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"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$kcm(0x29, 0x7, 0x0) r8 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x800, 0x20000000, @perf_config_ext, 0x1411, 0xc92, 0x3e}, r8, 0x3, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r7, 0x800454d3, &(0x7f0000000400)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)={r7}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNSETVNETLE(r9, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) close(0xffffffffffffffff) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r11, &(0x7f00000000c0), 0xffffff19) close(r10) [ 280.950918][ T27] audit: type=1804 audit(1563117618.104:48): pid=13552 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir244984287/syzkaller.zHOvWU/202/memory.events" dev="sda1" ino=16535 res=1 [ 281.073863][T13565] netlink: 'syz-executor.1': attribute type 7 has an invalid length. [ 281.116951][ T27] audit: type=1804 audit(1563117618.274:49): pid=13559 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir061707304/syzkaller.OlRix6/189/memory.events" dev="sda1" ino=16524 res=1 15:20:18 executing program 1: recvmsg(0xffffffffffffffff, 0x0, 0x2040) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) sendmsg(r0, 0x0, 0x50) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.events\x00', 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000002700050ad25a80648c63940d0124fc0010000a400a000000053582c137153e3709000800000000000000", 0x2e}], 0x1}, 0x0) 15:20:18 executing program 5: r0 = socket$kcm(0x29, 0xfffffffffffffffd, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000007ac0)={&(0x7f0000007780)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000079c0)=[{&(0x7f0000007800)=""/130, 0x82}, {&(0x7f00000078c0)}, {&(0x7f0000007900)=""/160, 0xa0}], 0x3, &(0x7f0000007a00)=""/135, 0x87}, 0x140) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0x400000004, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r2, &(0x7f0000000200)="f21c", 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000600)='io.stat\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000480)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000580)=0x7, 0x12) r7 = openat$cgroup_ro(r6, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000100)={r6}) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x7f, &(0x7f0000000b80)=ANY=[@ANYBLOB="7ba8f8c81ba657e373000000f4de26f928ad3035cd88c754b3ef0892fdff3fe28307b1cf7fc30c9c8bda2ef9cd489ad4750a8e308921078f886c7c1315729b34f8ced91549c4dbcd026ff7cf02901671beee07659cd458ad168e023e97537c91071797507107d3001911145e1f676a080000000000000072c2e72dbb079ee600ae835d6c99d4525ccde1fc9530490804000000cb875c20698066d27d53e1bf6339066bc77548c64428e6bf32b6828d9b5c981e5f4e20ae903650d12c43c182e7458c04b5e113a7170b2d7800000000eb97308b22273dfcfbb18331e4df2fbdac4009df3c90ef194eea212e5f951c75d9fed156a1c4b3c3be788ec3846beba30bb2da91e2bb1566c132b82a02e508a3147afefe5a2dbbd98e35ddbc4bcf2cbb8ae6f9a8bb9d9f3d400004593122e464c7d6c817e39cf962a05c3dd191bcaf54f5240d4a94abb26ddb6d73acfef71da7a4d866766433dc5ed3d7ebf77dc6a44bab6430d945737fb6a0c3faff05f36a1fb8fd90d9e0238d7d5082e95e437f08efbb14cef872e8975c96721d564b50baf1856f82c083eb795030906b269539512e51084796546c49843fabc53640900e776b41c2256f2d76d8ce84c66c6739b1f4664f763dd4f0ad6c97457b33d6b9766b1c3aeac6419ff48767117e3f2bb7951bb45c300a923cec8286a40c4efcc56e629207d139681c0cabffb6a4fe57e74343c8306f4d752d49add67e0c611a33ff070000000000002a4a2a1d279536d0cea0714f1374b403609ed964c8a5ef251c7fd92d604d4a9e57eb3fcbe34ac6cb647e54aa5edd89c9ebf85951f1ea8ed53b7725d9dea0af20b0414eb77ee48768427d1ca4d1158bbb0db84bc8be64f639de5a7a499aa3de2f82dcf9409b17dabff996016941fb86b2266db0d8252072779756db4649003fad7cc1a0026d30e3daf6e85b7711d7ea4d80f7b032a3025d60065d0000000000000000000000000000002580f8f544d4e167b3a0e469bbf5de438cdaabcdebfb2614451181c1760570cb02eeb86a1936be3e243b9c411d1f9aef6f48ee86b55380ffce569e0f9a36a1e14ba319be6d3c4c9ec931cdfd0fbd4094120b8b4e42f0dbc05a8ed5fbcbad7ca7da2a9bc867e61c657038bc97d3b2604b5d326031d7a212f983627ec16514df881ccb306f932bd5be08d18ab22f1c510000000000000000000000000000a04ecfd3abb51bdf9336b5b0266874243e00002000565611eac5ab6f81c5bef1568c8df17d41f9e4b08e3769f1b8a8ff304e00acf1d40e144eda869c873e8fe877a819140d492cb80e3327e6db47f390cdd8c0c47eb630d25ba5dae218b288f4707ab8d40747a68894e54ed131597a3f792e936713b905ba987fb08dee08f3c90e975234a1d2b227007cc2afc97e8355e9b8b47a0fa080f822000000000000"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$kcm(0x29, 0x7, 0x0) r8 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x800, 0x20000000, @perf_config_ext, 0x1411, 0xc92, 0x3e}, r8, 0x3, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r7, 0x800454d3, &(0x7f0000000400)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)={r7}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNSETVNETLE(r9, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) close(0xffffffffffffffff) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r11, &(0x7f00000000c0), 0xffffff19) close(r10) 15:20:18 executing program 3: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f00000025c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbff0000b408000000fab771172119000020002000004e5e0000388022"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 15:20:18 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) [ 281.349412][T13575] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 281.409814][T13575] netlink: 'syz-executor.1': attribute type 8 has an invalid length. 15:20:18 executing program 0: r0 = socket$kcm(0x29, 0xfffffffffffffffd, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000007ac0)={&(0x7f0000007780)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000079c0)=[{&(0x7f0000007800)=""/130, 0x82}, {&(0x7f00000078c0)}, {&(0x7f0000007900)=""/160, 0xa0}], 0x3, &(0x7f0000007a00)=""/135, 0x87}, 0x140) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0x400000004, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r2, &(0x7f0000000200)="f21c", 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000600)='io.stat\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000480)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000580)=0x7, 0x12) r7 = openat$cgroup_ro(r6, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000100)={r6}) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x7f, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$kcm(0x29, 0x7, 0x0) r8 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x800, 0x20000000, @perf_config_ext, 0x1411, 0xc92, 0x3e}, r8, 0x3, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r7, 0x800454d3, &(0x7f0000000400)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)={r7}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNSETVNETLE(r9, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) close(0xffffffffffffffff) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r11, &(0x7f00000000c0), 0xffffff19) close(r10) [ 281.472035][T13582] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 281.499213][T13582] netlink: 'syz-executor.1': attribute type 8 has an invalid length. 15:20:18 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) 15:20:18 executing program 3: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f00000025c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbff0000b408000000fab771172119000020002000004e5e0000388022"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 15:20:18 executing program 5: r0 = socket$kcm(0x29, 0xfffffffffffffffd, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000007ac0)={&(0x7f0000007780)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000079c0)=[{&(0x7f0000007800)=""/130, 0x82}, {&(0x7f00000078c0)}, {&(0x7f0000007900)=""/160, 0xa0}], 0x3, &(0x7f0000007a00)=""/135, 0x87}, 0x140) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0x400000004, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r2, &(0x7f0000000200)="f21c", 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000600)='io.stat\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000480)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000580)=0x7, 0x12) r7 = openat$cgroup_ro(r6, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000100)={r6}) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x7f, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$kcm(0x29, 0x7, 0x0) r8 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x800, 0x20000000, @perf_config_ext, 0x1411, 0xc92, 0x3e}, r8, 0x3, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r7, 0x800454d3, &(0x7f0000000400)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)={r7}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNSETVNETLE(r9, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) close(0xffffffffffffffff) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r11, &(0x7f00000000c0), 0xffffff19) close(r10) [ 281.618294][ T27] audit: type=1804 audit(1563117618.774:50): pid=13586 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir244984287/syzkaller.zHOvWU/203/memory.events" dev="sda1" ino=16571 res=1 15:20:18 executing program 1: recvmsg(0xffffffffffffffff, 0x0, 0x2040) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) sendmsg(r0, 0x0, 0x50) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.events\x00', 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000002700050ad25a80648c63940d0124fc0010000a400a000000053582c137153e3709000800000000000000", 0x2e}], 0x1}, 0x0) 15:20:19 executing program 3: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f00000025c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbff0000b408000000fab771172119000020002000004e5e0000388022"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 281.827612][ T27] audit: type=1804 audit(1563117618.984:51): pid=13598 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir061707304/syzkaller.OlRix6/190/memory.events" dev="sda1" ino=16489 res=1 [ 281.833783][T13603] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 281.914665][T13603] netlink: 'syz-executor.1': attribute type 8 has an invalid length. 