb264e7d06a4", 0x23}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00\x00\xc3\x00'}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x4, 0x0, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="2d637075202df24875202d696f202b72646d6120"], 0x14) r5 = socket$kcm(0x2, 0x3, 0x2) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r7) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)=0xff, 0x4) openat$cgroup_procs(r3, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) openat$cgroup_procs(r6, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5451, 0x0) 23:45:01 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x3d7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa6cb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socket$kcm(0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000340)=0xc697) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/105, 0x38e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000480)=""/138, 0x8a}], 0x3, &(0x7f0000000580)=""/110, 0x16}, 0x2003) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@random="71e5ad9d8a19"]}) openat$cgroup(r0, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) close(r1) 23:45:01 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x3d7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa6cb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socket$kcm(0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000340)=0xc697) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/105, 0x38e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000480)=""/138, 0x8a}], 0x3, &(0x7f0000000580)=""/110, 0x16}, 0x2003) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@random="71e5ad9d8a19"]}) openat$cgroup(r0, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) close(r1) 23:45:01 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x3d7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa6cb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socket$kcm(0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000340)=0xc697) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/105, 0x38e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000480)=""/138, 0x8a}], 0x3, &(0x7f0000000580)=""/110, 0x16}, 0x2003) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@random="71e5ad9d8a19"]}) openat$cgroup(r0, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) close(r1) 23:45:01 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x3d7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa6cb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socket$kcm(0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000340)=0xc697) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/105, 0x38e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000480)=""/138, 0x8a}], 0x3, &(0x7f0000000580)=""/110, 0x16}, 0x2003) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@random="71e5ad9d8a19"]}) openat$cgroup(r0, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) close(r1) 23:45:01 executing program 0: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="23000000210081ae00060c00f20e000002000000000000018001006fabeb264e7d06a4", 0x23}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00\x00\xc3\x00'}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x4, 0x0, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="2d637075202df24875202d696f202b72646d6120"], 0x14) r5 = socket$kcm(0x2, 0x3, 0x2) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r7) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)=0xff, 0x4) openat$cgroup_procs(r3, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) openat$cgroup_procs(r6, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5451, 0x0) 23:45:01 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x3d7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa6cb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socket$kcm(0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000340)=0xc697) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/105, 0x38e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000480)=""/138, 0x8a}], 0x3, &(0x7f0000000580)=""/110, 0x16}, 0x2003) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@random="71e5ad9d8a19"]}) openat$cgroup(r0, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) close(r1) 23:45:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) r1 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e96dff7665a741787d4f51713f861f44601f84f1ba1c2cb25f09707778f1", 0x1e}], 0x1}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x9) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x3, 0x1, 0xfffffffffffffffd, 0x0, 0x0, 0x922, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x0, 0x0, 0x68e2ea6a, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x62) openat$cgroup_type(r4, 0x0, 0x2, 0x0) recvmsg$kcm(r2, 0x0, 0x40) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) 23:45:01 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x3d7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa6cb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socket$kcm(0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000340)=0xc697) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/105, 0x38e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000480)=""/138, 0x8a}], 0x3, &(0x7f0000000580)=""/110, 0x16}, 0x2003) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@random="71e5ad9d8a19"]}) openat$cgroup(r0, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) close(r1) 23:45:01 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x3d7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa6cb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socket$kcm(0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000340)=0xc697) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/105, 0x38e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000480)=""/138, 0x8a}], 0x3, &(0x7f0000000580)=""/110, 0x16}, 0x2003) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@random="71e5ad9d8a19"]}) openat$cgroup(r0, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) close(r1) 23:45:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) r1 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e96dff7665a741787d4f51713f861f44601f84f1ba1c2cb25f09707778f1", 0x1e}], 0x1}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x9) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x3, 0x1, 0xfffffffffffffffd, 0x0, 0x0, 0x922, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x0, 0x0, 0x68e2ea6a, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x62) openat$cgroup_type(r4, 0x0, 0x2, 0x0) recvmsg$kcm(r2, 0x0, 0x40) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) 23:45:01 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000240)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000013c0)) sendmsg$kcm(r0, &(0x7f00000025c0)={&(0x7f00000002c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha20-generic\x00'}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x20000004) 23:45:02 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={0x0, r0, 0x0, 0x1, &(0x7f0000000380)='\x00'}, 0x30) perf_event_open(&(0x7f0000000b00)={0x5, 0x70, 0x7, 0x6, 0x40, 0xffffffff, 0x0, 0x1, 0x19800, 0x1, 0x100000001, 0x10001, 0xc2e, 0x1ff, 0x6, 0x7, 0x80, 0x7f, 0x8, 0x5, 0xff, 0x22291e4f, 0xeb53, 0xfffffffffffffff9, 0x7f, 0xffff, 0x2, 0x12a4, 0x40, 0x5, 0x6, 0x7f, 0x5, 0x1, 0x7f, 0x0, 0x68, 0x200, 0x0, 0x20, 0x4, @perf_config_ext={0xc16b, 0x7}, 0x4, 0x4, 0x55, 0x2, 0x9, 0x7, 0x6}, r1, 0x3, r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r3, 0x0, 0x2, 0x0) sendmsg$sock(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000380)}], 0x1}, 0x80) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r4, 0x1, 0x28, &(0x7f0000000000), 0x4) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001e000507ed0080648c63b8ee204494f20531d200050011404b48000001000080000000000300f88000f0", 0x2e}], 0x1}, 0x0) gettid() close(r5) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000001b40)='syz0\x00', 0x1ff) sendmsg$kcm(r5, &(0x7f00000006c0)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000380)}, 0x4008010) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x6, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000000680)={0x3, 0x10, 0xfffffffffffffffa, 0x800}, &(0x7f00000003c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0), 0x4) recvmsg$kcm(r4, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/238, 0xee}, 0x0) [ 250.240777][T15683] __sock_release: fasync list not empty! 23:45:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) r1 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e96dff7665a741787d4f51713f861f44601f84f1ba1c2cb25f09707778f1", 0x1e}], 0x1}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x9) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x3, 0x1, 0xfffffffffffffffd, 0x0, 0x0, 0x922, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x0, 0x0, 0x68e2ea6a, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x62) openat$cgroup_type(r4, 0x0, 0x2, 0x0) recvmsg$kcm(r2, 0x0, 0x40) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) 23:45:02 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000240)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000013c0)) sendmsg$kcm(r0, &(0x7f00000025c0)={&(0x7f00000002c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha20-generic\x00'}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x20000004) 23:45:02 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000240)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000013c0)) sendmsg$kcm(r0, &(0x7f00000025c0)={&(0x7f00000002c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha20-generic\x00'}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x20000004) 23:45:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) r1 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e96dff7665a741787d4f51713f861f44601f84f1ba1c2cb25f09707778f1", 0x1e}], 0x1}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x9) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x3, 0x1, 0xfffffffffffffffd, 0x0, 0x0, 0x922, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x0, 0x0, 0x68e2ea6a, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x62) openat$cgroup_type(r4, 0x0, 0x2, 0x0) recvmsg$kcm(r2, 0x0, 0x40) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) 23:45:02 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000240)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000013c0)) sendmsg$kcm(r0, &(0x7f00000025c0)={&(0x7f00000002c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha20-generic\x00'}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x20000004) 23:45:02 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={0x0, r0, 0x0, 0x1, &(0x7f0000000380)='\x00'}, 0x30) perf_event_open(&(0x7f0000000b00)={0x5, 0x70, 0x7, 0x6, 0x40, 0xffffffff, 0x0, 0x1, 0x19800, 0x1, 0x100000001, 0x10001, 0xc2e, 0x1ff, 0x6, 0x7, 0x80, 0x7f, 0x8, 0x5, 0xff, 0x22291e4f, 0xeb53, 0xfffffffffffffff9, 0x7f, 0xffff, 0x2, 0x12a4, 0x40, 0x5, 0x6, 0x7f, 0x5, 0x1, 0x7f, 0x0, 0x68, 0x200, 0x0, 0x20, 0x4, @perf_config_ext={0xc16b, 0x7}, 0x4, 0x4, 0x55, 0x2, 0x9, 0x7, 0x6}, r1, 0x3, r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r3, 0x0, 0x2, 0x0) sendmsg$sock(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000380)}], 0x1}, 0x80) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r4, 0x1, 0x28, &(0x7f0000000000), 0x4) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001e000507ed0080648c63b8ee204494f20531d200050011404b48000001000080000000000300f88000f0", 0x2e}], 0x1}, 0x0) gettid() close(r5) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000001b40)='syz0\x00', 0x1ff) sendmsg$kcm(r5, &(0x7f00000006c0)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000380)}, 0x4008010) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x6, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000000680)={0x3, 0x10, 0xfffffffffffffffa, 0x800}, &(0x7f00000003c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0), 0x4) recvmsg$kcm(r4, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/238, 0xee}, 0x0) 23:45:02 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x3d7) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa6cb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socket$kcm(0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000340)=0xc697) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/105, 0x38e}, {&(0x7f0000000640)=""/49, 0x31}, {&(0x7f0000000480)=""/138, 0x8a}], 0x3, &(0x7f0000000580)=""/110, 0x16}, 0x2003) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x33b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x1, [@random="71e5ad9d8a19"]}) openat$cgroup(r0, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) close(0xffffffffffffffff) close(r1) 23:45:02 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000240)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000013c0)) sendmsg$kcm(r0, &(0x7f00000025c0)={&(0x7f00000002c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha20-generic\x00'}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x20000004) [ 250.765691][T15718] __nla_validate_parse: 7 callbacks suppressed [ 250.765729][T15718] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 23:45:02 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000240)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000013c0)) sendmsg$kcm(r0, &(0x7f00000025c0)={&(0x7f00000002c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha20-generic\x00'}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x20000004) 23:45:02 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={0x0, r0, 0x0, 0x1, &(0x7f0000000380)='\x00'}, 0x30) perf_event_open(&(0x7f0000000b00)={0x5, 0x70, 0x7, 0x6, 0x40, 0xffffffff, 0x0, 0x1, 0x19800, 0x1, 0x100000001, 0x10001, 0xc2e, 0x1ff, 0x6, 0x7, 0x80, 0x7f, 0x8, 0x5, 0xff, 0x22291e4f, 0xeb53, 0xfffffffffffffff9, 0x7f, 0xffff, 0x2, 0x12a4, 0x40, 0x5, 0x6, 0x7f, 0x5, 0x1, 0x7f, 0x0, 0x68, 0x200, 0x0, 0x20, 0x4, @perf_config_ext={0xc16b, 0x7}, 0x4, 0x4, 0x55, 0x2, 0x9, 0x7, 0x6}, r1, 0x3, r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r3, 0x0, 0x2, 0x0) sendmsg$sock(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000380)}], 0x1}, 0x80) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r4, 0x1, 0x28, &(0x7f0000000000), 0x4) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001e000507ed0080648c63b8ee204494f20531d200050011404b48000001000080000000000300f88000f0", 0x2e}], 0x1}, 0x0) gettid() close(r5) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000001b40)='syz0\x00', 0x1ff) sendmsg$kcm(r5, &(0x7f00000006c0)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000380)}, 0x4008010) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x6, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000000680)={0x3, 0x10, 0xfffffffffffffffa, 0x800}, &(0x7f00000003c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0), 0x4) recvmsg$kcm(r4, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/238, 0xee}, 0x0) 23:45:02 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000240)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000013c0)) sendmsg$kcm(r0, &(0x7f00000025c0)={&(0x7f00000002c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xchacha20-generic\x00'}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x20000004) [ 251.072278][T15733] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 23:45:03 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={0x0, r0, 0x0, 0x1, &(0x7f0000000380)='\x00'}, 0x30) perf_event_open(&(0x7f0000000b00)={0x5, 0x70, 0x7, 0x6, 0x40, 0xffffffff, 0x0, 0x1, 0x19800, 0x1, 0x100000001, 0x10001, 0xc2e, 0x1ff, 0x6, 0x7, 0x80, 0x7f, 0x8, 0x5, 0xff, 0x22291e4f, 0xeb53, 0xfffffffffffffff9, 0x7f, 0xffff, 0x2, 0x12a4, 0x40, 0x5, 0x6, 0x7f, 0x5, 0x1, 0x7f, 0x0, 0x68, 0x200, 0x0, 0x20, 0x4, @perf_config_ext={0xc16b, 0x7}, 0x4, 0x4, 0x55, 0x2, 0x9, 0x7, 0x6}, r1, 0x3, r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r3, 0x0, 0x2, 0x0) sendmsg$sock(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000380)}], 0x1}, 0x80) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r4, 0x1, 0x28, &(0x7f0000000000), 0x4) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001e000507ed0080648c63b8ee204494f20531d200050011404b48000001000080000000000300f88000f0", 0x2e}], 0x1}, 0x0) gettid() close(r5) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000001b40)='syz0\x00', 0x1ff) sendmsg$kcm(r5, &(0x7f00000006c0)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000380)}, 0x4008010) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x6, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000000680)={0x3, 0x10, 0xfffffffffffffffa, 0x800}, &(0x7f00000003c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0), 0x4) recvmsg$kcm(r4, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/238, 0xee}, 0x0) 23:45:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) r1 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e96dff7665a741787d4f51713f861f44601f84f1ba1c2cb25f09707778f1", 0x1e}], 0x1}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x9) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x3, 0x1, 0xfffffffffffffffd, 0x0, 0x0, 0x922, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x0, 0x0, 0x68e2ea6a, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x62) openat$cgroup_type(r4, 0x0, 0x2, 0x0) recvmsg$kcm(r2, 0x0, 0x40) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) 23:45:03 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={0x0, r0, 0x0, 0x1, &(0x7f0000000380)='\x00'}, 0x30) perf_event_open(&(0x7f0000000b00)={0x5, 0x70, 0x7, 0x6, 0x40, 0xffffffff, 0x0, 0x1, 0x19800, 0x1, 0x100000001, 0x10001, 0xc2e, 0x1ff, 0x6, 0x7, 0x80, 0x7f, 0x8, 0x5, 0xff, 0x22291e4f, 0xeb53, 0xfffffffffffffff9, 0x7f, 0xffff, 0x2, 0x12a4, 0x40, 0x5, 0x6, 0x7f, 0x5, 0x1, 0x7f, 0x0, 0x68, 0x200, 0x0, 0x20, 0x4, @perf_config_ext={0xc16b, 0x7}, 0x4, 0x4, 0x55, 0x2, 0x9, 0x7, 0x6}, r1, 0x3, r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r3, 0x0, 0x2, 0x0) sendmsg$sock(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000380)}], 0x1}, 0x80) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r4, 0x1, 0x28, &(0x7f0000000000), 0x4) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001e000507ed0080648c63b8ee204494f20531d200050011404b48000001000080000000000300f88000f0", 0x2e}], 0x1}, 0x0) gettid() close(r5) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000001b40)='syz0\x00', 0x1ff) sendmsg$kcm(r5, &(0x7f00000006c0)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000380)}, 0x4008010) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x6, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000000680)={0x3, 0x10, 0xfffffffffffffffa, 0x800}, &(0x7f00000003c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0), 0x4) recvmsg$kcm(r4, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/238, 0xee}, 0x0) 23:45:03 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={0x0, r0, 0x0, 0x1, &(0x7f0000000380)='\x00'}, 0x30) perf_event_open(&(0x7f0000000b00)={0x5, 0x70, 0x7, 0x6, 0x40, 0xffffffff, 0x0, 0x1, 0x19800, 0x1, 0x100000001, 0x10001, 0xc2e, 0x1ff, 0x6, 0x7, 0x80, 0x7f, 0x8, 0x5, 0xff, 0x22291e4f, 0xeb53, 0xfffffffffffffff9, 0x7f, 0xffff, 0x2, 0x12a4, 0x40, 0x5, 0x6, 0x7f, 0x5, 0x1, 0x7f, 0x0, 0x68, 0x200, 0x0, 0x20, 0x4, @perf_config_ext={0xc16b, 0x7}, 0x4, 0x4, 0x55, 0x2, 0x9, 0x7, 0x6}, r1, 0x3, r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r3, 0x0, 0x2, 0x0) sendmsg$sock(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000380)}], 0x1}, 0x80) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r4, 0x1, 0x28, &(0x7f0000000000), 0x4) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001e000507ed0080648c63b8ee204494f20531d200050011404b48000001000080000000000300f88000f0", 0x2e}], 0x1}, 0x0) gettid() close(r5) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000001b40)='syz0\x00', 0x1ff) sendmsg$kcm(r5, &(0x7f00000006c0)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000380)}, 0x4008010) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x6, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000000680)={0x3, 0x10, 0xfffffffffffffffa, 0x800}, &(0x7f00000003c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0), 0x4) recvmsg$kcm(r4, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/238, 0xee}, 0x0) [ 251.383972][T15741] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 23:45:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) r1 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x386, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e96dff7665a741787d4f51713f861f44601f84f1ba1c2cb25f09707778f1", 0x1e}], 0x1}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x9) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x3, 0x1, 0xfffffffffffffffd, 0x0, 0x0, 0x922, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x900000000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0xee, 0x7, 0x0, 0xd0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x0, 0x0, 0x68e2ea6a, 0x6, 0x8}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x62) openat$cgroup_type(r4, 0x0, 0x2, 0x0) recvmsg$kcm(r2, 0x0, 0x40) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) 23:45:03 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={0x0, r0, 0x0, 0x1, &(0x7f0000000380)='\x00'}, 0x30) perf_event_open(&(0x7f0000000b00)={0x5, 0x70, 0x7, 0x6, 0x40, 0xffffffff, 0x0, 0x1, 0x19800, 0x1, 0x100000001, 0x10001, 0xc2e, 0x1ff, 0x6, 0x7, 0x80, 0x7f, 0x8, 0x5, 0xff, 0x22291e4f, 0xeb53, 0xfffffffffffffff9, 0x7f, 0xffff, 0x2, 0x12a4, 0x40, 0x5, 0x6, 0x7f, 0x5, 0x1, 0x7f, 0x0, 0x68, 0x200, 0x0, 0x20, 0x4, @perf_config_ext={0xc16b, 0x7}, 0x4, 0x4, 0x55, 0x2, 0x9, 0x7, 0x6}, r1, 0x3, r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r3, 0x0, 0x2, 0x0) sendmsg$sock(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000380)}], 0x1}, 0x80) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r4, 0x1, 0x28, &(0x7f0000000000), 0x4) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001e000507ed0080648c63b8ee204494f20531d200050011404b48000001000080000000000300f88000f0", 0x2e}], 0x1}, 0x0) gettid() close(r5) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000001b40)='syz0\x00', 0x1ff) sendmsg$kcm(r5, &(0x7f00000006c0)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000380)}, 0x4008010) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x6, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000000680)={0x3, 0x10, 0xfffffffffffffffa, 0x800}, &(0x7f00000003c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0), 0x4) recvmsg$kcm(r4, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/238, 0xee}, 0x0) [ 251.476953][T15745] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 251.491097][ C0] net_ratelimit: 2 callbacks suppressed [ 251.491107][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 251.501192][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 251.527093][T15747] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 23:45:03 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={0x0, r0, 0x0, 0x1, &(0x7f0000000380)='\x00'}, 0x30) perf_event_open(&(0x7f0000000b00)={0x5, 0x70, 0x7, 0x6, 0x40, 0xffffffff, 0x0, 0x1, 0x19800, 0x1, 0x100000001, 0x10001, 0xc2e, 0x1ff, 0x6, 0x7, 0x80, 0x7f, 0x8, 0x5, 0xff, 0x22291e4f, 0xeb53, 0xfffffffffffffff9, 0x7f, 0xffff, 0x2, 0x12a4, 0x40, 0x5, 0x6, 0x7f, 0x5, 0x1, 0x7f, 0x0, 0x68, 0x200, 0x0, 0x20, 0x4, @perf_config_ext={0xc16b, 0x7}, 0x4, 0x4, 0x55, 0x2, 0x9, 0x7, 0x6}, r1, 0x3, r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r3, 0x0, 0x2, 0x0) sendmsg$sock(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000380)}], 0x1}, 0x80) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r4, 0x1, 0x28, &(0x7f0000000000), 0x4) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001e000507ed0080648c63b8ee204494f20531d200050011404b48000001000080000000000300f88000f0", 0x2e}], 0x1}, 