15:20:19 executing program 3: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f00000025c0)=ANY=[@ANYBLOB="3800000000000000290000000400000078040409000000c0073510fbff0000b408000000fab771172119000020002000004e5e0000388022"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 15:20:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2f, 0x46, 0x0, 0x0, 0x48}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) 15:20:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000040), 0xff81) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40000000100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f00000001c0)) 15:20:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e0000001e000503ed0080647e6394f20100d2000500fc3711407f480f0001002700000002000000f88000f01700", 0x2e}], 0x1}, 0x0) 15:20:19 executing program 1: recvmsg(0xffffffffffffffff, 0x0, 0x2040) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) sendmsg(r0, 0x0, 0x50) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.events\x00', 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000002700050ad25a80648c63940d0124fc0010000a400a000000053582c137153e3709000800000000000000", 0x2e}], 0x1}, 0x0) 15:20:19 executing program 3: r0 = socket$kcm(0x2, 0x805, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x4006000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="2e0000003300815fe45a4000187082cf0300a0eb0200000000060000000000000065398ee81fe6c61bb0373fd926", 0x2e}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x202001, 0x0) mkdir(0x0, 0x0) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@ax25={{0x3, @rose}, [@bcast, @default, @remote, @null, @remote, @remote, @default, @bcast]}, 0x80, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) sendmsg(r0, &(0x7f0000000b00)={&(0x7f0000000600)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty, 0x2}}}, 0x80, 0x0, 0x0, &(0x7f0000000680)}, 0x0) [ 282.209338][T13620] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. 15:20:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000040), 0xff81) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40000000100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f00000001c0)) 15:20:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e0000001e000503ed0080647e6394f20100d2000500fc3711407f480f0001002700000002000000f88000f01700", 0x2e}], 0x1}, 0x0) 15:20:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2f, 0x46, 0x0, 0x0, 0x48}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) [ 282.318433][T13623] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 15:20:19 executing program 2: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) close(r0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x101}, 0x0) recvmsg$kcm(r2, &(0x7f000000d540)={&(0x7f000000d380)=@ll, 0x80, &(0x7f000000d440)=[{&(0x7f000000d400)=""/27, 0x1b}], 0x1, &(0x7f000000d480)=""/151, 0x97}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40) 15:20:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2f, 0x46, 0x0, 0x0, 0x48}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) [ 282.509632][T13640] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. 15:20:19 executing program 3: r0 = socket$kcm(0x2, 0x805, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x4006000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="2e0000003300815fe45a4000187082cf0300a0eb0200000000060000000000000065398ee81fe6c61bb0373fd926", 0x2e}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x202001, 0x0) mkdir(0x0, 0x0) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@ax25={{0x3, @rose}, [@bcast, @default, @remote, @null, @remote, @remote, @default, @bcast]}, 0x80, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) sendmsg(r0, &(0x7f0000000b00)={&(0x7f0000000600)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty, 0x2}}}, 0x80, 0x0, 0x0, &(0x7f0000000680)}, 0x0) 15:20:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000040), 0xff81) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40000000100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f00000001c0)) 15:20:19 executing program 1: recvmsg(0xffffffffffffffff, 0x0, 0x2040) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) sendmsg(r0, 0x0, 0x50) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.events\x00', 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000002700050ad25a80648c63940d0124fc0010000a400a000000053582c137153e3709000800000000000000", 0x2e}], 0x1}, 0x0) 15:20:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e0000001e000503ed0080647e6394f20100d2000500fc3711407f480f0001002700000002000000f88000f01700", 0x2e}], 0x1}, 0x0) [ 282.698858][T13649] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 15:20:19 executing program 3: r0 = socket$kcm(0x2, 0x805, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x4006000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="2e0000003300815fe45a4000187082cf0300a0eb0200000000060000000000000065398ee81fe6c61bb0373fd926", 0x2e}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x202001, 0x0) mkdir(0x0, 0x0) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@ax25={{0x3, @rose}, [@bcast, @default, @remote, @null, @remote, @remote, @default, @bcast]}, 0x80, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) sendmsg(r0, &(0x7f0000000b00)={&(0x7f0000000600)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty, 0x2}}}, 0x80, 0x0, 0x0, &(0x7f0000000680)}, 0x0) [ 282.920916][T13663] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. 15:20:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2f, 0x46, 0x0, 0x0, 0x48}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) 15:20:20 executing program 3: r0 = socket$kcm(0x2, 0x805, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x4006000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="2e0000003300815fe45a4000187082cf0300a0eb0200000000060000000000000065398ee81fe6c61bb0373fd926", 0x2e}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x202001, 0x0) mkdir(0x0, 0x0) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@ax25={{0x3, @rose}, [@bcast, @default, @remote, @null, @remote, @remote, @default, @bcast]}, 0x80, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) sendmsg(r0, &(0x7f0000000b00)={&(0x7f0000000600)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty, 0x2}}}, 0x80, 0x0, 0x0, &(0x7f0000000680)}, 0x0) 15:20:20 executing program 1: r0 = socket$kcm(0x2, 0x805, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x4006000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="2e0000003300815fe45a4000187082cf0300a0eb0200000000060000000000000065398ee81fe6c61bb0373fd926", 0x2e}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x202001, 0x0) mkdir(0x0, 0x0) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@ax25={{0x3, @rose}, [@bcast, @default, @remote, @null, @remote, @remote, @default, @bcast]}, 0x80, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) sendmsg(r0, &(0x7f0000000b00)={&(0x7f0000000600)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty, 0x2}}}, 0x80, 0x0, 0x0, &(0x7f0000000680)}, 0x0) 15:20:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000040), 0xff81) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40000000100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f00000001c0)) 15:20:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e0000001e000503ed0080647e6394f20100d2000500fc3711407f480f0001002700000002000000f88000f01700", 0x2e}], 0x1}, 0x0) 15:20:20 executing program 2: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) close(r0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x101}, 0x0) recvmsg$kcm(r2, &(0x7f000000d540)={&(0x7f000000d380)=@ll, 0x80, &(0x7f000000d440)=[{&(0x7f000000d400)=""/27, 0x1b}], 0x1, &(0x7f000000d480)=""/151, 0x97}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40) 15:20:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x7fffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x4, 0x80000000004, 0x3, 0xb}, 0x3c) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000001f40)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x2, 0x2, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x20}, 0xce5a}}}, 0x80, &(0x7f0000000980)=[{&(0x7f00000008c0)="3baf4a5bef9319866e056dbe2ea97978de214e3f06a5d46804e945482a78397f1cac1e2dc868a804611f15311754c85945a99871671079ac81425367390e5ff46750291c39bb71f60b4ac52b4ca05fd23cf1a6eb6747e6b6c7ce36e19ab4299074aab889b2f5fbb4586d92fdbcbbb1da7c92373acf645e6e9a1d9b6f7bd9f051e2563fb80f80acc1ed57ce94c807fb048e670eb9e4a9710436e835804e5b0ec1f826d4e107aed0512d5d434601f5a189d1", 0xb1}], 0x1}, 0x4000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x11, 0x80a, 0xfffffffffffffff7, &(0x7f0000000280)) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'rose0\x00', 0x400}) getpid() r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1c, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8936, &(0x7f0000000000)={r5}) sendmsg$kcm(r0, &(0x7f0000003900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=[{0x10}], 0x10}, 0x0) 15:20:20 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) 15:20:20 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) 15:20:20 executing program 1: r0 = socket$kcm(0x2, 0x805, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x4006000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="2e0000003300815fe45a4000187082cf0300a0eb0200000000060000000000000065398ee81fe6c61bb0373fd926", 0x2e}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x202001, 0x0) mkdir(0x0, 0x0) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@ax25={{0x3, @rose}, [@bcast, @default, @remote, @null, @remote, @remote, @default, @bcast]}, 0x80, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) sendmsg(r0, &(0x7f0000000b00)={&(0x7f0000000600)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty, 0x2}}}, 0x80, 0x0, 0x0, &(0x7f0000000680)}, 0x0) 15:20:20 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x3, 0x88) setsockopt$sock_attach_bpf(r1, 0x1, 0x23, &(0x7f00000001c0), 0x4) close(r1) 15:20:20 executing program 1: r0 = socket$kcm(0x2, 0x805, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x4006000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="2e0000003300815fe45a4000187082cf0300a0eb0200000000060000000000000065398ee81fe6c61bb0373fd926", 0x2e}], 0x1}, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x202001, 0x0) mkdir(0x0, 0x0) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@ax25={{0x3, @rose}, [@bcast, @default, @remote, @null, @remote, @remote, @default, @bcast]}, 0x80, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) sendmsg(r0, &(0x7f0000000b00)={&(0x7f0000000600)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty, 0x2}}}, 0x80, 0x0, 0x0, &(0x7f0000000680)}, 0x0) [ 283.737992][ T27] audit: type=1804 audit(1563117620.894:52): pid=13693 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir890212199/syzkaller.Cd9twu/225/memory.events" dev="sda1" ino=16532 res=1 15:20:20 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x3, 0x88) setsockopt$sock_attach_bpf(r1, 0x1, 0x23, &(0x7f00000001c0), 0x4) close(r1) 15:20:21 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) 15:20:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x7fffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x4, 0x80000000004, 0x3, 0xb}, 0x3c) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000001f40)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x2, 0x2, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x20}, 0xce5a}}}, 0x80, &(0x7f0000000980)=[{&(0x7f00000008c0)="3baf4a5bef9319866e056dbe2ea97978de214e3f06a5d46804e945482a78397f1cac1e2dc868a804611f15311754c85945a99871671079ac81425367390e5ff46750291c39bb71f60b4ac52b4ca05fd23cf1a6eb6747e6b6c7ce36e19ab4299074aab889b2f5fbb4586d92fdbcbbb1da7c92373acf645e6e9a1d9b6f7bd9f051e2563fb80f80acc1ed57ce94c807fb048e670eb9e4a9710436e835804e5b0ec1f826d4e107aed0512d5d434601f5a189d1", 0xb1}], 0x1}, 0x4000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x11, 0x80a, 0xfffffffffffffff7, &(0x7f0000000280)) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'rose0\x00', 0x400}) getpid() r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1c, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8936, &(0x7f0000000000)={r5}) sendmsg$kcm(r0, &(0x7f0000003900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=[{0x10}], 0x10}, 0x0) 15:20:21 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x3, 0x88) setsockopt$sock_attach_bpf(r1, 0x1, 0x23, &(0x7f00000001c0), 0x4) close(r1) [ 284.023762][T13709] __nla_validate_parse: 5 callbacks suppressed [ 284.023828][T13709] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 284.208562][ T27] audit: type=1804 audit(1563117621.364:53): pid=13711 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir890212199/syzkaller.Cd9twu/226/memory.events" dev="sda1" ino=16612 res=1 15:20:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x7fffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x4, 0x80000000004, 0x3, 0xb}, 0x3c) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000001f40)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x2, 0x2, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x20}, 0xce5a}}}, 0x80, &(0x7f0000000980)=[{&(0x7f00000008c0)="3baf4a5bef9319866e056dbe2ea97978de214e3f06a5d46804e945482a78397f1cac1e2dc868a804611f15311754c85945a99871671079ac81425367390e5ff46750291c39bb71f60b4ac52b4ca05fd23cf1a6eb6747e6b6c7ce36e19ab4299074aab889b2f5fbb4586d92fdbcbbb1da7c92373acf645e6e9a1d9b6f7bd9f051e2563fb80f80acc1ed57ce94c807fb048e670eb9e4a9710436e835804e5b0ec1f826d4e107aed0512d5d434601f5a189d1", 0xb1}], 0x1}, 0x4000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x11, 0x80a, 0xfffffffffffffff7, &(0x7f0000000280)) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'rose0\x00', 0x400}) getpid() r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1c, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8936, &(0x7f0000000000)={r5}) sendmsg$kcm(r0, &(0x7f0000003900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=[{0x10}], 0x10}, 0x0) [ 284.625551][T13685] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 284.690424][T13711] syz-executor.3 (13711) used greatest stack depth: 21768 bytes left [ 284.709643][T13685] CPU: 1 PID: 13685 Comm: syz-executor.4 Not tainted 5.2.0+ #40 [ 284.717521][T13685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.727586][T13685] Call Trace: [ 284.730896][T13685] dump_stack+0x172/0x1f0 [ 284.735428][T13685] dump_header+0x10f/0xd33 [ 284.739958][T13685] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 284.745883][T13685] ? ___ratelimit+0x60/0x595 [ 284.745897][T13685] ? do_raw_spin_unlock+0x57/0x270 [ 284.745916][T13685] oom_kill_process.cold+0x10/0x15 [ 284.745937][T13685] out_of_memory+0x7f5/0x12e0 [ 284.760811][T13685] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 284.760850][T13685] ? oom_killer_disable+0x280/0x280 [ 284.776952][T13685] mem_cgroup_out_of_memory+0x1ca/0x230 [ 284.782517][T13685] ? memcg_event_wake+0x230/0x230 [ 284.787561][T13685] ? do_raw_spin_unlock+0x57/0x270 [ 284.792692][T13685] ? _raw_spin_unlock+0x2d/0x50 [ 284.797647][T13685] try_charge+0x1042/0x1410 [ 284.802274][T13685] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 284.808069][T13685] ? percpu_ref_tryget_live+0x111/0x290 [ 284.813656][T13685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.820142][T13685] ? kasan_check_read+0x11/0x20 [ 284.825187][T13685] ? get_mem_cgroup_from_mm+0x156/0x320 [ 284.830839][T13685] mem_cgroup_try_charge+0x259/0x6b0 [ 284.842853][T13685] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 284.848519][T13685] __handle_mm_fault+0x1e1a/0x3eb0 [ 284.853781][T13685] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 284.859453][T13685] ? kasan_check_read+0x11/0x20 [ 284.864425][T13685] handle_mm_fault+0x1b5/0x6b0 [ 284.869214][T13685] __do_page_fault+0x5f4/0xdb0 [ 284.874128][T13685] do_page_fault+0x71/0x57d [ 284.878729][T13685] ? page_fault+0x8/0x30 [ 284.883086][T13685] page_fault+0x1e/0x30 [ 284.887235][T13685] RIP: 0033:0x41115f [ 284.891118][T13685] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 284.910794][T13685] RSP: 002b:00007ffef3c199b0 EFLAGS: 00010206 [ 284.916870][T13685] RAX: 00007f801a668000 RBX: 0000000000020000 RCX: 000000000045986a [ 284.924831][T13685] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 284.932785][T13685] RBP: 00007ffef3c19a90 R08: ffffffffffffffff R09: 0000000000000000 [ 284.940879][T13685] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffef3c19b80 [ 284.948839][T13685] R13: 00007f801a688700 R14: 0000000000000001 R15: 000000000075bfd4 [ 284.976925][T13685] memory: usage 6108kB, limit 0kB, failcnt 9 [ 284.984292][T13685] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 284.991983][T13685] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 285.008421][T13685] Memory cgroup stats for /syz4: cache:8KB rss:2196KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:4KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2196KB inactive_file:4KB active_file:4KB unevictable:0KB 15:20:22 executing program 2: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) close(r0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x101}, 0x0) recvmsg$kcm(r2, &(0x7f000000d540)={&(0x7f000000d380)=@ll, 0x80, &(0x7f000000d440)=[{&(0x7f000000d400)=""/27, 0x1b}], 0x1, &(0x7f000000d480)=""/151, 0x97}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40) [ 285.033058][T13685] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13685,uid=0 [ 285.052524][T13685] Memory cgroup out of memory: Killed process 13685 (syz-executor.4) total-vm:72704kB, anon-rss:2200kB, file-rss:35824kB, shmem-rss:0kB 15:20:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x7fffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x4, 0x80000000004, 0x3, 0xb}, 0x3c) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000001f40)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x2, 0x2, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x20}, 0xce5a}}}, 0x80, &(0x7f0000000980)=[{&(0x7f00000008c0)="3baf4a5bef9319866e056dbe2ea97978de214e3f06a5d46804e945482a78397f1cac1e2dc868a804611f15311754c85945a99871671079ac81425367390e5ff46750291c39bb71f60b4ac52b4ca05fd23cf1a6eb6747e6b6c7ce36e19ab4299074aab889b2f5fbb4586d92fdbcbbb1da7c92373acf645e6e9a1d9b6f7bd9f051e2563fb80f80acc1ed57ce94c807fb048e670eb9e4a9710436e835804e5b0ec1f826d4e107aed0512d5d434601f5a189d1", 0xb1}], 0x1}, 0x4000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x11, 0x80a, 0xfffffffffffffff7, &(0x7f0000000280)) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'rose0\x00', 0x400}) getpid() r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1c, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8936, &(0x7f0000000000)={r5}) sendmsg$kcm(r0, &(0x7f0000003900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=[{0x10}], 