0x0) gettid() close(r5) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000001b40)='syz0\x00', 0x1ff) sendmsg$kcm(r5, &(0x7f00000006c0)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000380)}, 0x4008010) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x6, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000000680)={0x3, 0x10, 0xfffffffffffffffa, 0x800}, &(0x7f00000003c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0), 0x4) recvmsg$kcm(r4, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/238, 0xee}, 0x0) 23:45:03 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4006}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\x03\xaa\xac\x11x\xf4D3A}\xda\xac\xff\x82\x8a\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x891a, &(0x7f0000000200)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00\x80\x00\xa0\x00\x80\x00\x00\n\xf4D3A}\xe4\xac\xff\x82q\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 251.564873][T15749] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 251.580532][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 251.586350][ C1] protocol 88fb is buggy, dev hsr_slave_1 23:45:03 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={0x0, r0, 0x0, 0x1, &(0x7f0000000380)='\x00'}, 0x30) perf_event_open(&(0x7f0000000b00)={0x5, 0x70, 0x7, 0x6, 0x40, 0xffffffff, 0x0, 0x1, 0x19800, 0x1, 0x100000001, 0x10001, 0xc2e, 0x1ff, 0x6, 0x7, 0x80, 0x7f, 0x8, 0x5, 0xff, 0x22291e4f, 0xeb53, 0xfffffffffffffff9, 0x7f, 0xffff, 0x2, 0x12a4, 0x40, 0x5, 0x6, 0x7f, 0x5, 0x1, 0x7f, 0x0, 0x68, 0x200, 0x0, 0x20, 0x4, @perf_config_ext={0xc16b, 0x7}, 0x4, 0x4, 0x55, 0x2, 0x9, 0x7, 0x6}, r1, 0x3, r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r3, 0x0, 0x2, 0x0) sendmsg$sock(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000380)}], 0x1}, 0x80) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r4, 0x1, 0x28, &(0x7f0000000000), 0x4) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001e000507ed0080648c63b8ee204494f20531d200050011404b48000001000080000000000300f88000f0", 0x2e}], 0x1}, 0x0) gettid() close(r5) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000001b40)='syz0\x00', 0x1ff) sendmsg$kcm(r5, &(0x7f00000006c0)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000380)}, 0x4008010) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x6, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000000680)={0x3, 0x10, 0xfffffffffffffffa, 0x800}, &(0x7f00000003c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0), 0x4) recvmsg$kcm(r4, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/238, 0xee}, 0x0) 23:45:03 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={0x0, r0, 0x0, 0x1, &(0x7f0000000380)='\x00'}, 0x30) perf_event_open(&(0x7f0000000b00)={0x5, 0x70, 0x7, 0x6, 0x40, 0xffffffff, 0x0, 0x1, 0x19800, 0x1, 0x100000001, 0x10001, 0xc2e, 0x1ff, 0x6, 0x7, 0x80, 0x7f, 0x8, 0x5, 0xff, 0x22291e4f, 0xeb53, 0xfffffffffffffff9, 0x7f, 0xffff, 0x2, 0x12a4, 0x40, 0x5, 0x6, 0x7f, 0x5, 0x1, 0x7f, 0x0, 0x68, 0x200, 0x0, 0x20, 0x4, @perf_config_ext={0xc16b, 0x7}, 0x4, 0x4, 0x55, 0x2, 0x9, 0x7, 0x6}, r1, 0x3, r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r3, 0x0, 0x2, 0x0) sendmsg$sock(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000380)}], 0x1}, 0x80) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r4, 0x1, 0x28, &(0x7f0000000000), 0x4) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001e000507ed0080648c63b8ee204494f20531d200050011404b48000001000080000000000300f88000f0", 0x2e}], 0x1}, 0x0) gettid() close(r5) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000001b40)='syz0\x00', 0x1ff) sendmsg$kcm(r5, &(0x7f00000006c0)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000380)}, 0x4008010) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x6, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000000680)={0x3, 0x10, 0xfffffffffffffffa, 0x800}, &(0x7f00000003c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0), 0x4) recvmsg$kcm(r4, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/238, 0xee}, 0x0) [ 251.758770][T15764] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 251.859975][T15773] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 251.877858][T15771] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 23:45:03 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={0x0, r0, 0x0, 0x1, &(0x7f0000000380)='\x00'}, 0x30) perf_event_open(&(0x7f0000000b00)={0x5, 0x70, 0x7, 0x6, 0x40, 0xffffffff, 0x0, 0x1, 0x19800, 0x1, 0x100000001, 0x10001, 0xc2e, 0x1ff, 0x6, 0x7, 0x80, 0x7f, 0x8, 0x5, 0xff, 0x22291e4f, 0xeb53, 0xfffffffffffffff9, 0x7f, 0xffff, 0x2, 0x12a4, 0x40, 0x5, 0x6, 0x7f, 0x5, 0x1, 0x7f, 0x0, 0x68, 0x200, 0x0, 0x20, 0x4, @perf_config_ext={0xc16b, 0x7}, 0x4, 0x4, 0x55, 0x2, 0x9, 0x7, 0x6}, r1, 0x3, r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r3, 0x0, 0x2, 0x0) sendmsg$sock(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000380)}], 0x1}, 0x80) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r4, 0x1, 0x28, &(0x7f0000000000), 0x4) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001e000507ed0080648c63b8ee204494f20531d200050011404b48000001000080000000000300f88000f0", 0x2e}], 0x1}, 0x0) gettid() close(r5) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000001b40)='syz0\x00', 0x1ff) sendmsg$kcm(r5, &(0x7f00000006c0)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000380)}, 0x4008010) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x6, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000000680)={0x3, 0x10, 0xfffffffffffffffa, 0x800}, &(0x7f00000003c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0), 0x4) recvmsg$kcm(r4, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/238, 0xee}, 0x0) 23:45:03 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={0x0, r0, 0x0, 0x1, &(0x7f0000000380)='\x00'}, 0x30) perf_event_open(&(0x7f0000000b00)={0x5, 0x70, 0x7, 0x6, 0x40, 0xffffffff, 0x0, 0x1, 0x19800, 0x1, 0x100000001, 0x10001, 0xc2e, 0x1ff, 0x6, 0x7, 0x80, 0x7f, 0x8, 0x5, 0xff, 0x22291e4f, 0xeb53, 0xfffffffffffffff9, 0x7f, 0xffff, 0x2, 0x12a4, 0x40, 0x5, 0x6, 0x7f, 0x5, 0x1, 0x7f, 0x0, 0x68, 0x200, 0x0, 0x20, 0x4, @perf_config_ext={0xc16b, 0x7}, 0x4, 0x4, 0x55, 0x2, 0x9, 0x7, 0x6}, r1, 0x3, r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r3, 0x0, 0x2, 0x0) sendmsg$sock(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000380)}], 0x1}, 0x80) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r4, 0x1, 0x28, &(0x7f0000000000), 0x4) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001e000507ed0080648c63b8ee204494f20531d200050011404b48000001000080000000000300f88000f0", 0x2e}], 0x1}, 0x0) gettid() close(r5) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000001b40)='syz0\x00', 0x1ff) sendmsg$kcm(r5, &(0x7f00000006c0)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000380)}, 0x4008010) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x6, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000000680)={0x3, 0x10, 0xfffffffffffffffa, 0x800}, &(0x7f00000003c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0), 0x4) recvmsg$kcm(r4, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/238, 0xee}, 0x0) 23:45:03 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={0x0, r0, 0x0, 0x1, &(0x7f0000000380)='\x00'}, 0x30) perf_event_open(&(0x7f0000000b00)={0x5, 0x70, 0x7, 0x6, 0x40, 0xffffffff, 0x0, 0x1, 0x19800, 0x1, 0x100000001, 0x10001, 0xc2e, 0x1ff, 0x6, 0x7, 0x80, 0x7f, 0x8, 0x5, 0xff, 0x22291e4f, 0xeb53, 0xfffffffffffffff9, 0x7f, 0xffff, 0x2, 0x12a4, 0x40, 0x5, 0x6, 0x7f, 0x5, 0x1, 0x7f, 0x0, 0x68, 0x200, 0x0, 0x20, 0x4, @perf_config_ext={0xc16b, 0x7}, 0x4, 0x4, 0x55, 0x2, 0x9, 0x7, 0x6}, r1, 0x3, r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) r3 = openat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r3, 0x0, 0x2, 0x0) sendmsg$sock(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000380)}], 0x1}, 0x80) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r4, 0x1, 0x28, &(0x7f0000000000), 0x4) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001e000507ed0080648c63b8ee204494f20531d200050011404b48000001000080000000000300f88000f0", 0x2e}], 0x1}, 0x0) gettid() close(r5) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000001b40)='syz0\x00', 0x1ff) sendmsg$kcm(r5, &(0x7f00000006c0)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000380)}, 0x4008010) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x6, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000000680)={0x3, 0x10, 0xfffffffffffffffa, 0x800}, &(0x7f00000003c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0), 0x4) recvmsg$kcm(r4, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/238, 0xee}, 0x0) [ 252.091571][T15776] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 252.130560][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 252.136394][ C1] protocol 88fb is buggy, dev hsr_slave_1 23:45:04 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0x3e) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$TUNSETCARRIER(r4, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') 23:45:04 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4006}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\x03\xaa\xac\x11x\xf4D3A}\xda\xac\xff\x82\x8a\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x891a, &(0x7f0000000200)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00\x80\x00\xa0\x00\x80\x00\x00\n\xf4D3A}\xe4\xac\xff\x82q\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 23:45:04 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x402002100000004b, 0xf}, 0x3c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') 23:45:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001900)="2e0000001d008104e08f80ecdb4cb9d9026319016993bc1a454ada35a564f3f7af5312140002003bb214bbe10001", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 23:45:04 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x4, 0x4, 0x20000000001009}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000040), 0x0}, 0x18) 23:45:04 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000001d008100e00f80ecdb4cb9040ac8650402000000000000fb120001000e00da1b40d819a9060015000000", 0x2e}], 0x1}, 0x0) 23:45:04 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x4, 0x4, 0x20000000001009}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000040), 0x0}, 0x18) 23:45:04 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x402002100000004b, 0xf}, 0x3c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') 23:45:04 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x4, 0x4, 0x20000000001009}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000040), 0x0}, 0x18) 23:45:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001900)="2e0000001d008104e08f80ecdb4cb9d9026319016993bc1a454ada35a564f3f7af5312140002003bb214bbe10001", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 252.927188][T15796] device wlan0 entered promiscuous mode 23:45:04 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x402002100000004b, 0xf}, 0x3c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') 23:45:04 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x4, 0x4, 0x20000000001009}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000040), 0x0}, 0x18) 23:45:05 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0x3e) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$TUNSETCARRIER(r4, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') 23:45:05 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000001d008100e00f80ecdb4cb9040ac8650402000000000000fb120001000e00da1b40d819a9060015000000", 0x2e}], 0x1}, 0x0) 23:45:05 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4006}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\x03\xaa\xac\x11x\xf4D3A}\xda\xac\xff\x82\x8a\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x891a, &(0x7f0000000200)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00\x80\x00\xa0\x00\x80\x00\x00\n\xf4D3A}\xe4\xac\xff\x82q\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 23:45:05 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x402002100000004b, 0xf}, 0x3c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') 23:45:05 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0x3e) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$TUNSETCARRIER(r4, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') 23:45:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001900)="2e0000001d008104e08f80ecdb4cb9d9026319016993bc1a454ada35a564f3f7af5312140002003bb214bbe10001", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 23:45:05 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000001d008100e00f80ecdb4cb9040ac8650402000000000000fb120001000e00da1b40d819a9060015000000", 0x2e}], 0x1}, 0x0) 23:45:05 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0x3e) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$TUNSETCARRIER(r4, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') 23:45:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001900)="2e0000001d008104e08f80ecdb4cb9d9026319016993bc1a454ada35a564f3f7af5312140002003bb214bbe10001", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 23:45:05 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000001d008100e00f80ecdb4cb9040ac8650402000000000000fb120001000e00da1b40d819a9060015000000", 0x2e}], 0x1}, 0x0) [ 253.754419][T15845] device wlan0 entered promiscuous mode 23:45:05 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x81) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000d40)={&(0x7f0000000d00)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000d80)=r5, 0x4) write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r6 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xe, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r7 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) gettid() setsockopt$sock_attach_bpf(r6, 0x1, 0x32, 0x0, 0x0) sendmsg$sock(r6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x60}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x0, 0xdc, 0x0}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r7, 0x0, 0x0) [ 253.796727][T15861] device wlan0 entered promiscuous mode 23:45:05 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0x3e) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$TUNSETCARRIER(r4, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') 23:45:05 executing program 2: socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x5, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) perf_event_open(&(0x7f0000000580)={0x7, 0x70, 0x1, 0x1b12, 0x0, 0x7, 0x0, 0x9, 0x402, 0x6, 0x80000000, 0x4, 0x791, 0x1, 0x3, 0x0, 0xfff, 0xfffffffffffff71e, 0x20, 0x0, 0x200, 0x781f8585, 0x0, 0x0, 0x100000001, 0x6, 0x4, 0x2, 0x0, 0xfffffffffffffffa, 0x1000, 0x8000, 0x5, 0x5, 0xf72, 0xfff, 0x7, 0x80000000, 0x0, 0x81, 0x3, @perf_bp={0x0, 0xc}, 0x10001, 0x1d64, 0x0, 0x1, 0x1, 0x4, 0xffffffffffffb76f}, 0x0, 0xc, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) recvmsg(r2, &(0x7f0000004fc0)={0x0, 0x3d4, &(0x7f0000004ec0)=[{&(0x7f0000000380)=""/14, 0xffffffffffffff9c}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4, 0x0, 0xffffffffffffffdc}, 0x10040) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='cpu.stat\x00', 0x0, 0x0) 23:45:05 executing program 5: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4006}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\x03\xaa\xac\x11x\xf4D3A}\xda\xac\xff\x82\x8a\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x891a, &(0x7f0000000200)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00\x80\x00\xa0\x00\x80\x00\x00\n\xf4D3A}\xe4\xac\xff\x82q\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 23:45:05 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0x3e) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$TUNSETCARRIER(r4, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') 23:45:05 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0x3e) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$TUNSETCARRIER(r4, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') 23:45:06 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x81) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000d40)={&(0x7f0000000d00)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000d80)=r5, 0x4) write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r6 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xe, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r7 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) gettid() setsockopt$sock_attach_bpf(r6, 0x1, 0x32, 0x0, 0x0) sendmsg$sock(r6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x60}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x0, 0xdc, 0x0}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r7, 0x0, 0x0) 23:45:06 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0x3e) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$TUNSETCARRIER(r4, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') 23:45:06 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x81) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000d40)={&(0x7f0000000d00)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000d80)=r5, 0x4) write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r6 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xe, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r7 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) gettid() setsockopt$sock_attach_bpf(r6, 0x1, 0x32, 0x0, 0x0) sendmsg$sock(r6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x60}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x0, 0xdc, 0x0}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r7, 0x0, 0x0) 23:45:06 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x81) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000d40)={&(0x7f0000000d00)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000d80)=r5, 0x4) write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r6 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xe, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r7 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) gettid() setsockopt$sock_attach_bpf(r6, 0x1, 0x32, 0x0, 0x0) sendmsg$sock(r6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x60}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x0, 0xdc, 0x0}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r7, 0x0, 0x0) 23:45:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0x3e) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$TUNSETCARRIER(r4, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') 23:45:06 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0x3e) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$TUNSETCARRIER(r4, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') 23:45:06 executing program 2: socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x5, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) perf_event_open(&(0x7f0000000580)={0x7, 0x70, 0x1, 0x1b12, 0x0, 0x7, 0x0, 0x9, 0x402, 0x6, 0x80000000, 0x4, 0x791, 0x1, 0x3, 0x0, 0xfff, 0xfffffffffffff71e, 0x20, 0x0, 0x200, 0x781f8585, 0x0, 0x0, 0x100000001, 0x6, 0x4, 0x2, 0x0, 0xfffffffffffffffa, 0x1000, 0x8000, 0x5, 0x5, 0xf72, 0xfff, 0x7, 0x80000000, 0x0, 0x81, 0x3, @perf_bp={0x0, 0xc}, 0x10001, 0x1d64, 0x0, 0x1, 0x1, 0x4, 0xffffffffffffb76f}, 0x0, 0xc, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) recvmsg(r2, &(0x7f0000004fc0)={0x0, 0x3d4, &(0x7f0000004ec0)=[{&(0x7f0000000380)=""/14, 0xffffffffffffff9c}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4, 0x0, 0xffffffffffffffdc}, 0x10040) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='cpu.stat\x00', 0x0, 0x0) 23:45:06 executing program 4: socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x5, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) perf_event_open(&(0x7f0000000580)={0x7, 0x70, 0x1, 0x1b12, 0x0, 0x7, 0x0, 0x9, 0x402, 0x6, 0x80000000, 0x4, 0x791, 0x1, 0x3, 0x0, 0xfff, 0xfffffffffffff71e, 0x20, 0x0, 0x200, 0x781f8585, 0x0, 0x0, 0x100000001, 0x6, 0x4, 0x2, 0x0, 0xfffffffffffffffa, 0x1000, 0x8000, 0x5, 0x5, 0xf72, 0xfff, 0x7, 0x80000000, 0x0, 0x81, 0x3, @perf_bp={0x0, 0xc}, 0x10001, 0x1d64, 0x0, 0x1, 0x1, 0x4, 0xffffffffffffb76f}, 0x0, 0xc, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) recvmsg(r2, &(0x7f0000004fc0)={0x0, 0x3d4, &(0x7f0000004ec0)=[{&(0x7f0000000380)=""/14, 0xffffffffffffff9c}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4, 0x0, 0xffffffffffffffdc}, 0x10040) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='cpu.stat\x00', 0x0, 0x0) 23:45:06 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x81) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000d40)={&(0x7f0000000d00)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000d80)=r5, 0x4) write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r6 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xe, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r7 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) gettid() setsockopt$sock_attach_bpf(r6, 0x1, 0x32, 0x0, 0x0) sendmsg$sock(r6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x60}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x0, 0xdc, 0x0}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r7, 0x0, 0x0) 23:45:07 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x81) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000d40)={&(0x7f0000000d00)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000d80)=r5, 0x4) write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r6 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xe, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r7 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) gettid() setsockopt$sock_attach_bpf(r6, 0x1, 0x32, 0x0, 0x0) sendmsg$sock(r6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x60}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x0, 0xdc, 0x0}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r7, 0x0, 0x0) 23:45:07 executing program 1: socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x5, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) perf_event_open(&(0x7f0000000580)={0x7, 0x70, 0x1, 0x1b12, 0x0, 0x7, 0x0, 0x9, 0x402, 0x6, 0x80000000, 0x4, 0x791, 0x1, 0x3, 0x0, 0xfff, 0xfffffffffffff71e, 0x20, 0x0, 0x200, 0x781f8585, 0x0, 0x0, 0x100000001, 0x6, 0x4, 0x2, 0x0, 0xfffffffffffffffa, 0x1000, 0x8000, 0x5, 0x5, 0xf72, 0xfff, 0x7, 0x80000000, 0x0, 0x81, 0x3, @perf_bp={0x0, 0xc}, 0x10001, 0x1d64, 0x0, 0x1, 0x1, 0x4, 0xffffffffffffb76f}, 0x0, 0xc, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) recvmsg(r2, &(0x7f0000004fc0)={0x0, 0x3d4, &(0x7f0000004ec0)=[{&(0x7f0000000380)=""/14, 0xffffffffffffff9c}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4, 0x0, 0xffffffffffffffdc}, 0x10040) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='cpu.stat\x00', 0x0, 0x0) 23:45:07 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x81) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000d40)={&(0x7f0000000d00)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000d80)=r5, 0x4) write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r6 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xe, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r7 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) gettid() setsockopt$sock_attach_bpf(r6, 0x1, 0x32, 0x0, 0x0) sendmsg$sock(r6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x60}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x0, 0xdc, 0x0}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r7, 0x0, 0x0) 23:45:07 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x81) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000d40)={&(0x7f0000000d00)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000d80)=r5, 0x4) write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r6 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xe, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r7 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) gettid() setsockopt$sock_attach_bpf(r6, 