0x10}, 0x0) 15:20:22 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x3, 0x88) setsockopt$sock_attach_bpf(r1, 0x1, 0x23, &(0x7f00000001c0), 0x4) close(r1) 15:20:22 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) 15:20:22 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) 15:20:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x7fffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x4, 0x80000000004, 0x3, 0xb}, 0x3c) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000001f40)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x2, 0x2, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x20}, 0xce5a}}}, 0x80, &(0x7f0000000980)=[{&(0x7f00000008c0)="3baf4a5bef9319866e056dbe2ea97978de214e3f06a5d46804e945482a78397f1cac1e2dc868a804611f15311754c85945a99871671079ac81425367390e5ff46750291c39bb71f60b4ac52b4ca05fd23cf1a6eb6747e6b6c7ce36e19ab4299074aab889b2f5fbb4586d92fdbcbbb1da7c92373acf645e6e9a1d9b6f7bd9f051e2563fb80f80acc1ed57ce94c807fb048e670eb9e4a9710436e835804e5b0ec1f826d4e107aed0512d5d434601f5a189d1", 0xb1}], 0x1}, 0x4000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x11, 0x80a, 0xfffffffffffffff7, &(0x7f0000000280)) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'rose0\x00', 0x400}) getpid() r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1c, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8936, &(0x7f0000000000)={r5}) sendmsg$kcm(r0, &(0x7f0000003900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=[{0x10}], 0x10}, 0x0) [ 285.184004][ T8595] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 15:20:22 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 285.228359][ T8595] CPU: 1 PID: 8595 Comm: syz-executor.4 Not tainted 5.2.0+ #40 [ 285.236026][ T8595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.246172][ T8595] Call Trace: [ 285.249486][ T8595] dump_stack+0x172/0x1f0 [ 285.253972][ T8595] dump_header+0x10f/0xd33 [ 285.258407][ T8595] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 285.264323][ T8595] ? ___ratelimit+0x60/0x595 [ 285.268929][ T8595] ? do_raw_spin_unlock+0x57/0x270 [ 285.274093][ T8595] oom_kill_process.cold+0x10/0x15 [ 285.279397][ T8595] out_of_memory+0x7f5/0x12e0 [ 285.284088][ T8595] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 285.290038][ T8595] ? oom_killer_disable+0x280/0x280 [ 285.290066][ T8595] mem_cgroup_out_of_memory+0x1ca/0x230 [ 285.290079][ T8595] ? memcg_event_wake+0x230/0x230 [ 285.290097][ T8595] ? do_raw_spin_unlock+0x57/0x270 [ 285.311505][ T8595] ? _raw_spin_unlock+0x2d/0x50 [ 285.316380][ T8595] try_charge+0x1042/0x1410 [ 285.321027][ T8595] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 285.326583][ T8595] ? find_held_lock+0x35/0x130 [ 285.331362][ T8595] ? get_mem_cgroup_from_mm+0x139/0x320 [ 285.337002][ T8595] ? lock_downgrade+0x920/0x920 [ 285.341846][ T8595] ? percpu_ref_tryget_live+0x111/0x290 [ 285.347567][ T8595] __memcg_kmem_charge_memcg+0x7c/0x130 [ 285.353276][ T8595] ? memcg_kmem_put_cache+0xb0/0xb0 [ 285.358676][ T8595] ? get_mem_cgroup_from_mm+0x156/0x320 [ 285.364210][ T8595] __memcg_kmem_charge+0x136/0x370 [ 285.369324][ T8595] __alloc_pages_nodemask+0x4bd/0x8d0 [ 285.374980][ T8595] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.381494][ T8595] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 285.387201][ T8595] ? copy_process+0x46d0/0x6b00 [ 285.392065][ T8595] ? lockdep_hardirqs_on+0x418/0x5d0 [ 285.397424][ T8595] ? trace_hardirqs_on+0x67/0x220 [ 285.402435][ T8595] ? kasan_check_read+0x11/0x20 [ 285.407276][ T8595] copy_process+0x3f9/0x6b00 [ 285.411958][ T8595] ? __lock_acquire+0x537/0x4af0 [ 285.416970][ T8595] ? _raw_spin_unlock+0x2d/0x50 [ 285.421822][ T8595] ? __cleanup_sighand+0x60/0x60 [ 285.426744][ T8595] ? find_held_lock+0x35/0x130 [ 285.431522][ T8595] _do_fork+0x146/0xf70 [ 285.435672][ T8595] ? copy_init_mm+0x20/0x20 [ 285.440174][ T8595] ? kasan_check_read+0x11/0x20 [ 285.445036][ T8595] ? _copy_to_user+0xc9/0x120 [ 285.449849][ T8595] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 285.456087][ T8595] ? put_timespec64+0xda/0x140 [ 285.460842][ T8595] __x64_sys_clone+0x186/0x250 [ 285.465593][ T8595] ? __ia32_sys_vfork+0xc0/0xc0 [ 285.470435][ T8595] ? lockdep_hardirqs_on+0x418/0x5d0 [ 285.475707][ T8595] ? trace_hardirqs_on+0x67/0x220 [ 285.480721][ T8595] do_syscall_64+0xfd/0x680 [ 285.485239][ T8595] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.491115][ T8595] RIP: 0033:0x457dea [ 285.495000][ T8595] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 285.514676][ T8595] RSP: 002b:00007ffef3c19c00 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 285.523169][ T8595] RAX: ffffffffffffffda RBX: 00007ffef3c19c00 RCX: 0000000000457dea [ 285.531126][ T8595] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 285.539271][ T8595] RBP: 00007ffef3c19c40 R08: 0000000000000001 R09: 0000555555bd7940 [ 285.547321][ T8595] R10: 0000555555bd7c10 R11: 0000000000000246 R12: 0000000000000001 [ 285.555629][ T8595] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffef3c19c90 [ 285.567589][ T8595] memory: usage 3764kB, limit 0kB, failcnt 19 [ 285.574036][ T8595] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 285.581655][ T8595] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 285.588768][ T8595] Memory cgroup stats for /syz4: cache:4KB rss:60KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:60KB inactive_file:0KB active_file:4KB unevictable:0KB [ 285.613274][ T27] audit: type=1804 audit(1563117622.774:54): pid=13744 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir890212199/syzkaller.Cd9twu/227/memory.events" dev="sda1" ino=16566 res=1 [ 285.671091][ T8595] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8595,uid=0 [ 285.689490][ T8595] Memory cgroup out of memory: Killed process 8595 (syz-executor.4) total-vm:72440kB, anon-rss:108kB, file-rss:35776kB, shmem-rss:0kB 15:20:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x7fffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x4, 0x80000000004, 0x3, 0xb}, 0x3c) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000001f40)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x2, 0x2, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x20}, 0xce5a}}}, 0x80, &(0x7f0000000980)=[{&(0x7f00000008c0)="3baf4a5bef9319866e056dbe2ea97978de214e3f06a5d46804e945482a78397f1cac1e2dc868a804611f15311754c85945a99871671079ac81425367390e5ff46750291c39bb71f60b4ac52b4ca05fd23cf1a6eb6747e6b6c7ce36e19ab4299074aab889b2f5fbb4586d92fdbcbbb1da7c92373acf645e6e9a1d9b6f7bd9f051e2563fb80f80acc1ed57ce94c807fb048e670eb9e4a9710436e835804e5b0ec1f826d4e107aed0512d5d434601f5a189d1", 0xb1}], 0x1}, 0x4000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x11, 0x80a, 0xfffffffffffffff7, &(0x7f0000000280)) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'rose0\x00', 0x400}) getpid() r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1c, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8936, &(0x7f0000000000)={r5}) sendmsg$kcm(r0, &(0x7f0000003900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=[{0x10}], 0x10}, 0x0) [ 285.711494][T13742] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 285.723735][ T1048] oom_reaper: reaped process 8595 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 285.750153][T13747] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 285.814448][T13747] CPU: 1 PID: 13747 Comm: syz-executor.0 Not tainted 5.2.0+ #40 [ 285.822126][T13747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.822139][T13747] Call Trace: [ 285.836432][T13747] dump_stack+0x172/0x1f0 [ 285.840798][T13747] dump_header+0x10f/0xd33 [ 285.845235][T13747] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 285.851062][T13747] ? ___ratelimit+0x60/0x595 [ 285.855754][T13747] ? do_raw_spin_unlock+0x57/0x270 [ 285.855778][T13747] oom_kill_process.cold+0x10/0x15 [ 285.855797][T13747] out_of_memory+0x7f5/0x12e0 [ 285.855818][T13747] ? __sched_text_start+0x8/0x8 [ 285.855837][T13747] ? oom_killer_disable+0x280/0x280 [ 285.855867][T13747] mem_cgroup_out_of_memory+0x1ca/0x230 [ 285.886561][T13747] ? memcg_event_wake+0x230/0x230 [ 285.891626][T13747] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 285.897598][T13747] ? cgroup_file_notify+0x140/0x1b0 [ 285.902822][T13747] memory_max_write+0x22f/0x390 [ 285.907693][T13747] ? find_held_lock+0x35/0x130 [ 285.912476][T13747] ? mem_cgroup_write+0x360/0x360 [ 285.917509][T13747] ? lock_acquire+0x16f/0x3f0 [ 285.922201][T13747] ? kernfs_fop_write+0x227/0x480 [ 285.927574][T13747] cgroup_file_write+0x241/0x790 [ 285.932644][T13747] ? mem_cgroup_write+0x360/0x360 [ 285.937677][T13747] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 285.943625][T13747] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 285.949583][T13747] kernfs_fop_write+0x2b8/0x480 [ 285.954552][T13747] __vfs_write+0x8a/0x110 [ 285.959079][T13747] ? kernfs_fop_open+0xd80/0xd80 [ 285.964122][T13747] vfs_write+0x20c/0x580 [ 285.968382][T13747] ksys_write+0x14f/0x290 [ 285.972722][T13747] ? __ia32_sys_read+0xb0/0xb0 [ 285.977583][T13747] ? do_syscall_64+0x26/0x680 [ 285.982353][T13747] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.988600][T13747] ? do_syscall_64+0x26/0x680 [ 285.993466][T13747] __x64_sys_write+0x73/0xb0 [ 285.998210][T13747] do_syscall_64+0xfd/0x680 [ 286.002742][T13747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.008739][T13747] RIP: 0033:0x459819 [ 286.012638][T13747] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.032779][T13747] RSP: 