0x1, 0x32, 0x0, 0x0) sendmsg$sock(r6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x60}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x0, 0xdc, 0x0}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r7, 0x0, 0x0) 23:45:07 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x81) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000d40)={&(0x7f0000000d00)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000d80)=r5, 0x4) write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r6 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xe, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r7 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) gettid() setsockopt$sock_attach_bpf(r6, 0x1, 0x32, 0x0, 0x0) sendmsg$sock(r6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x60}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x0, 0xdc, 0x0}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r7, 0x0, 0x0) 23:45:07 executing program 2: socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x5, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) perf_event_open(&(0x7f0000000580)={0x7, 0x70, 0x1, 0x1b12, 0x0, 0x7, 0x0, 0x9, 0x402, 0x6, 0x80000000, 0x4, 0x791, 0x1, 0x3, 0x0, 0xfff, 0xfffffffffffff71e, 0x20, 0x0, 0x200, 0x781f8585, 0x0, 0x0, 0x100000001, 0x6, 0x4, 0x2, 0x0, 0xfffffffffffffffa, 0x1000, 0x8000, 0x5, 0x5, 0xf72, 0xfff, 0x7, 0x80000000, 0x0, 0x81, 0x3, @perf_bp={0x0, 0xc}, 0x10001, 0x1d64, 0x0, 0x1, 0x1, 0x4, 0xffffffffffffb76f}, 0x0, 0xc, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) recvmsg(r2, &(0x7f0000004fc0)={0x0, 0x3d4, &(0x7f0000004ec0)=[{&(0x7f0000000380)=""/14, 0xffffffffffffff9c}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4, 0x0, 0xffffffffffffffdc}, 0x10040) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='cpu.stat\x00', 0x0, 0x0) 23:45:07 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x81) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000d40)={&(0x7f0000000d00)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000d80)=r5, 0x4) write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r6 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xe, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r7 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) gettid() setsockopt$sock_attach_bpf(r6, 0x1, 0x32, 0x0, 0x0) sendmsg$sock(r6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x60}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x0, 0xdc, 0x0}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r7, 0x0, 0x0) 23:45:07 executing program 4: socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x5, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) perf_event_open(&(0x7f0000000580)={0x7, 0x70, 0x1, 0x1b12, 0x0, 0x7, 0x0, 0x9, 0x402, 0x6, 0x80000000, 0x4, 0x791, 0x1, 0x3, 0x0, 0xfff, 0xfffffffffffff71e, 0x20, 0x0, 0x200, 0x781f8585, 0x0, 0x0, 0x100000001, 0x6, 0x4, 0x2, 0x0, 0xfffffffffffffffa, 0x1000, 0x8000, 0x5, 0x5, 0xf72, 0xfff, 0x7, 0x80000000, 0x0, 0x81, 0x3, @perf_bp={0x0, 0xc}, 0x10001, 0x1d64, 0x0, 0x1, 0x1, 0x4, 0xffffffffffffb76f}, 0x0, 0xc, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) recvmsg(r2, &(0x7f0000004fc0)={0x0, 0x3d4, &(0x7f0000004ec0)=[{&(0x7f0000000380)=""/14, 0xffffffffffffff9c}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4, 0x0, 0xffffffffffffffdc}, 0x10040) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='cpu.stat\x00', 0x0, 0x0) 23:45:07 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x81) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000d40)={&(0x7f0000000d00)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000d80)=r5, 0x4) write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r6 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xe, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r7 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) gettid() setsockopt$sock_attach_bpf(r6, 0x1, 0x32, 0x0, 0x0) sendmsg$sock(r6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x60}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x0, 0xdc, 0x0}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r7, 0x0, 0x0) 23:45:07 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x81) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000d40)={&(0x7f0000000d00)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000d80)=r5, 0x4) write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r6 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xe, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r7 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) gettid() setsockopt$sock_attach_bpf(r6, 0x1, 0x32, 0x0, 0x0) sendmsg$sock(r6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x60}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x0, 0xdc, 0x0}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r7, 0x0, 0x0) 23:45:08 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x81) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000d40)={&(0x7f0000000d00)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000d80)=r5, 0x4) write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r6 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xe, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r7 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) gettid() setsockopt$sock_attach_bpf(r6, 0x1, 0x32, 0x0, 0x0) sendmsg$sock(r6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x60}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x0, 0xdc, 0x0}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r7, 0x0, 0x0) [ 256.147318][T15947] __nla_validate_parse: 11 callbacks suppressed [ 256.147330][T15947] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 256.319284][T15952] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 23:45:08 executing program 2: socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x5, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) perf_event_open(&(0x7f0000000580)={0x7, 0x70, 0x1, 0x1b12, 0x0, 0x7, 0x0, 0x9, 0x402, 0x6, 0x80000000, 0x4, 0x791, 0x1, 0x3, 0x0, 0xfff, 0xfffffffffffff71e, 0x20, 0x0, 0x200, 0x781f8585, 0x0, 0x0, 0x100000001, 0x6, 0x4, 0x2, 0x0, 0xfffffffffffffffa, 0x1000, 0x8000, 0x5, 0x5, 0xf72, 0xfff, 0x7, 0x80000000, 0x0, 0x81, 0x3, @perf_bp={0x0, 0xc}, 0x10001, 0x1d64, 0x0, 0x1, 0x1, 0x4, 0xffffffffffffb76f}, 0x0, 0xc, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) recvmsg(r2, &(0x7f0000004fc0)={0x0, 0x3d4, &(0x7f0000004ec0)=[{&(0x7f0000000380)=""/14, 0xffffffffffffff9c}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4, 0x0, 0xffffffffffffffdc}, 0x10040) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='cpu.stat\x00', 0x0, 0x0) 23:45:08 executing program 1: socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x5, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) perf_event_open(&(0x7f0000000580)={0x7, 0x70, 0x1, 0x1b12, 0x0, 0x7, 0x0, 0x9, 0x402, 0x6, 0x80000000, 0x4, 0x791, 0x1, 0x3, 0x0, 0xfff, 0xfffffffffffff71e, 0x20, 0x0, 0x200, 0x781f8585, 0x0, 0x0, 0x100000001, 0x6, 0x4, 0x2, 0x0, 0xfffffffffffffffa, 0x1000, 0x8000, 0x5, 0x5, 0xf72, 0xfff, 0x7, 0x80000000, 0x0, 0x81, 0x3, @perf_bp={0x0, 0xc}, 0x10001, 0x1d64, 0x0, 0x1, 0x1, 0x4, 0xffffffffffffb76f}, 0x0, 0xc, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) recvmsg(r2, &(0x7f0000004fc0)={0x0, 0x3d4, &(0x7f0000004ec0)=[{&(0x7f0000000380)=""/14, 0xffffffffffffff9c}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4, 0x0, 0xffffffffffffffdc}, 0x10040) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='cpu.stat\x00', 0x0, 0x0) 23:45:08 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x81) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000d40)={&(0x7f0000000d00)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000d80)=r5, 0x4) write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r6 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xe, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r7 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) gettid() setsockopt$sock_attach_bpf(r6, 0x1, 0x32, 0x0, 0x0) sendmsg$sock(r6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x60}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x0, 0xdc, 0x0}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r7, 0x0, 0x0) 23:45:08 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x81) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000d40)={&(0x7f0000000d00)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000d80)=r5, 0x4) write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r6 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xe, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r7 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) gettid() setsockopt$sock_attach_bpf(r6, 0x1, 0x32, 0x0, 0x0) sendmsg$sock(r6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x60}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x0, 0xdc, 0x0}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r7, 0x0, 0x0) 23:45:08 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000300)='.\x00'/12, 0xc}], 0x1}, 0x0) 23:45:08 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000300)='.\x00'/12, 0xc}], 0x1}, 0x0) [ 256.821157][T15965] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 23:45:08 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x81) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000d40)={&(0x7f0000000d00)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000d80)=r5, 0x4) write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r6 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xe, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r7 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) gettid() setsockopt$sock_attach_bpf(r6, 0x1, 0x32, 0x0, 0x0) sendmsg$sock(r6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x60}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x0, 0xdc, 0x0}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r7, 0x0, 0x0) 23:45:08 executing program 4: socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x5, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) perf_event_open(&(0x7f0000000580)={0x7, 0x70, 0x1, 0x1b12, 0x0, 0x7, 0x0, 0x9, 0x402, 0x6, 0x80000000, 0x4, 0x791, 0x1, 0x3, 0x0, 0xfff, 0xfffffffffffff71e, 0x20, 0x0, 0x200, 0x781f8585, 0x0, 0x0, 0x100000001, 0x6, 0x4, 0x2, 0x0, 0xfffffffffffffffa, 0x1000, 0x8000, 0x5, 0x5, 0xf72, 0xfff, 0x7, 0x80000000, 0x0, 0x81, 0x3, @perf_bp={0x0, 0xc}, 0x10001, 0x1d64, 0x0, 0x1, 0x1, 0x4, 0xffffffffffffb76f}, 0x0, 0xc, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) recvmsg(r2, &(0x7f0000004fc0)={0x0, 0x3d4, &(0x7f0000004ec0)=[{&(0x7f0000000380)=""/14, 0xffffffffffffff9c}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4, 0x0, 0xffffffffffffffdc}, 0x10040) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='cpu.stat\x00', 0x0, 0x0) 23:45:08 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r0, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14}}], 0x18}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x6, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) 23:45:08 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000300)='.\x00'/12, 0xc}], 0x1}, 0x0) [ 257.292815][T15980] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 23:45:09 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000300)='.\x00'/12, 0xc}], 0x1}, 0x0) 23:45:09 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2c}]}, 0x1e4) [ 257.444662][T15991] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 23:45:09 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e00f80ecdb4cb904014865161a000100050000000089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 23:45:09 executing program 1: socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x5, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000200)='./file0\x00', r0}, 0xd2fdbc6e31bce466) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) perf_event_open(&(0x7f0000000580)={0x7, 0x70, 0x1, 0x1b12, 0x0, 0x7, 0x0, 0x9, 0x402, 0x6, 0x80000000, 0x4, 0x791, 0x1, 0x3, 0x0, 0xfff, 0xfffffffffffff71e, 0x20, 0x0, 0x200, 0x781f8585, 0x0, 0x0, 0x100000001, 0x6, 0x4, 0x2, 0x0, 0xfffffffffffffffa, 0x1000, 0x8000, 0x5, 0x5, 0xf72, 0xfff, 0x7, 0x80000000, 0x0, 0x81, 0x3, @perf_bp={0x0, 0xc}, 0x10001, 0x1d64, 0x0, 0x1, 0x1, 0x4, 0xffffffffffffb76f}, 0x0, 0xc, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) recvmsg(r2, &(0x7f0000004fc0)={0x0, 0x3d4, &(0x7f0000004ec0)=[{&(0x7f0000000380)=""/14, 0xffffffffffffff9c}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4, 0x0, 0xffffffffffffffdc}, 0x10040) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='cpu.stat\x00', 0x0, 0x0) 23:45:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000002980)="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", 0xfb}], 0x1}, 0x0) [ 257.642852][T15996] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 23:45:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000100)={0x12, 0x4, 0x4, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x5f, 0xa]}, 0x2c) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 257.695477][T16009] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 257.779718][T15996] CPU: 0 PID: 15996 Comm: syz-executor.0 Not tainted 5.2.0-rc5+ #32 [ 257.787757][T15996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.797930][T15996] Call Trace: [ 257.801271][T15996] dump_stack+0x172/0x1f0 [ 257.805627][T15996] dump_header+0x10f/0xb6c [ 257.810057][T15996] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 257.815869][T15996] ? ___ratelimit+0x60/0x595 [ 257.820468][T15996] ? do_raw_spin_unlock+0x57/0x270 [ 257.825595][T15996] oom_kill_process.cold+0x10/0x15 [ 257.830722][T15996] out_of_memory+0x79a/0x1280 [ 257.835410][T15996] ? cgroup_file_notify+0x140/0x1b0 [ 257.840623][T15996] ? oom_killer_disable+0x280/0x280 [ 257.845827][T15996] ? cgroup_file_notify+0x140/0x1b0 [ 257.851039][T15996] mem_cgroup_out_of_memory+0x1ca/0x230 [ 257.856597][T15996] ? memcg_event_wake+0x230/0x230 [ 257.861650][T15996] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 257.867655][T15996] ? cgroup_file_notify+0x140/0x1b0 [ 257.872962][T15996] memory_max_write+0x22f/0x390 [ 257.877849][T15996] ? mem_cgroup_write+0x360/0x360 [ 257.882891][T15996] ? lock_acquire+0x16f/0x3f0 [ 257.887607][T15996] ? kernfs_fop_write+0x227/0x480 [ 257.893025][T15996] cgroup_file_write+0x241/0x790 [ 257.898955][T15996] ? mem_cgroup_write+0x360/0x360 [ 257.904005][T15996] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 257.909666][T15996] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 257.915364][T15996] kernfs_fop_write+0x2b8/0x480 [ 257.920320][T15996] __vfs_write+0x8a/0x110 [ 257.924679][T15996] ? kernfs_fop_open+0xd80/0xd80 [ 257.929621][T15996] vfs_write+0x20c/0x580 [ 257.933873][T15996] ksys_write+0x14f/0x290 [ 257.938213][T15996] ? __ia32_sys_read+0xb0/0xb0 [ 257.942985][T15996] ? do_syscall_64+0x26/0x680 [ 257.947662][T15996] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.953732][T15996] ? do_syscall_64+0x26/0x680 [ 257.958417][T15996] __x64_sys_write+0x73/0xb0 [ 257.963019][T15996] do_syscall_64+0xfd/0x680 [ 257.967537][T15996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.973436][T15996] RIP: 0033:0x4597c9 [ 257.977356][T15996] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 257.996977][T15996] RSP: 002b:00007f4b7c810c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 258.005420][T15996] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004597c9 [ 258.013402][T15996] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 258.021383][T15996] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 258.029371][T15996] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b7c8116d4 [ 258.037354][T15996] R13: 00000000004c96dc R14: 00000000004e0a60 R15: 00000000ffffffff [ 258.141221][T16018] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.5'. [ 258.162979][T15996] memory: usage 7360kB, limit 0kB, failcnt 9 [ 258.169273][T15996] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 258.178391][T16013] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 23:45:10 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe44) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000500)='memory.events\x00') r7 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r6, 0x1, r6, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r6, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000140)={r0, r3}) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x8953, &(0x7f0000000040)=0x2) [ 258.184078][T15996] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 258.198141][T15996] Memory cgroup stats for /syz0: cache:4KB rss:2208KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2208KB inactive_file:0KB active_file:4KB unevictable:0KB [ 258.231144][T16021] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.5'. 23:45:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000100)={0x12, 0x4, 0x4, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x5f, 0xa]}, 0x2c) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 258.299860][T15996] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=15988,uid=0 23:45:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000002980)="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", 0xfb}], 0x1}, 0x0) [ 258.449770][T15996] Memory cgroup out of memory: Killed process 15988 (syz-executor.0) total-vm:72840kB, anon-rss:2156kB, file-rss:34816kB, shmem-rss:0kB 23:45:10 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e00f80ecdb4cb904014865161a000100050000000089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 258.510149][T16032] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.5'. [ 258.573075][ T1045] oom_reaper: reaped process 15988 (syz-executor.0), now anon-rss:0kB, file-rss:34856kB, shmem-rss:0kB 23:45:10 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r0, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14}}], 0x18}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x6, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) 23:45:10 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 23:45:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000002980)="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", 0xfb}], 0x1}, 0x0) [ 258.698682][T16039] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 23:45:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000100)={0x12, 0x4, 0x4, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x5f, 0xa]}, 0x2c) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 258.755385][ T8839] syz-executor.0 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 258.809735][T16046] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.5'. [ 258.847701][ T8839] CPU: 1 PID: 8839 Comm: syz-executor.0 Not tainted 5.2.0-rc5+ #32 [ 258.855629][ T8839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.865692][ T8839] Call Trace: [ 258.869006][ T8839] dump_stack+0x172/0x1f0 [ 258.873362][ T8839] dump_header+0x10f/0xb6c [ 258.877884][ T8839] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 258.883697][ T8839] ? ___ratelimit+0x60/0x595 [ 258.888297][ T8839] ? do_raw_spin_unlock+0x57/0x270 [ 258.893430][ T8839] oom_kill_process.cold+0x10/0x15 [ 258.898666][ T8839] out_of_memory+0x79a/0x1280 [ 258.903876][ T8839] ? lock_downgrade+0x880/0x880 [ 258.908722][ T8839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.914983][ T8839] ? oom_killer_disable+0x280/0x280 [ 258.920184][ T8839] ? find_held_lock+0x35/0x130 [ 258.924967][ T8839] mem_cgroup_out_of_memory+0x1ca/0x230 [ 258.930525][ T8839] ? memcg_event_wake+0x230/0x230 [ 258.935580][ T8839] ? do_raw_spin_unlock+0x57/0x270 [ 258.940970][ T8839] ? _raw_spin_unlock+0x2d/0x50 [ 258.945842][ T8839] try_charge+0x1042/0x1410 [ 258.951786][ T8839] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 23:45:10 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e00f80ecdb4cb904014865161a000100050000000089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 258.957367][ T8839] ? rcu_read_lock_sched_held+0x110/0x130 [ 258.965728][ T8839] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 258.971574][ T8839] __memcg_kmem_charge_memcg+0x7c/0x130 [ 258.977148][ T8839] ? memcg_kmem_put_cache+0xb0/0xb0 [ 258.982407][ T8839] ? cache_grow_begin+0x3d6/0x650 [ 258.988160][ T8839] ? lockdep_hardirqs_on+0x418/0x5d0 [ 258.993480][ T8839] ? trace_hardirqs_on+0x67/0x220 [ 258.998525][ T8839] cache_grow_begin+0x402/0x650 [ 259.003401][ T8839] ? __cpuset_node_allowed+0x136/0x540 23:45:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000002980)="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", 0xfb}], 0x1}, 0x0) [ 259.008882][ T8839] fallback_alloc+0x1fd/0x2d0 [ 259.013760][ T8839] ____cache_alloc_node+0x1be/0x1e0 [ 259.018979][ T8839] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 259.025247][ T8839] kmem_cache_alloc+0x1e8/0x6f0 [ 259.030333][ T8839] ? inet_create+0x2f4/0xe00 [ 259.034938][ T8839] sk_prot_alloc+0x67/0x2e0 [ 259.039445][ T8839] ? lock_downgrade+0x880/0x880 [ 259.044310][ T8839] sk_alloc+0x39/0xf70 [ 259.048922][ T8839] inet_create+0x36a/0xe00 [ 259.053361][ T8839] __sock_create+0x3d8/0x730 [ 259.057963][ T8839] __sys_socket+0x103/0x220 [ 259.062492][ T8839] ? move_addr_to_kernel+0x80/0x80 [ 259.067629][ T8839] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 259.073106][ T8839] ? do_syscall_64+0x26/0x680 [ 259.073175][ T8839] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.073187][ T8839] ? do_syscall_64+0x26/0x680 [ 259.073206][ T8839] __x64_sys_socket+0x73/0xb0 [ 259.073223][ T8839] do_syscall_64+0xfd/0x680 [ 259.073244][ T8839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.103817][ T8839] RIP: 0033:0x45c317 [ 259.107803][ T8839] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 259.127411][ T8839] RSP: 002b:00007fff4e701808 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 259.135849][ T8839] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045c317 [ 259.143841][ T8839] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 259.151905][ T8839] RBP: 000000000000034c R08: 0000000000000000 R09: 000000000000000a 23:45:11 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) [ 259.159883][ T8839] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 259.167871][ T8839] R13: 00007fff4e701f20 R14: 000000000003ec51 R15: 00007fff4e701f30 [ 259.180674][ T8839] memory: usage 4880kB, limit 0kB, failcnt 24 23:45:11 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) [ 259.205397][ T8839] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 259.278300][ T8839] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 259.300520][ T8839] Memory cgroup stats for /syz0: cache:4KB rss:60KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:60KB inactive_file:0KB active_file:4KB unevictable:0KB [ 259.380519][ T8839] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8839,uid=0 23:45:11 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe44) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000500)='memory.events\x00') r7 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r6, 0x1, r6, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r6, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000140)={r0, r3}) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x8953, &(0x7f0000000040)=0x2) 23:45:11 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 23:45:11 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e00f80ecdb4cb904014865161a000100050000000089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 23:45:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000100)={0x12, 0x4, 0x4, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x5f, 0xa]}, 0x2c) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 259.442751][ T8839] Memory cgroup out of memory: Killed process 8839 (syz-executor.0) total-vm:72444kB, anon-rss:108kB, file-rss:35776kB, shmem-rss:0kB [ 259.494873][T16074] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 259.534436][ T1045] oom_reaper: reaped process 8839 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 23:45:11 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r0, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14}}], 0x18}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x6, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) 23:45:11 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 23:45:11 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe44) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000500)='memory.events\x00') r7 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r6, 0x1, r6, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r6, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000140)={r0, r3}) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x8953, &(0x7f0000000040)=0x2) 23:45:11 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 23:45:11 executing program 3: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe44) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000500)='memory.events\x00') r7 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r6, 0x1, r6, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r6, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000140)={r0, r3}) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x8953, &(0x7f0000000040)=0x2) 23:45:11 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r0, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14}}], 0x18}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x6, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) 23:45:12 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe44) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000500)='memory.events\x00') r7 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r6, 0x1, r6, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r6, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000140)={r0, r3}) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x8953, &(0x7f0000000040)=0x2) 23:45:12 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 23:45:12 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe44) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000500)='memory.events\x00') r7 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r6, 0x1, r6, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r6, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000140)={r0, r3}) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x8953, &(0x7f0000000040)=0x2) 23:45:12 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 23:45:12 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe44) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000500)='memory.events\x00') r7 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r6, 0x1, r6, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r6, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000140)={r0, r3}) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x8953, &(0x7f0000000040)=0x2) 23:45:12 executing program 3: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe44) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000500)='memory.events\x00') r7 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r6, 0x1, r6, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r6, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000140)={r0, r3}) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x8953, &(0x7f0000000040)=0x2) 23:45:12 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe44) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000500)='memory.events\x00') r7 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r6, 0x1, r6, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r6, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000140)={r0, r3}) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x8953, &(0x7f0000000040)=0x2) 23:45:12 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 23:45:13 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3f}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000004140)=""/4096, 0x1000}, {&(0x7f0000005140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/149, 0x95}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/92, 0x5c}], 0x8}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) [ 261.645601][T16148] IPVS: ftp: loaded support on port[0] = 21 23:45:13 executing program 3: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe44) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000500)='memory.events\x00') r7 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r6, 0x1, r6, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r6, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000140)={r0, r3}) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x8953, &(0x7f0000000040)=0x2) 23:45:13 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r0, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14}}], 0x18}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x6, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) [ 262.030093][T16158] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 262.069501][T16158] CPU: 0 PID: 16158 Comm: syz-executor.5 Not tainted 5.2.0-rc5+ #32 [ 262.077655][T16158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.087742][T16158] Call Trace: [ 262.091055][T16158] dump_stack+0x172/0x1f0 [ 262.095431][T16158] dump_header+0x10f/0xb6c [ 262.099855][T16158] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 262.105672][T16158] ? ___ratelimit+0x60/0x595 [ 262.110277][T16158] ? do_raw_spin_unlock+0x57/0x270 [ 262.115490][T16158] oom_kill_process.cold+0x10/0x15 [ 262.120614][T16158] out_of_memory+0x79a/0x1280 [ 262.125374][T16158] ? __sched_text_start+0x8/0x8 [ 262.130223][T16158] ? oom_killer_disable+0x280/0x280 [ 262.135452][T16158] ? cgroup_file_notify+0x140/0x1b0 [ 262.141385][T16158] mem_cgroup_out_of_memory+0x1ca/0x230 [ 262.146940][T16158] ? memcg_event_wake+0x230/0x230 [ 262.151989][T16158] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 262.157892][T16158] ? cgroup_file_notify+0x140/0x1b0 [ 262.163107][T16158] memory_max_write+0x22f/0x390 [ 262.167984][T16158] ? mem_cgroup_write+0x360/0x360 [ 262.173025][T16158] ? lock_acquire+0x16f/0x3f0 [ 262.177739][T16158] ? kernfs_fop_write+0x227/0x480 [ 262.182868][T16158] cgroup_file_write+0x241/0x790 [ 262.187833][T16158] ? mem_cgroup_write+0x360/0x360 [ 262.192876][T16158] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 262.198528][T16158] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 262.204259][T16158] kernfs_fop_write+0x2b8/0x480 [ 262.209148][T16158] __vfs_write+0x8a/0x110 [ 262.213482][T16158] ? kernfs_fop_open+0xd80/0xd80 [ 262.218429][T16158] vfs_write+0x20c/0x580 [ 262.222683][T16158] ksys_write+0x14f/0x290 [ 262.227021][T16158] ? __ia32_sys_read+0xb0/0xb0 [ 262.231795][T16158] ? do_syscall_64+0x26/0x680 [ 262.236475][T16158] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.242555][T16158] ? do_syscall_64+0x26/0x680 [ 262.247245][T16158] __x64_sys_write+0x73/0xb0 [ 262.251844][T16158] do_syscall_64+0xfd/0x680 [ 262.256362][T16158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.262267][T16158] RIP: 0033:0x4597c9 [ 262.266165][T16158] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.285789][T16158] RSP: 002b:00007fc7393c8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 262.294219][T16158] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004597c9 [ 262.302201][T16158] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 262.310205][T16158] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 262.318186][T16158] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc7393c96d4 [ 262.326258][T16158] R13: 00000000004c96dc R14: 00000000004e0a60 R15: 00000000ffffffff [ 262.337288][T16158] memory: usage 6336kB, limit 0kB, failcnt 0 [ 262.343441][T16158] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 262.343451][T16158] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 262.343458][T16158] Memory cgroup stats for /syz5: cache:4KB rss:2216KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2216KB inactive_file:4KB active_file:0KB unevictable:0KB [ 262.343542][T16158] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=16150,uid=0 [ 262.343646][T16158] Memory cgroup out of memory: Killed process 16150 (syz-executor.5) total-vm:72708kB, anon-rss:2212kB, file-rss:35832kB, shmem-rss:0kB [ 262.411338][ T1045] oom_reaper: reaped process 16150 (syz-executor.5), now anon-rss:0kB, file-rss:34876kB, shmem-rss:0kB [ 262.491834][ T8854] syz-executor.5 invoked oom-killer: gfp_mask=0x40cd0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 262.524401][ T8854] CPU: 1 PID: 8854 Comm: syz-executor.5 Not tainted 5.2.0-rc5+ #32 [ 262.532506][ T8854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.542565][ T8854] Call Trace: [ 262.545951][ T8854] dump_stack+0x172/0x1f0 [ 262.550293][ T8854] dump_header+0x10f/0xb6c [ 262.554726][ T8854] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 262.560547][ T8854] ? ___ratelimit+0x60/0x595 [ 262.565230][ T8854] ? do_raw_spin_unlock+0x57/0x270 [ 262.570353][ T8854] oom_kill_process.cold+0x10/0x15 [ 262.575481][ T8854] out_of_memory+0x79a/0x1280 [ 262.580166][ T8854] ? lock_downgrade+0x880/0x880 [ 262.585026][ T8854] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.591312][ T8854] ? oom_killer_disable+0x280/0x280 [ 262.596539][ T8854] ? find_held_lock+0x35/0x130 [ 262.601324][ T8854] mem_cgroup_out_of_memory+0x1ca/0x230 [ 262.606879][ T8854] ? memcg_event_wake+0x230/0x230 [ 262.612013][ T8854] ? do_raw_spin_unlock+0x57/0x270 [ 262.617157][ T8854] ? _raw_spin_unlock+0x2d/0x50 [ 262.622024][ T8854] try_charge+0x1042/0x1410 [ 262.626537][ T8854] ? should_fail+0x1de/0x852 [ 262.631140][ T8854] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 262.637161][ T8854] ? rcu_read_lock_sched_held+0x110/0x130 [ 262.642883][ T8854] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 262.648439][ T8854] __memcg_kmem_charge_memcg+0x7c/0x130 [ 262.653994][ T8854] ? memcg_kmem_put_cache+0xb0/0xb0 [ 262.659368][ T8854] ? cache_grow_begin+0x3d6/0x650 [ 262.664404][ T8854] ? lockdep_hardirqs_on+0x418/0x5d0 [ 262.669705][ T8854] ? trace_hardirqs_on+0x67/0x220 [ 262.674746][ T8854] cache_grow_begin+0x402/0x650 [ 262.679609][ T8854] ? __cpuset_node_allowed+0x136/0x540 [ 262.685083][ T8854] fallback_alloc+0x1fd/0x2d0 [ 262.689782][ T8854] ____cache_alloc_node+0x1be/0x1e0 [ 262.694995][ T8854] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 262.701274][ T8854] kmem_cache_alloc+0x1e8/0x6f0 [ 262.706129][ T8854] ? ___might_sleep+0x163/0x280 [ 262.711254][ T8854] ? sock_destroy_inode+0x60/0x60 [ 262.716436][ T8854] sock_alloc_inode+0x1d/0x260 [ 262.721311][ T8854] alloc_inode+0x68/0x1e0 [ 262.729714][ T8854] new_inode_pseudo+0x19/0xf0 [ 262.738058][ T8854] sock_alloc+0x41/0x270 [ 262.742481][ T8854] __sock_create+0xc2/0x730 [ 262.746992][ T8854] ? _raw_spin_unlock_irq+0x28/0x90 [ 262.752203][ T8854] __sys_socket+0x103/0x220 [ 262.756714][ T8854] ? move_addr_to_kernel+0x80/0x80 [ 262.761940][ T8854] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 262.767404][ T8854] ? do_syscall_64+0x26/0x680 [ 262.773165][ T8854] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.779245][ T8854] ? do_syscall_64+0x26/0x680 [ 262.783949][ T8854] __x64_sys_socket+0x73/0xb0 [ 262.788649][ T8854] do_syscall_64+0xfd/0x680 [ 262.793282][ T8854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.799274][ T8854] RIP: 0033:0x45c317 [ 262.803724][ T8854] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.823940][ T8854] RSP: 002b:00007fffa2130158 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 262.823955][ T8854] RAX: ffffffffffffffda RBX: 0000000000711cc0 RCX: 000000000045c317 [ 262.823962][ T8854] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 262.823970][ T8854] RBP: 000000000000036a R08: 0000000000006000 R09: 0000000000004000 [ 262.823977][ T8854] R10: 00007fffa21302a0 R11: 0000000000000246 R12: 0000000000000000 [ 262.823984][ T8854] R13: 00007fffa2130920 R14: 0000000000000000 R15: 00007fffa2130930 [ 262.827813][ T8854] memory: usage 3948kB, limit 0kB, failcnt 12 [ 262.850229][ T8854] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 262.874967][ T8854] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 262.874975][ T8854] Memory cgroup stats for /syz5: cache:4KB rss:64KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:64KB inactive_file:0KB active_file:4KB unevictable:0KB [ 262.875050][ T8854] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=8854,uid=0 [ 262.875141][ T8854] Memory cgroup out of memory: Killed process 8854 (syz-executor.5) total-vm:72444kB, anon-rss:112kB, file-rss:35776kB, shmem-rss:0kB [ 262.897375][ T1045] oom_reaper: reaped process 8854 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 263.241941][T16148] chnl_net:caif_netlink_parms(): no params data found [ 263.279088][T16148] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.286396][T16148] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.294524][T16148] device bridge_slave_0 entered promiscuous mode [ 263.306085][T16148] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.319698][T16148] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.334674][T16148] device bridge_slave_1 entered promiscuous mode [ 263.354559][T16148] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 263.365701][T16148] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 263.387321][T16148] team0: Port device team_slave_0 added [ 263.434844][T16148] team0: Port device team_slave_1 added [ 263.493685][T16148] device hsr_slave_0 entered promiscuous mode [ 263.530877][T16148] device hsr_slave_1 entered promiscuous mode [ 263.594825][T16148] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.602076][T16148] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.609404][T16148] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.616569][T16148] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.701170][T16148] 8021q: adding VLAN 0 to HW filter on device bond0 [ 263.730336][ T8849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.739155][ T8849] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.747272][ T8849] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.755798][ T8849] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 263.768393][T16148] 8021q: adding VLAN 0 to HW filter on device team0 [ 263.839067][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 263.848090][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.855814][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.945105][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 263.953756][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.961150][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.983525][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 263.993761][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 264.002458][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 264.017701][T16148] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 264.029043][T16148] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 264.038227][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 264.046220][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 264.127510][T16148] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 264.237993][T16172] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 264.354264][T16172] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 264.368887][T16172] CPU: 0 PID: 16172 Comm: syz-executor.0 Not tainted 5.2.0-rc5+ #32 [ 264.376990][T16172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.389207][T16172] Call Trace: [ 264.393029][T16172] dump_stack+0x172/0x1f0 [ 264.401282][T16172] dump_header+0x10f/0xb6c [ 264.406622][T16172] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 264.414119][T16172] ? ___ratelimit+0x60/0x595 [ 264.420081][T16172] ? do_raw_spin_unlock+0x57/0x270 [ 264.427957][T16172] oom_kill_process.cold+0x10/0x15 [ 264.437783][T16172] out_of_memory+0x79a/0x1280 [ 264.443542][T16172] ? oom_killer_disable+0x280/0x280 [ 264.449264][T16172] mem_cgroup_out_of_memory+0x1ca/0x230 [ 264.454799][T16172] ? memcg_event_wake+0x230/0x230 [ 264.459821][T16172] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 264.465622][T16172] ? cgroup_file_notify+0x140/0x1b0 [ 264.470844][T16172] memory_max_write+0x22f/0x390 [ 264.475799][T16172] ? mem_cgroup_write+0x360/0x360 [ 264.480847][T16172] ? memory_max_write+0x1f/0x390 [ 264.485795][T16172] cgroup_file_write+0x241/0x790 [ 264.491599][T16172] ? mem_cgroup_write+0x360/0x360 [ 264.496660][T16172] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 264.502288][T16172] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 264.507925][T16172] kernfs_fop_write+0x2b8/0x480 [ 264.512801][T16172] __vfs_write+0x8a/0x110 [ 264.517131][T16172] ? kernfs_fop_open+0xd80/0xd80 [ 264.522078][T16172] vfs_write+0x20c/0x580 [ 264.526315][T16172] ksys_write+0x14f/0x290 [ 264.530632][T16172] ? __ia32_sys_read+0xb0/0xb0 [ 264.535511][T16172] ? do_syscall_64+0x26/0x680 [ 264.540175][T16172] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.546244][T16172] ? do_syscall_64+0x26/0x680 [ 264.550917][T16172] __x64_sys_write+0x73/0xb0 [ 264.555499][T16172] do_syscall_64+0xfd/0x680 [ 264.561202][T16172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.567106][T16172] RIP: 0033:0x4597c9 [ 264.571006][T16172] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.590624][T16172] RSP: 002b:00007f6796157c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 264.599029][T16172] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004597c9 [ 264.606996][T16172] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 264.615153][T16172] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 264.623130][T16172] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f67961586d4 [ 264.631111][T16172] R13: 00000000004c96dc R14: 00000000004e0a60 R15: 00000000ffffffff [ 264.644043][T16172] memory: usage 7068kB, limit 0kB, failcnt 25 [ 264.650839][T16172] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 264.658399][T16172] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 264.665565][T16172] Memory cgroup stats for /syz0: cache:8KB rss:2164KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2164KB inactive_file:4KB active_file:4KB unevictable:0KB [ 264.690996][T16172] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=16170,uid=0 [ 264.707240][T16172] Memory cgroup out of memory: Killed process 16170 (syz-executor.0) total-vm:72580kB, anon-rss:2144kB, file-rss:34816kB, shmem-rss:0kB [ 264.723305][ T1045] oom_reaper: reaped process 16170 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 23:45:16 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r0, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14}}], 0x18}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x6, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) 23:45:16 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe44) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000500)='memory.events\x00') r7 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r6, 0x1, r6, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r6, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000140)={r0, r3}) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x8953, &(0x7f0000000040)=0x2) 23:45:16 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe44) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000500)='memory.events\x00') r7 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r6, 0x1, r6, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r6, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000140)={r0, r3}) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x8953, &(0x7f0000000040)=0x2) 23:45:16 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe44) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000500)='memory.events\x00') r7 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r6, 0x1, r6, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r6, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000080)='mime_type]\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000140)={r0, r3}) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x8953, &(0x7f0000000040)=0x2) 23:45:16 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r0, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14}}], 0x18}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x6, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) 23:45:16 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r0, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14}}], 0x18}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x6, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) [ 264.866140][T16148] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 264.911733][T16148] CPU: 0 PID: 16148 Comm: syz-executor.0 Not tainted 5.2.0-rc5+ #32 [ 264.920456][T16148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.930529][T16148] Call Trace: [ 264.933843][T16148] dump_stack+0x172/0x1f0 [ 264.938191][T16148] dump_header+0x10f/0xb6c [ 264.942627][T16148] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 264.948452][T16148] ? ___ratelimit+0x60/0x595 [ 264.953058][T16148] ? do_raw_spin_unlock+0x57/0x270 [ 264.958216][T16148] oom_kill_process.cold+0x10/0x15 [ 264.965526][T16148] out_of_memory+0x79a/0x1280 [ 264.970232][T16148] ? lock_downgrade+0x880/0x880 [ 264.975137][T16148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.982042][T16148] ? oom_killer_disable+0x280/0x280 [ 264.987292][T16148] ? find_held_lock+0x35/0x130 [ 264.992090][T16148] mem_cgroup_out_of_memory+0x1ca/0x230 [ 264.997655][T16148] ? memcg_event_wake+0x230/0x230 [ 265.002712][T16148] ? do_raw_spin_unlock+0x57/0x270 [ 265.008187][T16148] ? _raw_spin_unlock+0x2d/0x50 [ 265.013403][T16148] try_charge+0x1042/0x1410 [ 265.017933][T16148] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 265.023491][T16148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.029758][T16148] ? kasan_check_read+0x11/0x20 [ 265.034636][T16148] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 265.040202][T16148] mem_cgroup_try_charge+0x24d/0x5e0 [ 265.045516][T16148] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 265.051531][T16148] wp_page_copy+0x416/0x1770 [ 265.056154][T16148] ? do_wp_page+0x486/0x1500 [ 265.060780][T16148] ? pmd_pfn+0x1d0/0x1d0 [ 265.065058][T16148] ? lock_downgrade+0x880/0x880 [ 265.070313][T16148] ? swp_swapcount+0x540/0x540 [ 265.076858][T16148] ? kasan_check_read+0x11/0x20 [ 265.081929][T16148] ? do_raw_spin_unlock+0x57/0x270 [ 265.087176][T16148] do_wp_page+0x48e/0x1500 [ 265.091642][T16148] ? finish_mkwrite_fault+0x540/0x540 [ 265.097047][T16148] __handle_mm_fault+0x22e3/0x3eb0 [ 265.102205][T16148] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 265.107832][T16148] ? find_held_lock+0x35/0x130 [ 265.112868][T16148] ? handle_mm_fault+0x292/0xa90 [ 265.117825][T16148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.124170][T16148] ? kasan_check_read+0x11/0x20 [ 265.129333][T16148] handle_mm_fault+0x3b7/0xa90 [ 265.134209][T16148] __do_page_fault+0x5ef/0xda0 [ 265.138991][T16148] do_page_fault+0x71/0x57d [ 265.143507][T16148] ? page_fault+0x8/0x30 [ 265.147841][T16148] page_fault+0x1e/0x30 [ 265.152009][T16148] RIP: 0033:0x403442 [ 265.155917][T16148] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 a9 8d 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 c9 42 05 00 48 [ 265.175810][T16148] RSP: 002b:00007ffff4c01d40 EFLAGS: 00010246 [ 265.181884][T16148] RAX: 0000000000000000 RBX: 0000000000040850 RCX: 00000000004133d0 [ 265.189860][T16148] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffff4c02e70 [ 265.197840][T16148] RBP: 0000000000000002 R08: 0000000000000001 R09: 00005555567e0940 [ 265.206006][T16148] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffff4c02e70 [ 