002b:00007f9ad91d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 286.041299][T13747] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 286.049535][T13747] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 15:20:23 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) [ 286.049544][T13747] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 286.049552][T13747] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ad91d86d4 [ 286.049559][T13747] R13: 00000000004c9746 R14: 00000000004e0b00 R15: 00000000ffffffff [ 286.126017][T13747] memory: usage 7196kB, limit 0kB, failcnt 18 [ 286.130717][ T27] audit: type=1804 audit(1563117623.284:55): pid=13757 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir890212199/syzkaller.Cd9twu/228/memory.events" dev="sda1" ino=16581 res=1 [ 286.132527][T13747] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 15:20:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x7fffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x4, 0x80000000004, 0x3, 0xb}, 0x3c) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000001f40)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x2, 0x2, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x20}, 0xce5a}}}, 0x80, &(0x7f0000000980)=[{&(0x7f00000008c0)="3baf4a5bef9319866e056dbe2ea97978de214e3f06a5d46804e945482a78397f1cac1e2dc868a804611f15311754c85945a99871671079ac81425367390e5ff46750291c39bb71f60b4ac52b4ca05fd23cf1a6eb6747e6b6c7ce36e19ab4299074aab889b2f5fbb4586d92fdbcbbb1da7c92373acf645e6e9a1d9b6f7bd9f051e2563fb80f80acc1ed57ce94c807fb048e670eb9e4a9710436e835804e5b0ec1f826d4e107aed0512d5d434601f5a189d1", 0xb1}], 0x1}, 0x4000000) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x11, 0x80a, 0xfffffffffffffff7, &(0x7f0000000280)) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'rose0\x00', 0x400}) getpid() r5 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1c, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8936, &(0x7f0000000000)={r5}) sendmsg$kcm(r0, &(0x7f0000003900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=[{0x10}], 0x10}, 0x0) [ 286.260390][T13747] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 15:20:23 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 286.313302][T13747] Memory cgroup stats for /syz0: cache:4KB rss:2208KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2208KB inactive_file:0KB active_file:4KB unevictable:0KB 15:20:23 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) 15:20:23 executing program 2: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) close(r0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x101}, 0x0) recvmsg$kcm(r2, &(0x7f000000d540)={&(0x7f000000d380)=@ll, 0x80, &(0x7f000000d440)=[{&(0x7f000000d400)=""/27, 0x1b}], 0x1, &(0x7f000000d480)=""/151, 0x97}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40) [ 286.510677][T13747] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=13741,uid=0 [ 286.596167][T13747] Memory cgroup out of memory: Killed process 13747 (syz-executor.0) total-vm:72704kB, anon-rss:2200kB, file-rss:35896kB, shmem-rss:0kB [ 286.623902][ T1048] oom_reaper: reaped process 13747 (syz-executor.0), now anon-rss:0kB, file-rss:34936kB, shmem-rss:0kB 15:20:23 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 286.649504][T13773] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 286.692211][T13773] CPU: 0 PID: 13773 Comm: syz-executor.5 Not tainted 5.2.0+ #40 [ 286.699965][T13773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.699978][T13773] Call Trace: [ 286.713685][T13773] dump_stack+0x172/0x1f0 [ 286.718235][T13773] dump_header+0x10f/0xd33 [ 286.722743][T13773] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 286.722765][T13773] ? ___ratelimit+0x60/0x595 [ 286.722778][T13773] ? do_raw_spin_unlock+0x57/0x270 [ 286.722800][T13773] oom_kill_process.cold+0x10/0x15 [ 286.743809][T13773] out_of_memory+0x7f5/0x12e0 [ 286.748589][T13773] ? find_held_lock+0x35/0x130 [ 286.753469][T13773] ? oom_killer_disable+0x280/0x280 [ 286.758697][T13773] mem_cgroup_out_of_memory+0x1ca/0x230 [ 286.764361][T13773] ? memcg_event_wake+0x230/0x230 [ 286.769587][T13773] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 286.775513][T13773] ? cgroup_file_notify+0x140/0x1b0 [ 286.781008][T13773] memory_max_write+0x22f/0x390 [ 286.786109][T13773] ? find_held_lock+0x35/0x130 [ 286.790952][T13773] ? mem_cgroup_write+0x360/0x360 [ 286.796049][T13773] ? lock_acquire+0x16f/0x3f0 [ 286.800886][T13773] ? kernfs_fop_write+0x227/0x480 [ 286.805984][T13773] cgroup_file_write+0x241/0x790 [ 286.810905][T13773] ? mem_cgroup_write+0x360/0x360 [ 286.815914][T13773] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 286.821621][T13773] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 286.827237][T13773] kernfs_fop_write+0x2b8/0x480 [ 286.832077][T13773] __vfs_write+0x8a/0x110 [ 286.843952][T13773] ? kernfs_fop_open+0xd80/0xd80 [ 286.849039][T13773] vfs_write+0x20c/0x580 [ 286.853281][T13773] ksys_write+0x14f/0x290 [ 286.857599][T13773] ? __ia32_sys_read+0xb0/0xb0 [ 286.862441][T13773] ? do_syscall_64+0x26/0x680 [ 286.867189][T13773] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.873323][T13773] ? do_syscall_64+0x26/0x680 [ 286.878090][T13773] __x64_sys_write+0x73/0xb0 [ 286.882752][T13773] do_syscall_64+0xfd/0x680 [ 286.887343][T13773] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.893308][T13773] RIP: 0033:0x459819 [ 286.897407][T13773] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.917677][T13773] RSP: 002b:00007f6b82b14c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 286.926422][T13773] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 286.934675][T13773] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 286.942630][T13773] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 286.950728][T13773] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b82b156d4 [ 286.958783][T13773] R13: 00000000004c9746 R14: 00000000004e0b00 R15: 00000000ffffffff [ 287.052108][T13773] memory: usage 6460kB, limit 0kB, failcnt 0 [ 287.058361][T13773] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 287.070735][T13773] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 287.079684][T13773] Memory cgroup stats for /syz5: cache:8KB rss:2216KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2216KB inactive_file:0KB active_file:8KB unevictable:0KB 15:20:24 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 287.106711][T13773] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=13765,uid=0 [ 287.140207][T13773] Memory cgroup out of memory: Killed process 13765 (syz-executor.5) total-vm:72704kB, anon-rss:2204kB, file-rss:35848kB, shmem-rss:0kB [ 287.156506][ T8744] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 287.160374][ T1048] oom_reaper: reaped process 13765 (syz-executor.5), now anon-rss:0kB, file-rss:34920kB, shmem-rss:0kB [ 287.176632][ T8744] CPU: 0 PID: 8744 Comm: syz-executor.0 Not tainted 5.2.0+ #40 [ 287.187657][ T8744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.197810][ T8744] Call Trace: [ 287.201121][ T8744] dump_stack+0x172/0x1f0 [ 287.205479][ T8744] dump_header+0x10f/0xd33 [ 287.210104][ T8744] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 287.215923][ T8744] ? ___ratelimit+0x60/0x595 [ 287.220518][ T8744] ? do_raw_spin_unlock+0x57/0x270 [ 287.225647][ T8744] oom_kill_process.cold+0x10/0x15 [ 287.231138][ T8744] out_of_memory+0x7f5/0x12e0 [ 287.235924][ T8744] ? oom_killer_disable+0x280/0x280 [ 287.241233][ T8744] mem_cgroup_out_of_memory+0x1ca/0x230 [ 287.246958][ T8744] ? memcg_event_wake+0x230/0x230 [ 287.252001][ T8744] ? do_raw_spin_unlock+0x57/0x270 [ 287.257129][ T8744] ? _raw_spin_unlock+0x2d/0x50 [ 287.262172][ T8744] try_charge+0x1042/0x1410 [ 287.266946][ T8744] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 287.272501][ T8744] ? find_held_lock+0x35/0x130 [ 287.277278][ T8744] ? get_mem_cgroup_from_mm+0x139/0x320 [ 287.282928][ T8744] ? lock_downgrade+0x920/0x920 [ 287.287880][ T8744] ? percpu_ref_tryget_live+0x111/0x290 [ 287.293548][ T8744] __memcg_kmem_charge_memcg+0x7c/0x130 [ 287.299292][ T8744] ? memcg_kmem_put_cache+0xb0/0xb0 [ 287.304685][ T8744] ? get_mem_cgroup_from_mm+0x156/0x320 [ 287.310248][ T8744] __memcg_kmem_charge+0x136/0x370 [ 287.316324][ T8744] __alloc_pages_nodemask+0x4bd/0x8d0 [ 287.321772][ T8744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.328024][ T8744] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 287.333869][ T8744] ? copy_process+0x46d0/0x6b00 [ 287.338940][ T8744] ? lockdep_hardirqs_on+0x418/0x5d0 [ 287.344242][ T8744] ? trace_hardirqs_on+0x67/0x220 [ 287.349299][ T8744] ? kasan_check_read+0x11/0x20 15:20:24 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 287.354519][ T8744] copy_process+0x3f9/0x6b00 [ 287.359230][ T8744] ? __lock_acquire+0x537/0x4af0 [ 287.364199][ T8744] ? _raw_spin_unlock+0x2d/0x50 [ 287.369072][ T8744] ? __cleanup_sighand+0x60/0x60 [ 287.374120][ T8744] ? find_held_lock+0x35/0x130 [ 287.378924][ T8744] _do_fork+0x146/0xf70 [ 287.383102][ T8744] ? copy_init_mm+0x20/0x20 [ 287.387626][ T8744] ? kasan_check_read+0x11/0x20 [ 287.392579][ T8744] ? _copy_to_user+0xc9/0x120 [ 287.397541][ T8744] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 287.403792][ T8744] ? put_timespec64+0xda/0x140 [ 287.408563][ T8744] __x64_sys_clone+0x186/0x250 [ 287.413338][ T8744] ? __ia32_sys_vfork+0xc0/0xc0 [ 287.418293][ T8744] ? lockdep_hardirqs_on+0x418/0x5d0 [ 287.423771][ T8744] ? trace_hardirqs_on+0x67/0x220 [ 287.428805][ T8744] do_syscall_64+0xfd/0x680 [ 287.433331][ T8744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.439221][ T8744] RIP: 0033:0x457dea [ 287.443114][ T8744] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 287.462820][ T8744] RSP: 002b:00007fffc95c0930 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 287.471236][ T8744] RAX: ffffffffffffffda RBX: 00007fffc95c0930 RCX: 0000000000457dea [ 287.479306][ T8744] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 287.487718][ T8744] RBP: 00007fffc95c0970 R08: 0000000000000001 R09: 0000555555d5a940 [ 287.487730][ T8744] R10: 0000555555d5ac10 R11: 0000000000000246 R12: 0000000000000001 15:20:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) 15:20:24 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 287.487737][ T8744] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fffc95c09c0 [ 287.508627][ T8744] memory: usage 4808kB, limit 0kB, failcnt 26 [ 287.532314][ T8744] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 287.549001][T13782] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 287.573482][ T8744] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 287.583817][ T8744] Memory cgroup stats for /syz0: cache:4KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:56KB inactive_file:4KB active_file:0KB unevictable:0KB [ 287.617784][ T8744] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8744,uid=0 [ 287.624420][T13784] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:20:24 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 287.662199][ T8744] Memory cgroup out of memory: Killed process 8744 (syz-executor.0) total-vm:72440kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB 15:20:24 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 287.709408][ T1048] oom_reaper: reaped process 8744 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 287.736912][ T8599] syz-executor.5 invoked oom-killer: gfp_mask=0x40cd0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 287.798321][ T8599] CPU: 0 PID: 8599 Comm: syz-executor.5 Not tainted 5.2.0+ #40 [ 287.806098][ T8599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.816169][ T8599] Call Trace: [ 287.819467][ T8599] dump_stack+0x172/0x1f0 [ 287.823892][ T8599] dump_header+0x10f/0xd33 [ 287.828393][ T8599] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 287.834201][ T8599] ? ___ratelimit+0x60/0x595 [ 287.838794][ T8599] ? do_raw_spin_unlock+0x57/0x270 [ 287.844214][ T8599] oom_kill_process.cold+0x10/0x15 [ 287.849342][ T8599] out_of_memory+0x7f5/0x12e0 [ 287.854107][ T8599] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 287.859975][ T8599] ? oom_killer_disable+0x280/0x280 [ 287.865189][ T8599] mem_cgroup_out_of_memory+0x1ca/0x230 [ 287.871142][ T8599] ? memcg_event_wake+0x230/0x230 [ 287.876345][ T8599] ? do_raw_spin_unlock+0x57/0x270 [ 287.881468][ T8599] ? _raw_spin_unlock+0x2d/0x50 [ 287.886321][ T8599] try_charge+0x1042/0x1410 [ 287.890820][ T8599] ? should_fail+0x1de/0x852 [ 287.895411][ T8599] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 287.900970][ T8599] ? rcu_read_lock_sched_held+0x110/0x130 [ 287.906875][ T8599] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 287.912439][ T8599] ? ____cache_alloc_node+0x1be/0x1e0 [ 287.917993][ T8599] __memcg_kmem_charge_memcg+0x7c/0x130 [ 287.923625][ T8599] ? memcg_kmem_put_cache+0xb0/0xb0 [ 287.928939][ T8599] ? cache_grow_begin+0x3d6/0x650 [ 287.934318][ T8599] ? lockdep_hardirqs_on+0x418/0x5d0 [ 287.939687][ T8599] ? trace_hardirqs_on+0x67/0x220 [ 287.945013][ T8599] cache_grow_begin+0x402/0x650 [ 287.949876][ T8599] ? __cpuset_node_allowed+0x136/0x540 [ 287.955527][ T8599] fallback_alloc+0x1fd/0x2d0 [ 287.960296][ T8599] ____cache_alloc_node+0x1be/0x1e0 [ 287.965582][ T8599] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 287.972155][ T8599] kmem_cache_alloc+0x1e8/0x6f0 [ 287.977135][ T8599] __d_alloc+0x2e/0x8c0 [ 287.981942][ T8599] d_alloc+0x4d/0x280 [ 287.985930][ T8599] d_alloc_parallel+0xf4/0x1bb0 [ 287.990785][ T8599] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 287.997016][ T8599] ? lookup_fast+0x56c/0x11a0 [ 288.001877][ T8599] ? __d_lookup_rcu+0x6b0/0x6b0 [ 288.006891][ T8599] ? __lock_acquire+0x537/0x4af0 [ 288.011840][ T8599] ? __lock_acquire+0x537/0x4af0 [ 288.016863][ T8599] ? lockdep_init_map+0x1be/0x6d0 [ 288.021963][ T8599] ? lockdep_init_map+0x1be/0x6d0 [ 288.027258][ T8599] __lookup_slow+0x1ab/0x500 [ 288.031977][ T8599] ? vfs_unlink+0x620/0x620 [ 288.036491][ T8599] lookup_slow+0x58/0x80 [ 288.040724][ T8599] path_mountpoint+0x5d2/0x1e60 [ 288.045571][ T8599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.051924][ T8599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.058258][ T8599] ? path_openat+0x46d0/0x46d0 [ 288.063012][ T8599] filename_mountpoint+0x190/0x3c0 [ 288.068127][ T8599] ? rwlock_bug.part.0+0x90/0x90 [ 288.073058][ T8599] ? filename_parentat.isra.0+0x410/0x410 [ 288.078778][ T8599] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 288.085542][ T8599] ? __phys_addr_symbol+0x30/0x70 [ 288.090574][ T8599] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 288.096400][ T8599] ? __check_object_size+0x3d/0x42f [ 288.101724][ T8599] ? strncpy_from_user+0x2ac/0x380 [ 288.106847][ T8599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.113319][ T8599] ? getname_flags+0x277/0x5b0 [ 288.118075][ T8599] user_path_mountpoint_at+0x3a/0x50 [ 288.123359][ T8599] ksys_umount+0x167/0xf00 [ 288.127878][ T8599] ? __ia32_sys_mkdir+0x80/0x80 [ 288.132910][ T8599] ? __detach_mounts+0x320/0x320 [ 288.137843][ T8599] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 288.143454][ T8599] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 288.148908][ T8599] ? do_syscall_64+0x26/0x680 [ 288.153592][ T8599] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.159817][ T8599] ? do_syscall_64+0x26/0x680 [ 288.164487][ T8599] ? lockdep_hardirqs_on+0x418/0x5d0 [ 288.169858][ T8599] __x64_sys_umount+0x54/0x80 [ 288.174550][ T8599] do_syscall_64+0xfd/0x680 [ 288.179296][ T8599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.185186][ T8599] RIP: 0033:0x45c247 [ 288.189227][ T8599] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.209091][ T8599] RSP: 002b:00007fffbd251678 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 288.217604][ T8599] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c247 [ 288.225947][ T8599] RDX: 0000000000403470 RSI: 0000000000000002 RDI: 00007fffbd251720 [ 288.234018][ T8599] RBP: 000000000000024e R08: 0000000000000000 R09: 0000000000000010 [ 288.242092][ T8599] R10: 000000000000000a R11: 0000000000000202 R12: 00007fffbd2527b0 [ 288.250173][ T8599] R13: 00005555571bd940 R14: 0000000000000000 R15: 00007fffbd2527b0 [ 288.259712][ T8599] memory: usage 4064kB, limit 0kB, failcnt 12 [ 288.266856][ T8599] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 288.275100][ T8599] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 288.282249][ T8599] Memory cgroup stats for [ 288.282334][ T8599] /syz5: cache:8KB rss:64KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:64KB inactive_file:4KB active_file:4KB unevictable:0KB [ 288.305223][ T8599] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=8599,uid=0 [ 288.321795][ T8599] Memory cgroup out of memory: Killed process 8599 (syz-executor.5) total-vm:72440kB, anon-rss:112kB, file-rss:35776kB, shmem-rss:0kB [ 288.336946][T13786] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 288.342473][ T1048] oom_reaper: reaped process 8599 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 288.348183][T13786] CPU: 0 PID: 13786 Comm: syz-executor.1 Not tainted 5.2.0+ #40 [ 288.366595][T13786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.366609][T13786] Call Trace: [ 288.380331][T13786] dump_stack+0x172/0x1f0 [ 288.385523][T13786] dump_header+0x10f/0xd33 [ 288.390217][T13786] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 288.396108][T13786] ? ___ratelimit+0x60/0x595 [ 288.400710][T13786] ? do_raw_spin_unlock+0x57/0x270 [ 288.405812][T13786] oom_kill_process.cold+0x10/0x15 [ 288.410995][T13786] out_of_memory+0x7f5/0x12e0 [ 288.415921][T13786] ? oom_killer_disable+0x280/0x280 [ 288.421139][T13786] mem_cgroup_out_of_memory+0x1ca/0x230 [ 288.426675][T13786] ? memcg_event_wake+0x230/0x230 [ 288.431886][T13786] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 288.437678][T13786] ? cgroup_file_notify+0x140/0x1b0 [ 288.442911][T13786] memory_max_write+0x22f/0x390 [ 288.447860][T13786] ? find_held_lock+0x35/0x130 [ 288.452739][T13786] ? mem_cgroup_write+0x360/0x360 [ 288.457752][T13786] ? lock_acquire+0x16f/0x3f0 [ 288.462611][T13786] ? kernfs_fop_write+0x227/0x480 [ 288.467719][T13786] cgroup_file_write+0x241/0x790 [ 288.472836][T13786] ? mem_cgroup_write+0x360/0x360 [ 288.477842][T13786] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 288.483551][T13786] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 288.489167][T13786] kernfs_fop_write+0x2b8/0x480 [ 288.494014][T13786] __vfs_write+0x8a/0x110 [ 288.498419][T13786] ? kernfs_fop_open+0xd80/0xd80 [ 288.503428][T13786] vfs_write+0x20c/0x580 [ 288.507656][T13786] ksys_write+0x14f/0x290 [ 288.512479][T13786] ? __ia32_sys_read+0xb0/0xb0 [ 288.517228][T13786] ? do_syscall_64+0x26/0x680 [ 288.521887][T13786] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.527934][T13786] ? do_syscall_64+0x26/0x680 [ 288.532687][T13786] __x64_sys_write+0x73/0xb0 [ 288.537268][T13786] do_syscall_64+0xfd/0x680 [ 288.541761][T13786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.547718][T13786] RIP: 0033:0x459819 [ 288.551598][T13786] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.572249][T13786] RSP: 