265.213985][T16148] R13: 00007ffff4c02e60 R14: 0000000000000000 R15: 00007ffff4c02e70 [ 265.330608][T16148] memory: usage 4736kB, limit 0kB, failcnt 33 [ 265.339705][T16148] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 265.355264][T16148] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 265.364338][T16148] Memory cgroup stats for /syz0: cache:8KB rss:40KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:4KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:4KB active_file:4KB unevictable:0KB 23:45:17 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x0, 0x4}, 0x2c) socket$kcm(0xa, 0x2, 0x73) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) socketpair(0x10, 0x0, 0x3, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETFEATURES(r2, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000200)='syzkaller0\x00') bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_subtree(r2, 0x0, 0x2, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f00000003c0)) r4 = socket$kcm(0x11, 0x3, 0x300) close(r4) socket$kcm(0xa, 0x40122000000003, 0x11) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x5411, 0x70d000) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r3}) 23:45:17 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002940)={0x1000000000000012, 0xa5, 0x40000000000004, 0x100000002, 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000080), 0x0}, 0x18) [ 265.434996][T16148] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=16148,uid=0 [ 265.469227][T16148] Memory cgroup out of memory: Killed process 16148 (syz-executor.0) total-vm:72448kB, anon-rss:76kB, file-rss:34828kB, shmem-rss:0kB 23:45:17 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000002c0)}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000440), 0x12) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000040)={r0, r1}) recvmsg(r0, 0x0, 0x40) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000010940)) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8903, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r1) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r7, 0x800454cf, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f00000015c0)="a2e7f82dedbd0f8160e5822d28d6662793447df4ee30d9bb2d2876684f86f1658bb14743c10039683b3abe66bea9c1306b65c01691b4a99aa3ab8224f7ab1ca4eb41079ff29f9e91825f3df78804f46943f827", 0x53}, {0x0}], 0x2}, 0x20000000) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 265.559376][ T1045] oom_reaper: reaped process 16148 (syz-executor.0), now anon-rss:0kB, file-rss:33932kB, shmem-rss:0kB 23:45:17 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002940)={0x1000000000000012, 0xa5, 0x40000000000004, 0x100000002, 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000080), 0x0}, 0x18) [ 265.677050][T16185] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 265.720607][T16185] CPU: 0 PID: 16185 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #32 [ 265.728640][T16185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.739502][T16185] Call Trace: [ 265.746389][T16185] dump_stack+0x172/0x1f0 [ 265.752247][T16185] dump_header+0x10f/0xb6c [ 265.757412][T16185] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 265.764733][T16185] ? ___ratelimit+0x60/0x595 [ 265.764750][T16185] ? do_raw_spin_unlock+0x57/0x270 [ 265.764770][T16185] oom_kill_process.cold+0x10/0x15 [ 265.764790][T16185] out_of_memory+0x79a/0x1280 [ 265.764813][T16185] ? oom_killer_disable+0x280/0x280 [ 265.764837][T16185] ? cgroup_file_notify+0x140/0x1b0 [ 265.801193][T16185] mem_cgroup_out_of_memory+0x1ca/0x230 [ 265.807300][T16185] ? memcg_event_wake+0x230/0x230 [ 265.812373][T16185] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 265.818390][T16185] ? cgroup_file_notify+0x140/0x1b0 [ 265.823618][T16185] memory_max_write+0x22f/0x390 [ 265.828506][T16185] ? mem_cgroup_write+0x360/0x360 [ 265.833567][T16185] ? lock_acquire+0x16f/0x3f0 [ 265.838320][T16185] ? kernfs_fop_write+0x227/0x480 [ 265.843383][T16185] cgroup_file_write+0x241/0x790 [ 265.848381][T16185] ? mem_cgroup_write+0x360/0x360 [ 265.853434][T16185] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 265.859136][T16185] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 265.865414][T16185] kernfs_fop_write+0x2b8/0x480 [ 265.870409][T16185] __vfs_write+0x8a/0x110 [ 265.875911][T16185] ? kernfs_fop_open+0xd80/0xd80 [ 265.880890][T16185] vfs_write+0x20c/0x580 [ 265.886220][T16185] ksys_write+0x14f/0x290 [ 265.890577][T16185] ? __ia32_sys_read+0xb0/0xb0 [ 265.895364][T16185] ? do_syscall_64+0x26/0x680 [ 265.900075][T16185] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.906162][T16185] ? do_syscall_64+0x26/0x680 [ 265.910881][T16185] __x64_sys_write+0x73/0xb0 [ 265.915761][T16185] do_syscall_64+0xfd/0x680 [ 265.920296][T16185] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.926214][T16185] RIP: 0033:0x4597c9 [ 265.930140][T16185] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.949765][T16185] RSP: 002b:00007fceb94e7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 265.958204][T16185] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004597c9 [ 265.967337][T16185] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 265.975326][T16185] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 265.983331][T16185] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fceb94e86d4 [ 265.991416][T16185] R13: 00000000004c96dc R14: 00000000004e0a60 R15: 00000000ffffffff 23:45:17 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x0, 0x4}, 0x2c) socket$kcm(0xa, 0x2, 0x73) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) socketpair(0x10, 0x0, 0x3, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETFEATURES(r2, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000200)='syzkaller0\x00') bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_subtree(r2, 0x0, 0x2, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f00000003c0)) r4 = socket$kcm(0x11, 0x3, 0x300) close(r4) socket$kcm(0xa, 0x40122000000003, 0x11) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x5411, 0x70d000) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r3}) [ 266.021142][ T2554] device bridge_slave_1 left promiscuous mode [ 266.029611][ T2554] bridge0: port 2(bridge_slave_1) entered disabled state 23:45:17 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002940)={0x1000000000000012, 0xa5, 0x40000000000004, 0x100000002, 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000080), 0x0}, 0x18) [ 266.097066][ T2554] device bridge_slave_0 left promiscuous mode [ 266.105519][ T2554] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.344150][T16185] memory: usage 7860kB, limit 0kB, failcnt 0 [ 266.357168][T16185] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 266.380217][T16185] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 266.398960][T16185] Memory cgroup stats for /syz3: cache:12KB rss:2208KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:12KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2208KB inactive_file:0KB active_file:12KB unevictable:0KB [ 266.451151][T16185] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=16179,uid=0 [ 266.484634][T16185] Memory cgroup out of memory: Killed process 16185 (syz-executor.3) total-vm:72708kB, anon-rss:2204kB, file-rss:35836kB, shmem-rss:0kB [ 266.501610][ T1045] oom_reaper: reaped process 16185 (syz-executor.3), now anon-rss:0kB, file-rss:34876kB, shmem-rss:0kB [ 268.153094][ T2554] device hsr_slave_1 left promiscuous mode [ 268.206788][ T2554] device hsr_slave_0 left promiscuous mode [ 268.267961][ T2554] team0 (unregistering): Port device team_slave_1 removed [ 268.282241][ T2554] team0 (unregistering): Port device team_slave_0 removed [ 268.296922][ T2554] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 268.335467][ T2554] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 268.417350][ T2554] bond0 (unregistering): Released all slaves 23:45:20 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r0, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14}}], 0x18}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x6, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) 23:45:20 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002940)={0x1000000000000012, 0xa5, 0x40000000000004, 0x100000002, 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000080), 0x0}, 0x18) 23:45:20 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x0, 0x4}, 0x2c) socket$kcm(0xa, 0x2, 0x73) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) socketpair(0x10, 0x0, 0x3, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETFEATURES(r2, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000200)='syzkaller0\x00') bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_subtree(r2, 0x0, 0x2, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f00000003c0)) r4 = socket$kcm(0x11, 0x3, 0x300) close(r4) socket$kcm(0xa, 0x40122000000003, 0x11) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x5411, 0x70d000) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r3}) 23:45:20 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r0, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14}}], 0x18}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x6, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) [ 268.687407][T16224] IPVS: ftp: loaded support on port[0] = 21 [ 268.733352][ T8847] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 268.830564][ T8847] CPU: 1 PID: 8847 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #32 [ 268.838903][ T8847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.849213][ T8847] Call Trace: [ 268.852527][ T8847] dump_stack+0x172/0x1f0 [ 268.852548][ T8847] dump_header+0x10f/0xb6c [ 268.852561][ T8847] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 268.852573][ T8847] ? ___ratelimit+0x60/0x595 [ 268.852587][ T8847] ? do_raw_spin_unlock+0x57/0x270 [ 268.852603][ T8847] oom_kill_process.cold+0x10/0x15 [ 268.852623][ T8847] out_of_memory+0x79a/0x1280 [ 268.887522][ T8847] ? lock_downgrade+0x880/0x880 [ 268.887544][ T8847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.887559][ T8847] ? oom_killer_disable+0x280/0x280 [ 268.887568][ T8847] ? find_held_lock+0x35/0x130 [ 268.887589][ T8847] mem_cgroup_out_of_memory+0x1ca/0x230 [ 268.887601][ T8847] ? memcg_event_wake+0x230/0x230 [ 268.887617][ T8847] ? do_raw_spin_unlock+0x57/0x270 [ 268.887634][ T8847] ? _raw_spin_unlock+0x2d/0x50 [ 268.931850][ T8847] try_charge+0x1042/0x1410 [ 268.931871][ T8847] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 268.931886][ T8847] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 268.931906][ T8847] ? find_held_lock+0x35/0x130 [ 268.931922][ T8847] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 268.931945][ T8847] __memcg_kmem_charge_memcg+0x7c/0x130 [ 268.952495][ T8847] ? memcg_kmem_put_cache+0xb0/0xb0 [ 268.963634][ T8847] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 268.963651][ T8847] __memcg_kmem_charge+0x136/0x300 [ 268.963669][ T8847] __alloc_pages_nodemask+0x4bd/0x8d0 [ 268.963682][ T8847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.963698][ T8847] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 268.963714][ T8847] ? copy_process.part.0+0x43f7/0x6790 [ 268.963735][ T8847] ? lockdep_hardirqs_on+0x418/0x5d0 [ 269.022447][ T8847] ? trace_hardirqs_on+0x67/0x220 [ 269.027509][ T8847] ? kasan_check_read+0x11/0x20 [ 269.032408][ T8847] copy_process.part.0+0x4a0/0x6790 [ 269.032434][ T8847] ? __might_fault+0x12b/0x1e0 [ 269.032468][ T8847] ? __cleanup_sighand+0x60/0x60 [ 269.047584][ T8847] ? lock_downgrade+0x880/0x880 [ 269.052458][ T8847] _do_fork+0x25d/0xfe0 [ 269.052486][ T8847] ? copy_init_mm+0x20/0x20 [ 269.052510][ T8847] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 269.052531][ T8847] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 269.066674][ T8847] ? do_syscall_64+0x26/0x680 [ 269.066696][ T8847] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.066709][ T8847] ? do_syscall_64+0x26/0x680 [ 269.066738][ T8847] __x64_sys_clone+0xbf/0x150 [ 269.077142][ T8847] do_syscall_64+0xfd/0x680 [ 269.077161][ T8847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.077173][ T8847] RIP: 0033:0x457d9a [ 269.077188][ T8847] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 269.077204][ T8847] RSP: 002b:00007fff5d423580 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 269.088391][ T8847] RAX: ffffffffffffffda RBX: 00007fff5d423580 RCX: 0000000000457d9a [ 269.088399][ T8847] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 269.088406][ T8847] RBP: 00007fff5d4235c0 R08: 0000000000000001 R09: 0000555556d4e940 [ 269.088412][ T8847] R10: 0000555556d4ec10 R11: 0000000000000246 R12: 0000000000000001 [ 269.088423][ T8847] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff5d423610 [ 269.231993][ T8847] memory: usage 5504kB, limit 0kB, failcnt 8 [ 269.239957][ T8847] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 269.249003][ T8847] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 269.260166][ T8847] Memory cgroup stats for /syz3: cache:12KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:4KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:56KB inactive_file:8KB active_file:4KB unevictable:0KB [ 269.282929][ T8847] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8847,uid=0 [ 269.298834][ T8847] Memory cgroup out of memory: Killed process 8847 (syz-executor.3) total-vm:72444kB, anon-rss:104kB, file-rss:35776kB, shmem-rss:0kB [ 269.299574][ T1045] oom_reaper: reaped process 8847 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 269.366229][T16224] chnl_net:caif_netlink_parms(): no params data found [ 269.597798][T16224] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.605919][T16224] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.615172][T16224] device bridge_slave_0 entered promiscuous mode [ 269.623843][T16224] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.631925][T16224] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.640689][T16224] device bridge_slave_1 entered promiscuous mode [ 269.664796][T16224] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 269.680309][T16224] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 269.719389][T16224] team0: Port device team_slave_0 added [ 269.734913][T16224] team0: Port device team_slave_1 added [ 269.810316][T16224] device hsr_slave_0 entered promiscuous mode [ 269.860987][T16224] device hsr_slave_1 entered promiscuous mode [ 270.004988][T16224] 8021q: adding VLAN 0 to HW filter on device bond0 [ 270.038935][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 270.048103][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 270.066811][T16224] 8021q: adding VLAN 0 to HW filter on device team0 [ 270.086627][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 270.100321][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 270.113304][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.120545][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.153629][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.166680][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 270.179182][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.195933][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.203216][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.220989][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 270.252711][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 270.269401][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 270.278950][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 270.304230][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 270.319614][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 270.334592][T16224] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 270.353582][T16224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 270.369140][ T8849] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 270.381968][ T8849] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 270.422359][T16224] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 270.564493][T16241] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 270.690738][T16241] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 270.708614][T16241] CPU: 1 PID: 16241 Comm: syz-executor.5 Not tainted 5.2.0-rc5+ #32 [ 270.716961][T16241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.730410][T16241] Call Trace: [ 270.733717][T16241] dump_stack+0x172/0x1f0 [ 270.738059][T16241] dump_header+0x10f/0xb6c [ 270.742501][T16241] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 270.748312][T16241] ? ___ratelimit+0x60/0x595 [ 270.752934][T16241] oom_kill_process.cold+0x10/0x15 [ 270.758042][T16241] out_of_memory+0x79a/0x1280 [ 270.762737][T16241] ? __sched_text_start+0x8/0x8 [ 270.767593][T16241] ? oom_killer_disable+0x280/0x280 [ 270.773236][T16241] mem_cgroup_out_of_memory+0x1ca/0x230 [ 270.778789][T16241] ? memcg_event_wake+0x230/0x230 [ 270.783844][T16241] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 270.789652][T16241] ? cgroup_file_notify+0x140/0x1b0 [ 270.794879][T16241] memory_max_write+0x22f/0x390 [ 270.799781][T16241] ? mem_cgroup_write+0x360/0x360 [ 270.805276][T16241] ? cgroup_file_write+0x188/0x790 [ 270.810635][T16241] cgroup_file_write+0x241/0x790 [ 270.815571][T16241] ? mem_cgroup_write+0x360/0x360 [ 270.820589][T16241] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 270.826221][T16241] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 270.831894][T16241] kernfs_fop_write+0x2b8/0x480 [ 270.836748][T16241] __vfs_write+0x8a/0x110 [ 270.841067][T16241] ? kernfs_fop_open+0xd80/0xd80 [ 270.846012][T16241] vfs_write+0x20c/0x580 [ 270.852159][T16241] ksys_write+0x14f/0x290 [ 270.856523][T16241] ? __ia32_sys_read+0xb0/0xb0 [ 270.861509][T16241] ? do_syscall_64+0x26/0x680 [ 270.866195][T16241] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.872457][T16241] ? do_syscall_64+0x26/0x680 [ 270.877163][T16241] __x64_sys_write+0x73/0xb0 [ 270.881847][T16241] do_syscall_64+0xfd/0x680 [ 270.886381][T16241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.892577][T16241] RIP: 0033:0x4597c9 [ 270.896473][T16241] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.916102][T16241] RSP: 002b:00007f11382e2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 270.925104][T16241] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004597c9 [ 270.933711][T16241] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 270.941698][T16241] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 270.949767][T16241] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f11382e36d4 [ 270.958110][T16241] R13: 00000000004c96dc R14: 00000000004e0a60 R15: 00000000ffffffff [ 270.970918][T16241] memory: usage 6132kB, limit 0kB, failcnt 13 [ 270.977189][T16241] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 270.985248][T16241] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 270.992441][T16241] Memory cgroup stats for /syz5: cache:0KB rss:2164KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2164KB inactive_file:0KB active_file:0KB unevictable:0KB [ 271.014719][T16241] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=16240,uid=0 [ 271.031054][T16241] Memory cgroup out of memory: Killed process 16240 (syz-executor.5) total-vm:72580kB, anon-rss:2136kB, file-rss:34816kB, shmem-rss:0kB [ 271.047104][ T1045] oom_reaper: reaped process 16240 (syz-executor.5), now anon-rss:0kB, file-rss:34876kB, shmem-rss:0kB 23:45:22 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r0, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14}}], 0x18}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x6, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) 23:45:22 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000002c0)}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000440), 0x12) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000040)={r0, r1}) recvmsg(r0, 0x0, 0x40) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000010940)) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8903, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r1) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r7, 0x800454cf, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f00000015c0)="a2e7f82dedbd0f8160e5822d28d6662793447df4ee30d9bb2d2876684f86f1658bb14743c10039683b3abe66bea9c1306b65c01691b4a99aa3ab8224f7ab1ca4eb41079ff29f9e91825f3df78804f46943f827", 0x53}, {0x0}], 0x2}, 0x20000000) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:45:22 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000002c0)}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000440), 0x12) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000040)={r0, r1}) recvmsg(r0, 0x0, 0x40) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000010940)) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8903, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r1) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r7, 0x800454cf, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f00000015c0)="a2e7f82dedbd0f8160e5822d28d6662793447df4ee30d9bb2d2876684f86f1658bb14743c10039683b3abe66bea9c1306b65c01691b4a99aa3ab8224f7ab1ca4eb41079ff29f9e91825f3df78804f46943f827", 0x53}, {0x0}], 0x2}, 0x20000000) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:45:22 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r0, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14}}], 0x18}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x6, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) 23:45:22 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r0, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14}}], 0x18}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x6, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = socket$kcm(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) 23:45:22 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x0, 0x4}, 0x2c) socket$kcm(0xa, 0x2, 0x73) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) socketpair(0x10, 0x0, 0x3, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETFEATURES(r2, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000200)='syzkaller0\x00') bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_subtree(r2, 0x0, 0x2, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f00000003c0)) r4 = socket$kcm(0x11, 0x3, 0x300) close(r4) socket$kcm(0xa, 0x40122000000003, 0x11) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x5411, 0x70d000) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r3}) [ 271.096568][T16224] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 271.131207][T16224] CPU: 0 PID: 16224 Comm: syz-executor.5 Not tainted 5.2.0-rc5+ #32 [ 271.139234][T16224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.149304][T16224] Call Trace: [ 271.152642][T16224] dump_stack+0x172/0x1f0 [ 271.156996][T16224] dump_header+0x10f/0xb6c [ 271.161547][T16224] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 271.167458][T16224] ? ___ratelimit+0x60/0x595 [ 271.172147][T16224] ? do_raw_spin_unlock+0x57/0x270 [ 271.177275][T16224] oom_kill_process.cold+0x10/0x15 [ 271.182397][T16224] out_of_memory+0x79a/0x1280 [ 271.187084][T16224] ? lock_downgrade+0x880/0x880 [ 271.191950][T16224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.198239][T16224] ? oom_killer_disable+0x280/0x280 [ 271.203755][T16224] ? find_held_lock+0x35/0x130 [ 271.209312][T16224] mem_cgroup_out_of_memory+0x1ca/0x230 [ 271.215287][T16224] ? memcg_event_wake+0x230/0x230 [ 271.220353][T16224] ? do_raw_spin_unlock+0x57/0x270 [ 271.225519][T16224] ? _raw_spin_unlock+0x2d/0x50 [ 271.230406][T16224] try_charge+0x1042/0x1410 [ 271.234932][T16224] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 271.240608][T16224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.246866][T16224] ? kasan_check_read+0x11/0x20 [ 271.251746][T16224] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 271.257399][T16224] mem_cgroup_try_charge+0x24d/0x5e0 [ 271.263323][T16224] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 271.269061][T16224] __handle_mm_fault+0x1e1a/0x3eb0 [ 271.274205][T16224] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 271.279934][T16224] ? find_held_lock+0x35/0x130 [ 271.284721][T16224] ? handle_mm_fault+0x292/0xa90 [ 271.289685][T16224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.295949][T16224] ? kasan_check_read+0x11/0x20 [ 271.301263][T16224] handle_mm_fault+0x3b7/0xa90 [ 271.306076][T16224] __do_page_fault+0x5ef/0xda0 [ 271.310878][T16224] do_page_fault+0x71/0x57d [ 271.315405][T16224] ? page_fault+0x8/0x30 [ 271.319679][T16224] page_fault+0x1e/0x30 [ 271.323861][T16224] RIP: 0033:0x403442 [ 271.328548][T16224] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 a9 8d 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 c9 42 05 00 48 [ 271.348165][T16224] RSP: 002b:00007ffdaad7ee20 EFLAGS: 00010246 [ 271.354246][T16224] RAX: 0000000000000000 RBX: 000000000004211e RCX: 00000000004133d0 [ 271.362405][T16224] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffdaad7ff50 [ 271.370388][T16224] RBP: 0000000000000002 R08: 0000000000000001 R09: 000055555644b940 [ 271.378395][T16224] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdaad7ff50 [ 271.386645][T16224] R13: 00007ffdaad7ff40 R14: 0000000000000000 R15: 00007ffdaad7ff50 [ 271.450577][T16224] memory: usage 3800kB, limit 0kB, failcnt 21 [ 271.471032][T16224] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 271.487342][T16224] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 23:45:23 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000002c0)}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000440), 0x12) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000040)={r0, r1}) recvmsg(r0, 0x0, 0x40) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000010940)) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8903, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r1) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r7, 0x800454cf, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f00000015c0)="a2e7f82dedbd0f8160e5822d28d6662793447df4ee30d9bb2d2876684f86f1658bb14743c10039683b3abe66bea9c1306b65c01691b4a99aa3ab8224f7ab1ca4eb41079ff29f9e91825f3df78804f46943f827", 0x53}, {0x0}], 0x2}, 0x20000000) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 271.508949][T16224] Memory cgroup stats for /syz5: cache:0KB rss:40KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB 23:45:23 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x0, 0x4}, 0x2c) socket$kcm(0xa, 0x2, 0x73) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) socketpair(0x10, 0x0, 0x3, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETFEATURES(r2, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000200)='syzkaller0\x00') bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_subtree(r2, 0x0, 0x2, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f00000003c0)) r4 = socket$kcm(0x11, 0x3, 0x300) close(r4) socket$kcm(0xa, 0x40122000000003, 0x11) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x5411, 0x70d000) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r3}) [ 271.607732][T16224] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=16224,uid=0 23:45:23 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000002c0)}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000440), 0x12) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000040)={r0, r1}) recvmsg(r0, 0x0, 0x40) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000010940)) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8903, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r1) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r7, 0x800454cf, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f00000015c0)="a2e7f82dedbd0f8160e5822d28d6662793447df4ee30d9bb2d2876684f86f1658bb14743c10039683b3abe66bea9c1306b65c01691b4a99aa3ab8224f7ab1ca4eb41079ff29f9e91825f3df78804f46943f827", 0x53}, {0x0}], 0x2}, 0x20000000) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 271.720912][T16224] Memory cgroup out of memory: Killed process 16224 (syz-executor.5) total-vm:72448kB, anon-rss:68kB, file-rss:34828kB, shmem-rss:0kB [ 271.867425][ T1045] oom_reaper: reaped process 16224 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 23:45:23 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000002c0)}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000440), 0x12) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000040)={r0, r1}) recvmsg(r0, 0x0, 0x40) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000010940)) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8903, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r1) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r7, 0x800454cf, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f00000015c0)="a2e7f82dedbd0f8160e5822d28d6662793447df4ee30d9bb2d2876684f86f1658bb14743c10039683b3abe66bea9c1306b65c01691b4a99aa3ab8224f7ab1ca4eb41079ff29f9e91825f3df78804f46943f827", 0x53}, {0x0}], 0x2}, 0x20000000) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:45:23 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x0, 0x4}, 0x2c) socket$kcm(0xa, 0x2, 0x73) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) socketpair(0x10, 0x0, 0x3, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETFEATURES(r2, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000200)='syzkaller0\x00') bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_subtree(r2, 0x0, 0x2, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f00000003c0)) r4 = socket$kcm(0x11, 0x3, 0x300) close(r4) socket$kcm(0xa, 0x40122000000003, 0x11) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x5411, 0x70d000) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r3}) 23:45:23 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) sendmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000002c0)}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000440), 0x12) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000040)={r0, r1}) recvmsg(r0, 0x0, 0x40) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000010940)) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8903, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r1) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r7, 0x800454cf, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f00000015c0)="a2e7f82dedbd0f8160e5822d28d6662793447df4ee30d9bb2d2876684f86f1658bb14743c10039683b3abe66bea9c1306b65c01691b4a99aa3ab8224f7ab1ca4eb41079ff29f9e91825f3df78804f46943f827", 0x53}, {0x0}], 0x2}, 0x20000000) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:45:24 executing program 2: r0 = perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xb704, 0x0) 23:45:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000440), 0x12) 23:45:24 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x894a, &(0x7f0000000080)='ip6tnl0\x00') [ 272.934069][T16278] IPVS: ftp: loaded support on port[0] = 21 [ 273.255219][T16285] IPVS: ftp: loaded support on port[0] = 21 [ 273.746936][T16278] chnl_net:caif_netlink_parms(): no params data found [ 273.970348][T16278] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.978917][T16278] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.986797][T16278] device bridge_slave_0 entered promiscuous mode [ 273.994506][T16285] chnl_net:caif_netlink_parms(): no params data found [ 274.180480][T16278] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.187548][T16278] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.206827][T16278] device bridge_slave_1 entered promiscuous mode [ 274.417018][T16278] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 274.444375][T16278] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 274.647820][T16285] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.655058][T16285] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.663250][T16285] device bridge_slave_0 entered promiscuous mode [ 274.677453][T16285] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.685247][T16285] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.694696][T16285] device bridge_slave_1 entered promiscuous mode [ 274.703529][T16278] team0: Port device team_slave_0 added [ 274.724152][T16285] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 274.913116][T16278] team0: Port device team_slave_1 added [ 274.920757][T16285] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 274.946419][T16285] team0: Port device team_slave_0 added [ 274.954495][T16285] team0: Port device team_slave_1 added [ 274.992705][T16278] device hsr_slave_0 entered promiscuous mode [ 275.061012][T16278] device hsr_slave_1 entered promiscuous mode [ 275.254935][T16285] device hsr_slave_0 entered promiscuous mode [ 275.311883][T16285] device hsr_slave_1 entered promiscuous mode [ 275.543371][T16278] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.568562][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 275.577611][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.590096][T16285] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.604176][T16278] 8021q: adding VLAN 0 to HW filter on device team0 [ 275.616915][T16285] 8021q: adding VLAN 0 to HW filter on device team0 [ 275.661974][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 275.669955][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.678000][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 275.687041][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 275.695839][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.702969][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.711018][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 275.719549][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 275.728182][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.735291][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.743864][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 275.754432][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 275.763460][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 275.835894][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 275.897953][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 275.911054][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 275.921976][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 275.931321][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 275.951962][T16278] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 275.966030][T16278] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 275.975373][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 275.994947][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 276.004748][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.013964][ T8858] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.021094][ T8858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.028857][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 276.037637][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 276.046351][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 276.055005][ T8858] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.062113][ T8858] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.129361][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 276.138549][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 276.147200][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 276.220935][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 276.229855][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 276.239313][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 276.262136][T16278] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 276.302257][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 276.315805][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 276.324265][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 276.332848][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 276.341054][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 276.349292][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 276.361511][T16285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 276.465933][T16285] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 276.500808][T16296] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 276.601358][T16306] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 276.635680][T16305] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 276.656094][T16306] CPU: 0 PID: 16306 Comm: syz-executor.0 Not tainted 5.2.0-rc5+ #32 [ 276.664092][T16306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.678255][T16306] Call Trace: [ 276.681630][T16306] dump_stack+0x172/0x1f0 [ 276.685956][T16306] dump_header+0x10f/0xb6c [ 276.690371][T16306] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 276.696696][T16306] ? ___ratelimit+0x60/0x595 [ 276.701292][T16306] ? do_raw_spin_unlock+0x57/0x270 [ 276.706393][T16306] oom_kill_process.cold+0x10/0x15 [ 276.711509][T16306] out_of_memory+0x79a/0x1280 [ 276.716180][T16306] ? __sched_text_start+0x8/0x8 [ 276.721330][T16306] ? oom_killer_disable+0x280/0x280 [ 276.726512][T16306] ? cgroup_file_notify+0x140/0x1b0 [ 276.731704][T16306] mem_cgroup_out_of_memory+0x1ca/0x230 [ 276.737234][T16306] ? memcg_event_wake+0x230/0x230 [ 276.742243][T16306] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 276.748030][T16306] ? cgroup_file_notify+0x140/0x1b0 [ 276.753232][T16306] memory_max_write+0x22f/0x390 [ 276.758099][T16306] ? mem_cgroup_write+0x360/0x360 [ 276.763112][T16306] ? lock_acquire+0x16f/0x3f0 [ 276.768593][T16306] ? kernfs_fop_write+0x227/0x480 [ 276.773615][T16306] cgroup_file_write+0x241/0x790 [ 276.778563][T16306] ? mem_cgroup_write+0x360/0x360 [ 276.783592][T16306] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 276.789250][T16306] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 276.794896][T16306] kernfs_fop_write+0x2b8/0x480 [ 276.799754][T16306] __vfs_write+0x8a/0x110 [ 276.804180][T16306] ? kernfs_fop_open+0xd80/0xd80 [ 276.809228][T16306] vfs_write+0x20c/0x580 [ 276.813458][T16306] ksys_write+0x14f/0x290 [ 276.817803][T16306] ? __ia32_sys_read+0xb0/0xb0 [ 276.822568][T16306] ? do_syscall_64+0x26/0x680 [ 276.827224][T16306] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.833268][T16306] ? do_syscall_64+0x26/0x680 [ 276.837928][T16306] __x64_sys_write+0x73/0xb0 [ 276.842569][T16306] do_syscall_64+0xfd/0x680 [ 276.847059][T16306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.852933][T16306] RIP: 0033:0x4597c9 [ 276.856816][T16306] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.876405][T16306] RSP: 002b:00007f05d3002c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 276.884813][T16306] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004597c9 [ 276.892781][T16306] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 276.900740][T16306] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 276.908715][T16306] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05d30036d4 [ 276.916677][T16306] R13: 00000000004c96dc R14: 00000000004e0a60 R15: 00000000ffffffff [ 276.934438][T16306] memory: usage 6708kB, limit 0kB, failcnt 34 [ 276.940579][T16306] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 276.948041][T16306] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 276.955397][T16306] Memory cgroup stats for /syz0: cache:8KB rss:2176KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2176KB inactive_file:8KB active_file:0KB unevictable:0KB [ 276.976407][T16306] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=16294,uid=0 [ 276.992234][T16306] Memory cgroup out of memory: Killed process 16294 (syz-executor.0) total-vm:72712kB, anon-rss:2196kB, file-rss:35836kB, shmem-rss:0kB [ 277.008217][ T1045] oom_reaper: reaped process 16294 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 277.024215][T16309] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 277.037594][T16309] CPU: 0 PID: 16309 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #32 [ 277.045589][T16309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.055642][T16309] Call Trace: [ 277.058939][T16309] dump_stack+0x172/0x1f0 [ 277.063295][T16309] dump_header+0x10f/0xb6c [ 277.067729][T16309] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 277.073547][T16309] ? ___ratelimit+0x60/0x595 [ 277.078150][T16309] ? do_raw_spin_unlock+0x57/0x270 [ 277.083303][T16309] oom_kill_process.cold+0x10/0x15 [ 277.088426][T16309] out_of_memory+0x79a/0x1280 [ 277.093757][T16309] ? oom_killer_disable+0x280/0x280 [ 277.099017][T16309] ? cgroup_file_notify+0x140/0x1b0 [ 277.104229][T16309] mem_cgroup_out_of_memory+0x1ca/0x230 [ 277.109784][T16309] ? memcg_event_wake+0x230/0x230 [ 277.114836][T16309] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 277.120655][T16309] ? cgroup_file_notify+0x140/0x1b0 [ 277.125858][T16309] memory_max_write+0x22f/0x390 [ 277.130755][T16309] ? mem_cgroup_write+0x360/0x360 [ 277.135779][T16309] ? lock_acquire+0x16f/0x3f0 [ 277.140469][T16309] ? kernfs_fop_write+0x227/0x480 [ 277.145504][T16309] cgroup_file_write+0x241/0x790 [ 277.150442][T16309] ? mem_cgroup_write+0x360/0x360 [ 277.155469][T16309] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 277.161111][T16309] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 277.166743][T16309] kernfs_fop_write+0x2b8/0x480 [ 277.171614][T16309] __vfs_write+0x8a/0x110 [ 277.176041][T16309] ? kernfs_fop_open+0xd80/0xd80 [ 277.181001][T16309] vfs_write+0x20c/0x580 [ 277.185255][T16309] ksys_write+0x14f/0x290 [ 277.189596][T16309] ? __ia32_sys_read+0xb0/0xb0 [ 277.194389][T16309] ? do_syscall_64+0x26/0x680 [ 277.199092][T16309] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.205161][T16309] ? do_syscall_64+0x26/0x680 [ 277.209853][T16309] __x64_sys_write+0x73/0xb0 [ 277.214448][T16309] do_syscall_64+0xfd/0x680 [ 277.218952][T16309] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.224843][T16309] RIP: 0033:0x4597c9 [ 277.228739][T16309] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:45:28 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'nr0\x01\x00', 0x4005}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f00000002c0)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00\x00\x00\x00\x00\x80\x00\x00\n\xf4D3A}\xe4\xac\xff\x82q\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x891b, &(0x7f0000000080)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00\x00\x00\x00\x00\x80\x00\x00\n\xf4D3A}\xe4\xac\xff\x82q\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') [ 277.248345][T16309] RSP: 002b:00007f71af531c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 277.256765][T16309] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004597c9 [ 277.264745][T16309] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 277.272731][T16309] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 277.280710][T16309] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f71af5326d4 [ 277.288694][T16309] R13: 00000000004c96dc R14: 00000000004e0a60 R15: 00000000ffffffff [ 277.309310][T16309] memory: usage 7672kB, limit 0kB, failcnt 11 [ 277.319686][T16309] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 277.329626][T16309] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 277.344347][T16309] Memory cgroup stats for /syz3: cache:4KB rss:2180KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:4KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2180KB inactive_file:0KB active_file:4KB unevictable:0KB [ 277.373500][T16309] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg= [ 277.373535][T16309] /syz3,task_memcg=/syz3,task=syz-executor.3,pid=16303,uid=0 [ 277.404304][T16309] Memory cgroup out of memory: Killed process 16303 (syz-executor.3) total-vm:72712kB, anon-rss:2196kB, file-rss:35832kB, shmem-rss:0kB [ 277.427304][T16278] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 277.441745][T16278] CPU: 1 PID: 16278 Comm: syz-executor.0 Not tainted 5.2.0-rc5+ #32 [ 277.449746][T16278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.459806][T16278] Call Trace: [ 277.463140][T16278] dump_stack+0x172/0x1f0 [ 277.467499][T16278] dump_header+0x10f/0xb6c [ 277.472037][T16278] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 277.472051][T16278] ? ___ratelimit+0x60/0x595 [ 277.472064][T16278] ? do_raw_spin_unlock+0x57/0x270 [ 277.472081][T16278] oom_kill_process.cold+0x10/0x15 [ 277.472097][T16278] out_of_memory+0x79a/0x1280 [ 277.472117][T16278] ? oom_killer_disable+0x280/0x280 [ 277.472128][T16278] ? find_held_lock+0x35/0x130 23:45:29 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) socketpair(0x29, 0x2, 0x2, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@nl=@unspec={0x0, 0x0, 0x0, 0x8000a0ffffffff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x7, 0x0) socket$kcm(0x29, 0x0, 0x0) 23:45:29 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x894a, &(0x7f0000000080)='ip6tnl0\x00') 23:45:29 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x0, 0x4}, 0x2c) socket$kcm(0xa, 0x2, 0x73) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) socketpair(0x10, 0x0, 0x3, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETFEATURES(r2, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000200)='syzkaller0\x00') bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_subtree(r2, 0x0, 0x2, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f00000003c0)) r4 = socket$kcm(0x11, 0x3, 0x300) close(r4) socket$kcm(0xa, 0x40122000000003, 0x11) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x5411, 0x70d000) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r3}) 23:45:29 executing program 2: r0 = perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xb704, 0x0) 23:45:29 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x26, 0x5, 0x0, &(0x7f0000000200)) [ 277.472151][T16278] mem_cgroup_out_of_memory+0x1ca/0x230 [ 277.482543][T16278] ? memcg_event_wake+0x230/0x230 [ 277.492848][T16278] ? do_raw_spin_unlock+0x57/0x270 [ 277.492865][T16278] ? _raw_spin_unlock+0x2d/0x50 [ 277.492880][T16278] try_charge+0x1042/0x1410 [ 277.492899][T16278] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 277.492915][T16278] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.492931][T16278] ? kasan_check_read+0x11/0x20 [ 277.492949][T16278] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 277.492965][T16278] mem_cgroup_try_charge+0x24d/0x5e0 [ 277.492984][T16278] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 277.493005][T16278] wp_page_copy+0x416/0x1770 [ 277.493020][T16278] ? __sched_text_start+0x8/0x8 [ 277.493040][T16278] ? pmd_pfn+0x1d0/0x1d0 [ 277.493054][T16278] ? preempt_schedule+0x4b/0x60 [ 277.493067][T16278] ? preempt_schedule_common+0x4f/0xe0 [ 277.493087][T16278] ? preempt_schedule+0x4b/0x60 [ 277.594657][T16278] ? ___preempt_schedule+0x16/0x18 [ 277.599798][T16278] do_wp_page+0x48e/0x1500 [ 277.604247][T16278] ? finish_mkwrite_fault+0x540/0x540 [ 277.609642][T16278] __handle_mm_fault+0x22e3/0x3eb0 [ 277.614770][T16278] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 277.620341][T16278] ? find_held_lock+0x35/0x130 [ 277.625119][T16278] ? handle_mm_fault+0x292/0xa90 [ 277.630078][T16278] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.636765][T16278] ? kasan_check_read+0x11/0x20 [ 277.641653][T16278] handle_mm_fault+0x3b7/0xa90 [ 277.646440][T16278] __do_page_fault+0x5ef/0xda0 [ 277.651215][T16278] do_page_fault+0x71/0x57d [ 277.655721][T16278] ? page_fault+0x8/0x30 23:45:29 executing program 2: r0 = perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xb704, 0x0) [ 277.659968][T16278] page_fault+0x1e/0x30 [ 277.664143][T16278] RIP: 0033:0x403442 [ 277.668136][T16278] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 a9 8d 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 c9 42 05 00 48 [ 277.687753][T16278] RSP: 002b:00007ffdcbf49c00 EFLAGS: 00010246 [ 277.693863][T16278] RAX: 0000000000000000 RBX: 0000000000043892 RCX: 00000000004133d0 [ 