002b:00007f7eb3e84c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 288.580887][T13786] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 288.589026][T13786] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 288.597067][T13786] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 288.605205][T13786] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7eb3e856d4 [ 288.613186][T13786] R13: 00000000004c9746 R14: 00000000004e0b00 R15: 00000000ffffffff [ 288.632830][T13786] memory: usage 6836kB, limit 0kB, failcnt 0 [ 288.671102][T13786] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 288.703177][T13786] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 15:20:25 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 288.739435][T13786] Memory cgroup stats for /syz1: cache:0KB rss:2200KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2200KB inactive_file:0KB active_file:0KB unevictable:0KB [ 288.764751][T13786] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=13781,uid=0 [ 288.787392][T13786] Memory cgroup out of memory: Killed process 13781 (syz-executor.1) total-vm:72704kB, anon-rss:2200kB, file-rss:35832kB, shmem-rss:0kB [ 288.802922][ T1048] oom_reaper: reaped process 13781 (syz-executor.1), now anon-rss:0kB, file-rss:34936kB, shmem-rss:0kB [ 288.814321][ T8939] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 288.831801][ T8939] CPU: 0 PID: 8939 Comm: syz-executor.3 Not tainted 5.2.0+ #40 [ 288.846878][ T8939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.856932][ T8939] Call Trace: [ 288.860248][ T8939] dump_stack+0x172/0x1f0 [ 288.864624][ T8939] dump_header+0x10f/0xd33 [ 288.869066][ T8939] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 288.874999][ T8939] ? ___ratelimit+0x60/0x595 [ 288.879590][ T8939] ? do_raw_spin_unlock+0x57/0x270 [ 288.885280][ T8939] oom_kill_process.cold+0x10/0x15 [ 288.903058][ T8939] out_of_memory+0x7f5/0x12e0 [ 288.907832][ T8939] ? oom_killer_disable+0x280/0x280 [ 288.913040][ T8939] mem_cgroup_out_of_memory+0x1ca/0x230 [ 288.918839][ T8939] ? memcg_event_wake+0x230/0x230 [ 288.923953][ T8939] ? do_raw_spin_unlock+0x57/0x270 [ 288.929158][ T8939] ? _raw_spin_unlock+0x2d/0x50 [ 288.934015][ T8939] try_charge+0x1042/0x1410 [ 288.938793][ T8939] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 15:20:26 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 288.944343][ T8939] ? find_held_lock+0x35/0x130 [ 288.949227][ T8939] ? get_mem_cgroup_from_mm+0x139/0x320 [ 288.954787][ T8939] ? lock_downgrade+0x920/0x920 [ 288.959687][ T8939] ? percpu_ref_tryget_live+0x111/0x290 [ 288.965574][ T8939] __memcg_kmem_charge_memcg+0x7c/0x130 [ 288.971299][ T8939] ? memcg_kmem_put_cache+0xb0/0xb0 [ 288.976494][ T8939] ? get_mem_cgroup_from_mm+0x156/0x320 [ 288.982292][ T8939] __memcg_kmem_charge+0x136/0x370 [ 288.987405][ T8939] __alloc_pages_nodemask+0x4bd/0x8d0 [ 288.993160][ T8939] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.999581][ T8939] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 289.005296][ T8939] ? copy_process+0x46d0/0x6b00 [ 289.010141][ T8939] ? lockdep_hardirqs_on+0x418/0x5d0 [ 289.015684][ T8939] ? trace_hardirqs_on+0x67/0x220 [ 289.020695][ T8939] ? kasan_check_read+0x11/0x20 [ 289.025534][ T8939] copy_process+0x3f9/0x6b00 [ 289.030116][ T8939] ? __lock_acquire+0x537/0x4af0 [ 289.035184][ T8939] ? _raw_spin_unlock+0x2d/0x50 [ 289.040228][ T8939] ? __cleanup_sighand+0x60/0x60 [ 289.045157][ T8939] ? find_held_lock+0x35/0x130 [ 289.049931][ T8939] _do_fork+0x146/0xf70 [ 289.054077][ T8939] ? copy_init_mm+0x20/0x20 [ 289.058580][ T8939] ? kasan_check_read+0x11/0x20 [ 289.063565][ T8939] ? _copy_to_user+0xc9/0x120 [ 289.068252][ T8939] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 289.074803][ T8939] ? put_timespec64+0xda/0x140 [ 289.079777][ T8939] __x64_sys_clone+0x186/0x250 [ 289.084556][ T8939] ? __ia32_sys_vfork+0xc0/0xc0 [ 289.089508][ T8939] ? lockdep_hardirqs_on+0x418/0x5d0 [ 289.094780][ T8939] ? trace_hardirqs_on+0x67/0x220 [ 289.099879][ T8939] do_syscall_64+0xfd/0x680 [ 289.104372][ T8939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.110272][ T8939] RIP: 0033:0x457dea [ 289.114179][ T8939] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 289.134410][ T8939] RSP: 002b:00007ffc09a23820 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 289.142816][ T8939] RAX: ffffffffffffffda RBX: 00007ffc09a23820 RCX: 0000000000457dea [ 289.151037][ T8939] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 289.158994][ T8939] RBP: 00007ffc09a23860 R08: 0000000000000001 R09: 0000555555621940 [ 289.167067][ T8939] R10: 0000555555621c10 R11: 0000000000000246 R12: 0000000000000001 [ 289.175033][ T8939] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffc09a238b0 [ 289.188945][ T8939] memory: usage 5512kB, limit 0kB, failcnt 142172 [ 289.196316][ T8939] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 289.204289][ T8939] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 289.211848][ T8939] Memory cgroup stats for /syz3: cache:8KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:56KB inactive_file:4KB active_file:4KB unevictable:0KB [ 289.233036][ T8939] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8939,uid=0 [ 289.253234][ T8939] Memory cgroup out of memory: Killed process 8939 (syz-executor.3) total-vm:72440kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB [ 289.268120][ T1048] oom_reaper: reaped process 8939 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 289.283212][T11049] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 289.295274][T11049] CPU: 1 PID: 11049 Comm: syz-executor.1 Not tainted 5.2.0+ #40 [ 289.303020][T11049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.313171][T11049] Call Trace: [ 289.316626][T11049] dump_stack+0x172/0x1f0 [ 289.321173][T11049] dump_header+0x10f/0xd33 [ 289.325595][T11049] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 289.331690][T11049] ? ___ratelimit+0x60/0x595 [ 289.336361][T11049] ? do_raw_spin_unlock+0x57/0x270 [ 289.341473][T11049] oom_kill_process.cold+0x10/0x15 [ 289.346615][T11049] out_of_memory+0x7f5/0x12e0 [ 289.351482][T11049] ? oom_killer_disable+0x280/0x280 [ 289.356797][T11049] mem_cgroup_out_of_memory+0x1ca/0x230 [ 289.362430][T11049] ? memcg_event_wake+0x230/0x230 [ 289.367457][T11049] ? do_raw_spin_unlock+0x57/0x270 [ 289.372566][T11049] ? _raw_spin_unlock+0x2d/0x50 [ 289.377596][T11049] try_charge+0x1042/0x1410 [ 289.383213][T11049] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 289.388936][T11049] ? percpu_ref_tryget_live+0x111/0x290 [ 289.394678][T11049] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.401089][T11049] ? kasan_check_read+0x11/0x20 [ 289.406027][T11049] ? get_mem_cgroup_from_mm+0x156/0x320 [ 289.411799][T11049] mem_cgroup_try_charge+0x259/0x6b0 [ 289.417518][T11049] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 289.423391][T11049] __handle_mm_fault+0x1e1a/0x3eb0 [ 289.428605][T11049] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 289.434390][T11049] ? kasan_check_read+0x11/0x20 [ 289.439341][T11049] handle_mm_fault+0x1b5/0x6b0 [ 289.444269][T11049] __do_page_fault+0x5f4/0xdb0 [ 289.449154][T11049] do_page_fault+0x71/0x57d [ 289.453807][T11049] ? page_fault+0x8/0x30 [ 289.458036][T11049] page_fault+0x1e/0x30 [ 289.462278][T11049] RIP: 0033:0x403442 [ 289.466302][T11049] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 f9 8d 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 19 43 05 00 48 [ 289.486004][T11049] RSP: 002b:00007fff4065cb80 EFLAGS: 00010246 [ 289.492287][T11049] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000458bd5 [ 289.500345][T11049] RDX: 00007fff4065dc80 RSI: 0000000000000002 RDI: 00007fff4065dd10 [ 289.508307][T11049] RBP: 000000000000015e R08: 0000000000000000 R09: 000000000000000b [ 289.516357][T11049] R10: 0000000000000005 R11: 0000000000000246 R12: 00007fff4065dd10 [ 289.524492][T11049] R13: 00005555572d5940 R14: 0000000000000000 R15: 00007fff4065eda0 [ 289.533322][T11049] memory: usage 4440kB, limit 0kB, failcnt 8 [ 289.539317][T11049] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 289.547007][T11049] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 289.547015][T11049] Memory cgroup stats for /syz1: cache:0KB rss:52KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:52KB inactive_file:0KB active_file:0KB unevictable:0KB [ 289.587949][T11049] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=11049,uid=0 [ 289.608935][T11049] Memory cgroup out of memory: Killed process 11049 (syz-executor.1) total-vm:72440kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB [ 289.629142][ T1048] oom_reaper: reaped process 11049 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 15:20:26 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 289.692512][T13790] IPVS: ftp: loaded support on port[0] = 21 15:20:26 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) 15:20:27 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) 15:20:27 executing program 5: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) close(r0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x101}, 0x0) recvmsg$kcm(r2, &(0x7f000000d540)={&(0x7f000000d380)=@ll, 0x80, &(0x7f000000d440)=[{&(0x7f000000d400)=""/27, 0x1b}], 0x1, &(0x7f000000d480)=""/151, 0x97}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40) 15:20:27 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 291.107450][T13790] chnl_net:caif_netlink_parms(): no params data found [ 291.269694][T13793] IPVS: ftp: loaded support on port[0] = 21 [ 