277.701936][T16278] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffdcbf4ad30 23:45:29 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x894a, &(0x7f0000000080)='ip6tnl0\x00') [ 277.710188][T16278] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555556a09940 [ 277.718183][T16278] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdcbf4ad30 [ 277.726160][T16278] R13: 00007ffdcbf4ad20 R14: 0000000000000000 R15: 00007ffdcbf4ad30 23:45:29 executing program 4: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x245) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000200)="a87022ec4fd5337bd7fb8535da4300000000c22b7b6f5af87d98ce827ccbaf893f11159bec63c5ec", 0x28}], 0x1}, 0x0) [ 277.760475][T16278] memory: usage 4320kB, limit 0kB, failcnt 47 [ 277.766961][T16278] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 277.766980][T16278] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 277.823415][T16278] Memory cgroup stats for /syz0: cache:4KB rss:40KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:4KB unevictable:0KB 23:45:29 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x894a, &(0x7f0000000080)='ip6tnl0\x00') 23:45:29 executing program 2: r0 = perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xb704, 0x0) 23:45:29 executing program 4: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x245) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000200)="a87022ec4fd5337bd7fb8535da4300000000c22b7b6f5af87d98ce827ccbaf893f11159bec63c5ec", 0x28}], 0x1}, 0x0) [ 277.915427][T16278] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=16278,uid=0 [ 277.940127][T16278] Memory cgroup out of memory: Killed process 16278 (syz-executor.0) total-vm:72448kB, anon-rss:76kB, file-rss:34828kB, shmem-rss:0kB [ 277.980264][ T1045] oom_reaper: reaped process 16278 (syz-executor.0), now anon-rss:0kB, file-rss:33932kB, shmem-rss:0kB [ 278.027795][T16285] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 278.050663][T16285] CPU: 1 PID: 16285 Comm: syz-executor.3 Not tainted 5.2.0-rc5+ #32 [ 278.058662][T16285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.068728][T16285] Call Trace: [ 278.072041][T16285] dump_stack+0x172/0x1f0 [ 278.076413][T16285] dump_header+0x10f/0xb6c [ 278.080857][T16285] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 278.086873][T16285] ? ___ratelimit+0x60/0x595 [ 278.091477][T16285] ? do_raw_spin_unlock+0x57/0x270 [ 278.096879][T16285] oom_kill_process.cold+0x10/0x15 [ 278.102210][T16285] out_of_memory+0x79a/0x1280 [ 278.106907][T16285] ? oom_killer_disable+0x280/0x280 [ 278.112194][T16285] ? find_held_lock+0x35/0x130 [ 278.116970][T16285] mem_cgroup_out_of_memory+0x1ca/0x230 [ 278.122524][T16285] ? memcg_event_wake+0x230/0x230 [ 278.127562][T16285] ? do_raw_spin_unlock+0x57/0x270 [ 278.132690][T16285] ? _raw_spin_unlock+0x2d/0x50 [ 278.137551][T16285] try_charge+0x1042/0x1410 [ 278.142064][T16285] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 278.147618][T16285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.153867][T16285] ? kasan_check_read+0x11/0x20 [ 278.158728][T16285] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 278.164462][T16285] mem_cgroup_try_charge+0x24d/0x5e0 [ 278.169776][T16285] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 278.175432][T16285] wp_page_copy+0x416/0x1770 [ 278.180039][T16285] ? do_wp_page+0x486/0x1500 [ 278.184684][T16285] ? pmd_pfn+0x1d0/0x1d0 [ 278.188946][T16285] ? lock_downgrade+0x880/0x880 [ 278.193797][T16285] ? swp_swapcount+0x540/0x540 [ 278.193811][T16285] ? do_raw_spin_unlock+0x57/0x270 [ 278.193827][T16285] ? kasan_check_read+0x11/0x20 [ 278.193840][T16285] ? do_raw_spin_unlock+0x57/0x270 [ 278.193864][T16285] do_wp_page+0x48e/0x1500 [ 278.193883][T16285] ? finish_mkwrite_fault+0x540/0x540 [ 278.193909][T16285] __handle_mm_fault+0x22e3/0x3eb0 [ 278.193930][T16285] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 278.193944][T16285] ? find_held_lock+0x35/0x130 [ 278.193959][T16285] ? handle_mm_fault+0x292/0xa90 [ 278.193986][T16285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.252083][T16285] ? kasan_check_read+0x11/0x20 [ 278.256943][T16285] handle_mm_fault+0x3b7/0xa90 [ 278.261723][T16285] __do_page_fault+0x5ef/0xda0 [ 278.266515][T16285] do_page_fault+0x71/0x57d [ 278.271025][T16285] ? page_fault+0x8/0x30 [ 278.275282][T16285] page_fault+0x1e/0x30 [ 278.279441][T16285] RIP: 0033:0x4308a6 [ 278.283337][T16285] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 46 64 00 85 c0 0f 84 [ 278.303489][T16285] RSP: 002b:00007ffdfb8668f0 EFLAGS: 00010206 [ 278.309542][T16285] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 278.317498][T16285] RDX: 0000555556cc4930 RSI: 0000555556ccc970 RDI: 0000000000000003 [ 278.325450][T16285] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556cc3940 [ 278.333415][T16285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 278.341476][T16285] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 278.350622][T16285] memory: usage 5292kB, limit 0kB, failcnt 19 [ 278.356707][T16285] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 278.364432][T16285] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 278.372183][T16285] Memory cgroup stats for /syz3: cache:4KB rss:40KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:4KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:4KB unevictable:0KB [ 278.392675][T16285] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=16285,uid=0 [ 278.408226][T16285] Memory cgroup out of memory: Killed process 16285 (syz-executor.3) total-vm:72448kB, anon-rss:76kB, file-rss:34828kB, shmem-rss:0kB [ 278.789996][T16339] IPVS: ftp: loaded support on port[0] = 21 [ 279.037172][T16339] chnl_net:caif_netlink_parms(): no params data found [ 279.068500][T16339] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.080009][T16339] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.088641][T16339] device bridge_slave_0 entered promiscuous mode [ 279.134370][T16339] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.142555][T16339] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.150330][T16339] device bridge_slave_1 entered promiscuous mode [ 279.214057][T16339] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 279.225670][T16339] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 279.294790][T16339] team0: Port device team_slave_0 added [ 279.302498][T16339] team0: Port device team_slave_1 added [ 279.362567][T16339] device hsr_slave_0 entered promiscuous mode [ 279.431026][T16339] device hsr_slave_1 entered promiscuous mode [ 279.528232][T16339] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.535350][T16339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.542761][T16339] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.550378][T16339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.626198][T16339] 8021q: adding VLAN 0 to HW filter on device bond0 [ 279.639902][ T8849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 279.648398][ T8849] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.657998][ T8849] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.675741][T16339] 8021q: adding VLAN 0 to HW filter on device team0 [ 279.739796][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 279.749004][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 279.757905][ T8858] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.765152][ T8858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.773915][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 279.783110][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 279.792272][ T8858] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.799424][ T8858] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.864077][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 279.888413][T16339] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 279.899528][T16339] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 279.916686][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 279.925768][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 279.935310][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 279.943890][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 279.952547][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 279.961961][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 279.971253][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 279.980093][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 279.988968][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 279.997828][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 280.006207][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 280.063717][T16339] 8021q: adding VLAN 0 to HW filter on device batadv0 23:45:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xf, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socket$kcm(0x10, 0x400800000000000, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r2, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r4, 0x11, 0x1}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) 23:45:32 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e432600000000fffffff08ef9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) r1 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x0, 'pids'}, {0x482e35a9b6ae3965, 'io'}, {0x0, 'memory'}]}, 0x17) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:45:32 executing program 4: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x245) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000200)="a87022ec4fd5337bd7fb8535da4300000000c22b7b6f5af87d98ce827ccbaf893f11159bec63c5ec", 0x28}], 0x1}, 0x0) 23:45:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000000)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000140)=[{0x0, 0x3da}], 0x1}, 0x0) 23:45:32 executing program 2: bpf$MAP_CREATE(0x500000000000000, &(0x7f0000000040)={0x2000000000a, 0x1fc, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0x12000000]}, 0x3c) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 23:45:32 executing program 3: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000001c00)={&(0x7f0000000980)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f000000b340)={&(0x7f0000000040)={0x2, 0x4e23, @initdev}, 0x10, 0x0, 0x0, &(0x7f000000b280)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @local, @loopback}}}], 0x20}, 0x0) 23:45:32 executing program 4: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x245) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000200)="a87022ec4fd5337bd7fb8535da4300000000c22b7b6f5af87d98ce827ccbaf893f11159bec63c5ec", 0x28}], 0x1}, 0x0) 23:45:32 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e432600000000fffffff08ef9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) r1 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x0, 'pids'}, {0x482e35a9b6ae3965, 'io'}, {0x0, 'memory'}]}, 0x17) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 280.868464][T16362] __nla_validate_parse: 1 callbacks suppressed [ 280.868538][T16362] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 281.002508][ T2554] device bridge_slave_1 left promiscuous mode [ 281.009442][ T2554] bridge0: port 2(bridge_slave_1) entered disabled state 23:45:32 executing program 4: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e432600000000fffffff08ef9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) r1 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x0, 'pids'}, {0x482e35a9b6ae3965, 'io'}, {0x0, 'memory'}]}, 0x17) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:45:32 executing program 2: bpf$MAP_CREATE(0x500000000000000, &(0x7f0000000040)={0x2000000000a, 0x1fc, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0x12000000]}, 0x3c) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 281.094174][ T2554] device bridge_slave_0 left promiscuous mode [ 281.106575][ T2554] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.153726][ T2554] device bridge_slave_1 left promiscuous mode [ 281.164494][ T2554] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.241836][ T2554] device bridge_slave_0 left promiscuous mode [ 281.248319][ T2554] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.294945][ T2554] device bridge_slave_1 left promiscuous mode [ 281.301488][ T2554] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.351535][ T2554] device bridge_slave_0 left promiscuous mode [ 281.358081][ T2554] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.963785][ T2554] device hsr_slave_1 left promiscuous mode [ 287.015793][ T2554] device hsr_slave_0 left promiscuous mode [ 287.075304][ T2554] team0 (unregistering): Port device team_slave_1 removed [ 287.088873][ T2554] team0 (unregistering): Port device team_slave_0 removed [ 287.100625][ T2554] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 287.155904][ T2554] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 287.251718][ T2554] bond0 (unregistering): Released all slaves [ 287.424962][ T2554] device hsr_slave_1 left promiscuous mode [ 287.486298][ T2554] device hsr_slave_0 left promiscuous mode [ 287.545992][ T2554] team0 (unregistering): Port device team_slave_1 removed [ 287.559060][ T2554] team0 (unregistering): Port device team_slave_0 removed [ 287.570867][ T2554] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 287.626691][ T2554] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 287.722993][ T2554] bond0 (unregistering): Released all slaves [ 288.083918][ T2554] device hsr_slave_1 left promiscuous mode [ 288.155054][ T2554] device hsr_slave_0 left promiscuous mode [ 288.193345][ T2554] device team_slave_1 left promiscuous mode [ 288.200170][ T2554] team0 (unregistering): Port device team_slave_1 removed [ 288.213939][ T2554] device team_slave_0 left promiscuous mode [ 288.220714][ T2554] team0 (unregistering): Port device team_slave_0 removed [ 288.233510][ T2554] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 288.297397][ T2554] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 288.400089][ T2554] bond0 (unregistering): Released all slaves 23:45:40 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e432600000000fffffff08ef9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) r1 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x0, 'pids'}, {0x482e35a9b6ae3965, 'io'}, {0x0, 'memory'}]}, 0x17) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 288.518022][T16358] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 23:45:40 executing program 4: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e432600000000fffffff08ef9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) r1 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x0, 'pids'}, {0x482e35a9b6ae3965, 'io'}, {0x0, 'memory'}]}, 0x17) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 288.579003][T16381] IPVS: ftp: loaded support on port[0] = 21 [ 288.629911][T16383] IPVS: ftp: loaded support on port[0] = 21 23:45:40 executing program 2: bpf$MAP_CREATE(0x500000000000000, &(0x7f0000000040)={0x2000000000a, 0x1fc, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0x12000000]}, 0x3c) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 23:45:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xf, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socket$kcm(0x10, 0x400800000000000, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r2, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r4, 0x11, 0x1}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) 23:45:40 executing program 1: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e432600000000fffffff08ef9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) r1 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x0, 'pids'}, {0x482e35a9b6ae3965, 'io'}, {0x0, 'memory'}]}, 0x17) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 289.055770][T16402] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 289.196669][T16381] chnl_net:caif_netlink_parms(): no params data found [ 289.279562][T16383] chnl_net:caif_netlink_parms(): no params data found [ 289.418509][T16381] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.427275][T16381] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.441683][T16381] device bridge_slave_0 entered promiscuous mode [ 289.530766][T16381] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.537858][T16381] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.546776][T16381] device bridge_slave_1 entered promiscuous mode [ 289.628077][T16381] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 289.637799][T16383] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.648797][T16383] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.657029][T16383] device bridge_slave_0 entered promiscuous mode [ 289.673832][T16381] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 289.691187][T16383] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.698285][T16383] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.715174][T16383] device bridge_slave_1 entered promiscuous mode [ 289.764351][T16381] team0: Port device team_slave_0 added [ 289.773149][T16383] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 289.784056][T16381] team0: Port device team_slave_1 added [ 289.805762][T16383] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 289.863725][T16381] device hsr_slave_0 entered promiscuous mode [ 289.910943][T16381] device hsr_slave_1 entered promiscuous mode [ 290.042551][T16383] team0: Port device team_slave_0 added [ 290.061352][T16383] team0: Port device team_slave_1 added [ 290.183697][T16383] device hsr_slave_0 entered promiscuous mode [ 290.250995][T16383] device hsr_slave_1 entered promiscuous mode [ 290.317642][T16383] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.324788][T16383] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.338898][T16381] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.382155][ T3689] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.390031][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 290.416334][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.424624][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.437404][T16381] 8021q: adding VLAN 0 to HW filter on device team0 [ 290.468257][T16410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.478244][T16410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.488490][T16410] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.495618][T16410] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.536531][ T8851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 290.547117][ T8851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.556653][ T8851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.565774][ T8851] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.572902][ T8851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.581559][ T8851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 290.603056][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 290.614063][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 290.627826][T16383] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.642561][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 290.652100][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 290.661114][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 290.673356][T16381] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 290.685479][T16381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 290.712390][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 290.721515][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 290.729917][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.749252][ T8858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.777973][T16383] 8021q: adding VLAN 0 to HW filter on device team0 [ 290.817293][T16381] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 290.834786][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.849527][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.879076][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.886347][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.911782][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.930280][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.949514][ T3689] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.956774][ T3689] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.974292][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 290.999910][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 291.019280][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 23:45:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000000)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000140)=[{0x0, 0x3da}], 0x1}, 0x0) 23:45:42 executing program 4: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001600)="2e000000130081c5e4050cecdb4cb9040a485e432600000000fffffff08ef9000600b0ebb06ac40006001400f9ff", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x0, 0x10) r1 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x2d, 'cpu'}, {0x0, 'pids'}, {0x482e35a9b6ae3965, 'io'}, {0x0, 'memory'}]}, 0x17) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 291.039327][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 291.058567][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 291.097136][T16383] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 291.126293][T16383] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 291.146124][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 291.163186][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 291.173014][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 291.182350][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 291.200364][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 291.220366][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 291.240845][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 291.294028][T16383] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 291.455133][T16434] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:45:43 executing program 3: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000001c00)={&(0x7f0000000980)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f000000b340)={&(0x7f0000000040)={0x2, 0x4e23, @initdev}, 0x10, 0x0, 0x0, &(0x7f000000b280)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @local, @loopback}}}], 0x20}, 0x0) 23:45:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xf, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socket$kcm(0x10, 0x400800000000000, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r2, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r4, 0x11, 0x1}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) 23:45:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xf, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socket$kcm(0x10, 0x400800000000000, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r2, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r4, 0x11, 0x1}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) 23:45:43 executing program 2: bpf$MAP_CREATE(0x500000000000000, &(0x7f0000000040)={0x2000000000a, 0x1fc, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0x12000000]}, 0x3c) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 23:45:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000000)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000140)=[{0x0, 0x3da}], 0x1}, 0x0) 23:45:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xf, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socket$kcm(0x10, 0x400800000000000, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r2, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r4, 0x11, 0x1}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) 23:45:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000000)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000140)=[{0x0, 0x3da}], 0x1}, 0x0) [ 291.792195][T16450] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 23:45:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xf, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socket$kcm(0x10, 0x400800000000000, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r2, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r4, 0x11, 0x1}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) 23:45:43 executing program 3: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000001c00)={&(0x7f0000000980)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f000000b340)={&(0x7f0000000040)={0x2, 0x4e23, @initdev}, 0x10, 0x0, 0x0, &(0x7f000000b280)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @local, @loopback}}}], 0x20}, 0x0) 23:45:44 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='(\'\'cpuset/*cpusetprocvboxnet1\\/!^\x00') 23:45:44 executing program 3: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000001c00)={&(0x7f0000000980)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f000000b340)={&(0x7f0000000040)={0x2, 0x4e23, @initdev}, 0x10, 0x0, 0x0, &(0x7f000000b280)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @local, @loopback}}}], 0x20}, 0x0) 23:45:44 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000540)={'ifb0\x00', @broadcast}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) unlink(&(0x7f0000000a00)='./file0\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000b00)=ANY=[@ANYBLOB="080000000000800000000400000000000000000000000000000000000000000000000000000000e6"]) r4 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x7f, 0xffffffffffff7fff, 0x9, 0x0, 0x0, 0x200, 0x26, 0x1, 0xfffffffffffffff8, 0xd5b5, 0x46, 0xe66, 0x7, 0x8d4, 0x7ff, 0x0, 0x1000, 0x8, 0x0, 0x1, 0x9, 0x2, 0xfff, 0x100000000, 0x1, 0x6, 0x2, 0x5, 0x0, 0xff, 0x3, 0x8, 0x590, 0x8, 0x6, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x114, 0x9, 0x10000, 0x0, 0x9, 0x1, 0x8}, r4, 0x7, r0, 0x1) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000380)={r1, r5}) mkdir(&(0x7f00000003c0)='./file0\x00', 0x142) recvmsg$kcm(r1, &(0x7f00000009c0)={&(0x7f00000005c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000640)=""/81, 0x51}, {&(0x7f00000006c0)=""/34, 0x22}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/87, 0x57}, {&(0x7f0000000800)=""/5, 0x5}, {&(0x7f0000000840)=""/126, 0x7e}], 0x6, &(0x7f0000000940)=""/108, 0x6c}, 0x40) recvmsg(r1, &(0x7f0000000080)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0xdc, &(0x7f0000000300)=[{&(0x7f0000000480)=""/97, 0xfffffffffffffda8}], 0xfffffffffffffd2}, 0x10000) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x8953, &(0x7f0000000040)=0x2) 23:45:44 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='(\'\'cpuset/*cpusetprocvboxnet1\\/!^\x00') [ 293.015517][T16451] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 293.347742][T16452] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 23:45:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xf, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socket$kcm(0x10, 0x400800000000000, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r2, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r4, 0x11, 0x1}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) 23:45:45 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='(\'\'cpuset/*cpusetprocvboxnet1\\/!^\x00') 23:45:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xf, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socket$kcm(0x10, 0x400800000000000, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r2, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r4, 0x11, 0x1}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) 23:45:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xf, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socket$kcm(0x10, 0x400800000000000, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r2, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r4, 0x11, 0x1}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) 23:45:45 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000540)={'ifb0\x00', @broadcast}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) unlink(&(0x7f0000000a00)='./file0\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000b00)=ANY=[@ANYBLOB="080000000000800000000400000000000000000000000000000000000000000000000000000000e6"]) r4 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x7f, 0xffffffffffff7fff, 0x9, 0x0, 0x0, 0x200, 0x26, 0x1, 0xfffffffffffffff8, 0xd5b5, 0x46, 0xe66, 0x7, 0x8d4, 0x7ff, 0x0, 0x1000, 0x8, 0x0, 0x1, 0x9, 0x2, 0xfff, 0x100000000, 0x1, 0x6, 0x2, 0x5, 0x0, 0xff, 0x3, 0x8, 0x590, 0x8, 0x6, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x114, 0x9, 0x10000, 0x0, 0x9, 0x1, 0x8}, r4, 0x7, r0, 0x1) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000380)={r1, r5}) mkdir(&(0x7f00000003c0)='./file0\x00', 0x142) recvmsg$kcm(r1, &(0x7f00000009c0)={&(0x7f00000005c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000640)=""/81, 0x51}, {&(0x7f00000006c0)=""/34, 0x22}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/87, 0x57}, {&(0x7f0000000800)=""/5, 0x5}, {&(0x7f0000000840)=""/126, 0x7e}], 0x6, &(0x7f0000000940)=""/108, 0x6c}, 0x40) recvmsg(r1, &(0x7f0000000080)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0xdc, &(0x7f0000000300)=[{&(0x7f0000000480)=""/97, 0xfffffffffffffda8}], 0xfffffffffffffd2}, 0x10000) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x8953, &(0x7f0000000040)=0x2) [ 293.626904][T16465] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 23:45:45 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='(\'\'cpuset/*cpusetprocvboxnet1\\/!^\x00') 23:45:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xf, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socket$kcm(0x10, 0x400800000000000, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r2, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r4, 0x11, 0x1}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) 23:45:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000540)={'ifb0\x00', @broadcast}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) unlink(&(0x7f0000000a00)='./file0\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000b00)=ANY=[@ANYBLOB="080000000000800000000400000000000000000000000000000000000000000000000000000000e6"]) r4 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x7f, 0xffffffffffff7fff, 0x9, 0x0, 0x0, 0x200, 0x26, 0x1, 0xfffffffffffffff8, 0xd5b5, 0x46, 0xe66, 0x7, 0x8d4, 0x7ff, 0x0, 0x1000, 0x8, 0x0, 0x1, 0x9, 0x2, 0xfff, 0x100000000, 0x1, 0x6, 0x2, 0x5, 0x0, 0xff, 0x3, 0x8, 0x590, 0x8, 0x6, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x114, 0x9, 0x10000, 0x0, 0x9, 0x1, 0x8}, r4, 0x7, r0, 0x1) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000380)={r1, r5}) mkdir(&(0x7f00000003c0)='./file0\x00', 0x142) recvmsg$kcm(r1, &(0x7f00000009c0)={&(0x7f00000005c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000640)=""/81, 0x51}, {&(0x7f00000006c0)=""/34, 0x22}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/87, 0x57}, {&(0x7f0000000800)=""/5, 0x5}, {&(0x7f0000000840)=""/126, 0x7e}], 0x6, &(0x7f0000000940)=""/108, 0x6c}, 0x40) recvmsg(r1, &(0x7f0000000080)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0xdc, &(0x7f0000000300)=[{&(0x7f0000000480)=""/97, 0xfffffffffffffda8}], 0xfffffffffffffd2}, 0x10000) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x8953, &(0x7f0000000040)=0x2) [ 294.304491][T16496] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 23:45:46 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000540)={'ifb0\x00', @broadcast}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) unlink(&(0x7f0000000a00)='./file0\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000b00)=ANY=[@ANYBLOB="080000000000800000000400000000000000000000000000000000000000000000000000000000e6"]) r4 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x7f, 0xffffffffffff7fff, 0x9, 0x0, 0x0, 0x200, 0x26, 0x1, 0xfffffffffffffff8, 0xd5b5, 0x46, 0xe66, 0x7, 0x8d4, 0x7ff, 0x0, 0x1000, 0x8, 0x0, 0x1, 0x9, 0x2, 0xfff, 0x100000000, 0x1, 0x6, 0x2, 0x5, 0x0, 0xff, 0x3, 0x8, 0x590, 0x8, 0x6, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x114, 0x9, 0x10000, 0x0, 0x9, 0x1, 0x8}, r4, 0x7, r0, 0x1) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000380)={r1, r5}) mkdir(&(0x7f00000003c0)='./file0\x00', 0x142) recvmsg$kcm(r1, &(0x7f00000009c0)={&(0x7f00000005c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000640)=""/81, 0x51}, {&(0x7f00000006c0)=""/34, 0x22}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/87, 0x57}, {&(0x7f0000000800)=""/5, 0x5}, {&(0x7f0000000840)=""/126, 0x7e}], 0x6, &(0x7f0000000940)=""/108, 0x6c}, 0x40) recvmsg(r1, &(0x7f0000000080)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0xdc, &(0x7f0000000300)=[{&(0x7f0000000480)=""/97, 0xfffffffffffffda8}], 0xfffffffffffffd2}, 0x10000) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x8953, &(0x7f0000000040)=0x2) 23:45:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000540)={'ifb0\x00', @broadcast}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) unlink(&(0x7f0000000a00)='./file0\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000b00)=ANY=[@ANYBLOB="080000000000800000000400000000000000000000000000000000000000000000000000000000e6"]) r4 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x7f, 0xffffffffffff7fff, 0x9, 0x0, 0x0, 0x200, 0x26, 0x1, 0xfffffffffffffff8, 0xd5b5, 0x46, 0xe66, 0x7, 0x8d4, 0x7ff, 0x0, 0x1000, 0x8, 0x0, 0x1, 0x9, 0x2, 0xfff, 0x100000000, 0x1, 0x6, 0x2, 0x5, 0x0, 0xff, 0x3, 0x8, 0x590, 0x8, 0x6, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x114, 0x9, 0x10000, 0x0, 0x9, 0x1, 0x8}, r4, 0x7, r0, 0x1) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000380)={r1, r5}) mkdir(&(0x7f00000003c0)='./file0\x00', 0x142) recvmsg$kcm(r1, &(0x7f00000009c0)={&(0x7f00000005c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000640)=""/81, 0x51}, {&(0x7f00000006c0)=""/34, 0x22}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/87, 0x57}, {&(0x7f0000000800)=""/5, 0x5}, {&(0x7f0000000840)=""/126, 0x7e}], 0x6, &(0x7f0000000940)=""/108, 0x6c}, 0x40) recvmsg(r1, &(0x7f0000000080)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0xdc, &(0x7f0000000300)=[{&(0x7f0000000480)=""/97, 0xfffffffffffffda8}], 0xfffffffffffffd2}, 0x10000) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x8953, &(0x7f0000000040)=0x2) [ 295.027792][T16495] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 23:45:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xf, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socket$kcm(0x10, 0x400800000000000, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r2, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r4, 0x11, 0x1}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) 23:45:46 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000540)={'ifb0\x00', @broadcast}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) unlink(&(0x7f0000000a00)='./file0\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000b00)=ANY=[@ANYBLOB="080000000000800000000400000000000000000000000000000000000000000000000000000000e6"]) r4 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x7f, 0xffffffffffff7fff, 0x9, 0x0, 0x0, 0x200, 0x26, 0x1, 0xfffffffffffffff8, 0xd5b5, 0x46, 0xe66, 0x7, 0x8d4, 0x7ff, 0x0, 0x1000, 0x8, 0x0, 0x1, 0x9, 0x2, 0xfff, 0x100000000, 0x1, 0x6, 0x2, 0x5, 0x0, 0xff, 0x3, 0x8, 0x590, 0x8, 0x6, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x114, 0x9, 0x10000, 0x0, 0x9, 0x1, 0x8}, r4, 0x7, r0, 0x1) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000380)={r1, r5}) mkdir(&(0x7f00000003c0)='./file0\x00', 0x142) recvmsg$kcm(r1, &(0x7f00000009c0)={&(0x7f00000005c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000640)=""/81, 0x51}, {&(0x7f00000006c0)=""/34, 0x22}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/87, 0x57}, {&(0x7f0000000800)=""/5, 0x5}, {&(0x7f0000000840)=""/126, 0x7e}], 0x6, &(0x7f0000000940)=""/108, 0x6c}, 0x40) recvmsg(r1, &(0x7f0000000080)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0xdc, &(0x7f0000000300)=[{&(0x7f0000000480)=""/97, 0xfffffffffffffda8}], 0xfffffffffffffd2}, 0x10000) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x8953, &(0x7f0000000040)=0x2) [ 295.670202][T16499] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 23:45:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xf, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socket$kcm(0x10, 0x400800000000000, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r2, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r4, 0x11, 0x1}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) 23:45:47 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000540)={'ifb0\x00', @broadcast}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) unlink(&(0x7f0000000a00)='./file0\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000b00)=ANY=[@ANYBLOB="080000000000800000000400000000000000000000000000000000000000000000000000000000e6"]) r4 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x7f, 0xffffffffffff7fff, 0x9, 0x0, 0x0, 0x200, 0x26, 0x1, 0xfffffffffffffff8, 0xd5b5, 0x46, 0xe66, 0x7, 0x8d4, 0x7ff, 0x0, 0x1000, 0x8, 0x0, 0x1, 0x9, 0x2, 0xfff, 0x100000000, 0x1, 0x6, 0x2, 0x5, 0x0, 0xff, 0x3, 0x8, 0x590, 0x8, 0x6, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x114, 0x9, 0x10000, 0x0, 0x9, 0x1, 0x8}, r4, 0x7, r0, 0x1) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000380)={r1, r5}) mkdir(&(0x7f00000003c0)='./file0\x00', 0x142) recvmsg$kcm(r1, &(0x7f00000009c0)={&(0x7f00000005c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000640)=""/81, 0x51}, {&(0x7f00000006c0)=""/34, 0x22}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/87, 0x57}, {&(0x7f0000000800)=""/5, 0x5}, {&(0x7f0000000840)=""/126, 0x7e}], 0x6, &(0x7f0000000940)=""/108, 0x6c}, 0x40) recvmsg(r1, &(0x7f0000000080)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0xdc, &(0x7f0000000300)=[{&(0x7f0000000480)=""/97, 0xfffffffffffffda8}], 0xfffffffffffffd2}, 0x10000) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x8953, &(0x7f0000000040)=0x2) 23:45:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000540)={'ifb0\x00', @broadcast}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) unlink(&(0x7f0000000a00)='./file0\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000b00)=ANY=[@ANYBLOB="080000000000800000000400000000000000000000000000000000000000000000000000000000e6"]) r4 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x7f, 0xffffffffffff7fff, 0x9, 0x0, 0x0, 0x200, 0x26, 0x1, 0xfffffffffffffff8, 0xd5b5, 0x46, 0xe66, 0x7, 0x8d4, 0x7ff, 0x0, 0x1000, 0x8, 0x0, 0x1, 0x9, 0x2, 0xfff, 0x100000000, 0x1, 0x6, 0x2, 0x5, 0x0, 0xff, 0x3, 0x8, 0x590, 0x8, 0x6, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x114, 0x9, 0x10000, 0x0, 0x9, 0x1, 0x8}, r4, 0x7, r0, 0x1) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000380)={r1, r5}) mkdir(&(0x7f00000003c0)='./file0\x00', 0x142) recvmsg$kcm(r1, &(0x7f00000009c0)={&(0x7f00000005c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000640)=""/81, 0x51}, {&(0x7f00000006c0)=""/34, 0x22}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/87, 0x57}, {&(0x7f0000000800)=""/5, 0x5}, {&(0x7f0000000840)=""/126, 0x7e}], 0x6, &(0x7f0000000940)=""/108, 0x6c}, 0x40) recvmsg(r1, &(0x7f0000000080)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0xdc, &(0x7f0000000300)=[{&(0x7f0000000480)=""/97, 0xfffffffffffffda8}], 0xfffffffffffffd2}, 0x10000) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x8953, &(0x7f0000000040)=0x2) 23:45:47 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000540)={'ifb0\x00', @broadcast}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) unlink(&(0x7f0000000a00)='./file0\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000b00)=ANY=[@ANYBLOB="080000000000800000000400000000000000000000000000000000000000000000000000000000e6"]) r4 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x7f, 0xffffffffffff7fff, 0x9, 0x0, 0x0, 0x200, 0x26, 0x1, 0xfffffffffffffff8, 0xd5b5, 0x46, 0xe66, 0x7, 0x8d4, 0x7ff, 0x0, 0x1000, 0x8, 0x0, 0x1, 0x9, 0x2, 0xfff, 0x100000000, 0x1, 0x6, 0x2, 0x5, 0x0, 0xff, 0x3, 0x8, 0x590, 0x8, 0x6, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x114, 0x9, 0x10000, 0x0, 0x9, 0x1, 0x8}, r4, 0x7, r0, 0x1) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000380)={r1, r5}) mkdir(&(0x7f00000003c0)='./file0\x00', 0x142) recvmsg$kcm(r1, &(0x7f00000009c0)={&(0x7f00000005c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000640)=""/81, 0x51}, {&(0x7f00000006c0)=""/34, 0x22}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/87, 0x57}, {&(0x7f0000000800)=""/5, 0x5}, {&(0x7f0000000840)=""/126, 0x7e}], 0x6, &(0x7f0000000940)=""/108, 0x6c}, 0x40) recvmsg(r1, &(0x7f0000000080)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0xdc, &(0x7f0000000300)=[{&(0x7f0000000480)=""/97, 0xfffffffffffffda8}], 0xfffffffffffffd2}, 0x10000) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x8953, &(0x7f0000000040)=0x2) [ 296.024776][T16517] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 296.048974][T16527] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 23:45:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xf, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socket$kcm(0x10, 0x400800000000000, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r2, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x22) recvmsg(r2, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffb0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r4, 0x11, 0x1}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) 23:45:48 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000540)={'ifb0\x00', @broadcast}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) unlink(&(0x7f0000000a00)='./file0\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000b00)=ANY=[@ANYBLOB="080000000000800000000400000000000000000000000000000000000000000000000000000000e6"]) r4 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x7f, 0xffffffffffff7fff, 0x9, 0x0, 0x0, 0x200, 0x26, 0x1, 0xfffffffffffffff8, 0xd5b5, 0x46, 0xe66, 0x7, 0x8d4, 0x7ff, 0x0, 0x1000, 0x8, 0x0, 0x1, 0x9, 0x2, 0xfff, 0x100000000, 0x1, 0x6, 0x2, 0x5, 0x0, 0xff, 0x3, 0x8, 0x590, 0x8, 0x6, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x114, 0x9, 0x10000, 0x0, 0x9, 0x1, 0x8}, r4, 0x7, r0, 0x1) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000380)={r1, r5}) mkdir(&(0x7f00000003c0)='./file0\x00', 0x142) recvmsg$kcm(r1, &(0x7f00000009c0)={&(0x7f00000005c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000640)=""/81, 0x51}, {&(0x7f00000006c0)=""/34, 0x22}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/87, 0x57}, {&(0x7f0000000800)=""/5, 0x5}, {&(0x7f0000000840)=""/126, 0x7e}], 0x6, &(0x7f0000000940)=""/108, 0x6c}, 0x40) recvmsg(r1, &(0x7f0000000080)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0xdc, &(0x7f0000000300)=[{&(0x7f0000000480)=""/97, 0xfffffffffffffda8}], 0xfffffffffffffd2}, 0x10000) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x8953, &(0x7f0000000040)=0x2) 23:45:48 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000540)={'ifb0\x00', @broadcast}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) unlink(&(0x7f0000000a00)='./file0\x00') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000b00)=ANY=[@ANYBLOB="080000000000800000000400000000000000000000000000000000000000000000000000000000e6"]) r4 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x7f, 0xffffffffffff7fff, 0x9, 0x0, 0x0, 0x200, 0x26, 0x1, 0xfffffffffffffff8, 0xd5b5, 0x46, 0xe66, 0x7, 0x8d4, 0x7ff, 0x0, 0x1000, 0x8, 0x0, 0x1, 0x9, 0x2, 0xfff, 0x100000000, 0x1, 0x6, 0x2, 0x5, 0x0, 0xff, 0x3, 0x8, 0x590, 0x8, 0x6, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x114, 0x9, 0x10000, 0x0, 0x9, 0x1, 0x8}, r4, 0x7, r0, 0x1) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000380)={r1, r5}) mkdir(&(0x7f00000003c0)='./file0\x00', 0x142) recvmsg$kcm(r1, &(0x7f00000009c0)={&(0x7f00000005c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000640)=""/81, 0x51}, {&(0x7f00000006c0)=""/34, 0x22}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/87, 0x57}, {&(0x7f0000000800)=""/5, 0x5}, {&(0x7f0000000840)=""/126, 0x7e}], 0x6, &(0x7f0000000940)=""/108, 0x6c}, 0x40) recvmsg(r1, &(0x7f0000000080)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0xdc, &(0x7f0000000300)=[{&(0x7f0000000480)=""/97, 0xfffffffffffffda8}], 0xfffffffffffffd2}, 0x10000) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x8953, &(0x7f0000000040)=0x2) [ 296.763024][T16550] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 23:45:48 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0xffffffffffffffff, 0x0, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) 23:45:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='\"\xc3\xa0\x198puset.effective_m\xf5\xb2D\xd5\xe1\x15iM\a\xa6\x9d\x9c\x1a\xaaN\x98\xd02\x15B\x1fC\xbb\xe7\xee?\x8aQ\xe2>4\x04\x90\xfd\x7f\x01T\xb0e\xd7\xdfG\x11\xd0\xb4l\v\x8e\rx\xb4\xba\xd3\x9c\xea\xd2\xb5B%\xf3\xf8&\xbdhV\xe4\x02\x1e\xd4!\xaa\xdcTv\x94|\xecW?\xd3\xcf\xbd\xcd\xddq\xd2\x8d\f\x8e\xfdP\x0e\xfd\xc2\x82kg[\xa8\x1a\xe2\x9b\xb9\xe0J\xd6\x15\xb1\x85z\xfe7\xac\xf6\xf1\x8e\x11`\x02\x95+\xf4\xa8\t\xb6\xb5\x8d\xf2(g\x187$ J\xfa_\x13\xedZ\x04\n\xdf 0b e9 55 fd ff ff 48 c7 c7 f4 1b a1 89 e8 00 e6 23 00 e9 5b fc [ 297.151068][T16559] RSP: 0018:ffff888087cbfa90 EFLAGS: 00010016 [ 297.157502][T16559] RAX: 0000000000040000 RBX: ffff88806ca5c900 RCX: ffffc9000e649000 [ 297.165493][T16559] RDX: 00000000000016c4 RSI: ffffffff8186569d RDI: ffff88806ca5cb18 [ 297.173483][T16559] RBP: ffff888087cbfac0 R08: ffff888084048300 R09: ffffed1010f97f48 [ 297.181472][T16559] R10: ffffed1010f97f47 R11: 0000000000000003 R12: ffff88806ca5d180 [ 297.189918][T16559] R13: ffffe8ffffc15018 R14: 0000000000000000 R15: ffff8880ae83a648 [ 297.197953][T16559] ? perf_group_attach+0x3fd/0x4d0 [ 297.203102][T16559] __perf_install_in_context+0x4b5/0x960 [ 297.208781][T16559] ? __perf_event_enable+0x910/0x910 [ 297.214093][T16559] ? perf_duration_warn+0x40/0x40 [ 297.219133][T16559] remote_function+0x129/0x1a0 [ 297.223908][T16559] generic_exec_single+0x27c/0x4a0 [ 297.229124][T16559] smp_call_function_single+0x12d/0x420 [ 297.234684][T16559] ? _raw_spin_unlock+0x2d/0x50 [ 297.239556][T16559] ? perf_duration_warn+0x40/0x40 [ 297.244593][T16559] ? generic_exec_single+0x4a0/0x4a0 [ 297.249906][T16559] ? __do_sys_perf_event_open+0x1a41/0x24d0 [ 297.255833][T16559] perf_install_in_context+0x369/0x3d0 [ 297.261336][T16559] ? list_add_event+0xec0/0xec0 [ 297.266210][T16559] ? __perf_event_enable+0x910/0x910 [ 297.271608][T16559] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 297.277904][T16559] __do_sys_perf_event_open+0x183e/0x24d0 [ 297.283700][T16559] ? perf_event_set_output+0x4e0/0x4e0 [ 297.289187][T16559] ? put_timespec64+0xda/0x140 [ 297.294011][T16559] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 297.299500][T16559] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 297.304979][T16559] ? do_syscall_64+0x26/0x680 [ 297.309672][T16559] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.315750][T16559] ? do_syscall_64+0x26/0x680 [ 297.320448][T16559] __x64_sys_perf_event_open+0xbe/0x150 [ 297.326009][T16559] do_syscall_64+0xfd/0x680 [ 297.330524][T16559] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.336434][T16559] RIP: 0033:0x4597c9 [ 297.340348][T16559] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.361268][T16559] RSP: 002b:00007f171b20bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 297.371002][T16559] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00000000004597c9 [ 297.379437][T16559] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 297.387441][T16559] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 297.395427][T16559] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f171b20c6d4 [ 297.403414][T16559] R13: 00000000004c648c R14: 00000000004db1e0 R15: 00000000ffffffff [ 297.412793][T16559] Kernel Offset: disabled [ 297.417332][T16559] Rebooting in 86400 seconds..