291.290979][T13790] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.324679][T13790] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.332856][T13790] device bridge_slave_0 entered promiscuous mode [ 291.467038][T13790] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.478144][T13790] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.488134][T13790] device bridge_slave_1 entered promiscuous mode [ 291.514700][T13795] IPVS: ftp: loaded support on port[0] = 21 [ 291.665447][T13790] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 291.707536][T13790] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 291.905015][T13790] team0: Port device team_slave_0 added [ 291.984146][T13790] team0: Port device team_slave_1 added [ 292.108479][T13793] chnl_net:caif_netlink_parms(): no params data found [ 292.186015][T13790] device hsr_slave_0 entered promiscuous mode [ 292.223521][T13790] device hsr_slave_1 entered promiscuous mode [ 292.358215][T13795] chnl_net:caif_netlink_parms(): no params data found [ 292.534696][T13793] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.541883][T13793] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.559353][T13793] device bridge_slave_0 entered promiscuous mode [ 292.622709][T13790] 8021q: adding VLAN 0 to HW filter on device bond0 [ 292.632514][T13793] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.649243][T13793] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.660738][T13793] device bridge_slave_1 entered promiscuous mode [ 292.743671][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 292.763749][T13795] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.771054][T13795] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.786583][T13795] device bridge_slave_0 entered promiscuous mode [ 292.812357][T13790] 8021q: adding VLAN 0 to HW filter on device team0 [ 292.866026][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 292.883886][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.895240][T13793] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 292.906472][T13795] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.915427][T13795] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.924218][T13795] device bridge_slave_1 entered promiscuous mode [ 292.988822][T13793] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 293.009997][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.029238][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.042665][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.049956][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.110548][T13795] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 293.128842][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 293.138742][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.147879][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.156681][ T3007] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.163813][ T3007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.181011][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 293.191120][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 293.233278][ T26] device hsr_slave_0 left promiscuous mode [ 293.273270][ T26] device hsr_slave_1 left promiscuous mode [ 293.361430][ T26] device bridge_slave_1 left promiscuous mode [ 293.368007][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.434343][ T26] device bridge_slave_0 left promiscuous mode [ 293.440559][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.371255][ T26] team0 (unregistering): Port device team_slave_1 removed [ 297.398585][ T26] team0 (unregistering): Port device team_slave_0 removed [ 297.428554][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 297.495120][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 297.600443][ T26] bond0 (unregistering): Released all slaves [ 297.722061][T13795] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 297.744295][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 297.762258][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 297.772876][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 297.782733][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 297.798267][T13790] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 297.810632][T13790] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 297.824372][T13793] team0: Port device team_slave_0 added [ 297.841575][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 297.852093][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 297.870408][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 297.889385][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 297.901413][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 297.922443][T13795] team0: Port device team_slave_0 added [ 297.944620][T13793] team0: Port device team_slave_1 added [ 297.950666][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 297.964693][T13795] team0: Port device team_slave_1 added [ 297.985858][T13790] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 298.086039][T13793] device hsr_slave_0 entered promiscuous mode [ 298.113539][T13793] device hsr_slave_1 entered promiscuous mode [ 298.245876][T13795] device hsr_slave_0 entered promiscuous mode [ 298.293683][T13795] device hsr_slave_1 entered promiscuous mode [ 298.345962][T13804] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 298.424436][T13793] 8021q: adding VLAN 0 to HW filter on device bond0 [ 298.465975][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 298.485234][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 298.506224][T13793] 8021q: adding VLAN 0 to HW filter on device team0 [ 298.532549][T13795] 8021q: adding VLAN 0 to HW filter on device bond0 [ 298.549713][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 298.571021][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 298.580181][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.586226][T13805] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 298.587408][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.613162][T13805] CPU: 1 PID: 13805 Comm: syz-executor.4 Not tainted 5.2.0+ #40 [ 298.620911][T13805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.630978][T13805] Call Trace: [ 298.634558][T13805] dump_stack+0x172/0x1f0 [ 298.638363][T13793] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 298.639028][T13805] dump_header+0x10f/0xd33 [ 298.649450][T13793] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 298.654017][T13805] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 298.654032][T13805] ? ___ratelimit+0x60/0x595 [ 298.654044][T13805] ? do_raw_spin_unlock+0x57/0x270 [ 298.654067][T13805] oom_kill_process.cold+0x10/0x15 [ 298.679803][T13793] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 298.679846][T13805] out_of_memory+0x7f5/0x12e0 [ 298.692064][T13805] ? find_held_lock+0x35/0x130 [ 298.692082][T13805] ? oom_killer_disable+0x280/0x280 [ 298.692109][T13805] mem_cgroup_out_of_memory+0x1ca/0x230 [ 298.713168][T13805] ? memcg_event_wake+0x230/0x230 [ 298.718311][T13805] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 298.724137][T13805] ? cgroup_file_notify+0x140/0x1b0 [ 298.729458][T13805] memory_max_write+0x22f/0x390 [ 298.734506][T13805] ? find_held_lock+0x35/0x130 [ 298.739409][T13805] ? mem_cgroup_write+0x360/0x360 [ 298.744535][T13805] ? lock_acquire+0x16f/0x3f0 [ 298.749225][T13805] ? kernfs_fop_write+0x227/0x480 [ 298.754534][T13805] cgroup_file_write+0x241/0x790 [ 298.759575][T13805] ? mem_cgroup_write+0x360/0x360 [ 298.763864][T13811] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 298.764798][T13805] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 298.764823][T13805] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 298.764841][T13805] kernfs_fop_write+0x2b8/0x480 [ 298.764867][T13805] __vfs_write+0x8a/0x110 [ 298.814381][T13805] ? kernfs_fop_open+0xd80/0xd80 [ 298.819336][T13805] vfs_write+0x20c/0x580 [ 298.823698][T13805] ksys_write+0x14f/0x290 [ 298.828128][T13805] ? __ia32_sys_read+0xb0/0xb0 [ 298.840597][T13805] ? do_syscall_64+0x26/0x680 [ 298.845390][T13805] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.851468][T13805] ? do_syscall_64+0x26/0x680 [ 298.856229][T13805] __x64_sys_write+0x73/0xb0 [ 298.860834][T13805] do_syscall_64+0xfd/0x680 [ 298.865656][T13805] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.871534][T13805] RIP: 0033:0x459819 [ 298.875434][T13805] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.895330][T13805] RSP: 002b:00007fcd41c8cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 298.903726][T13805] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 298.911772][T13805] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 298.920330][T13805] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 298.928378][T13805] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd41c8d6d4 [ 298.936772][T13805] R13: 00000000004c9746 R14: 00000000004e0b00 R15: 00000000ffffffff [ 299.004241][T13805] memory: usage 6092kB, limit 0kB, failcnt 22 [ 299.010805][T13805] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 299.019067][T13805] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 299.026538][T13805] Memory cgroup stats for /syz4: cache:0KB rss:2184KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2184KB inactive_file:0KB active_file:0KB unevictable:0KB [ 299.048212][T13805] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13803,uid=0 [ 299.064795][T13805] Memory cgroup out of memory: Killed process 13803 (syz-executor.4) total-vm:72708kB, anon-rss:2192kB, file-rss:35820kB, shmem-rss:0kB [ 299.081966][ T1048] oom_reaper: reaped process 13803 (syz-executor.4), now anon-rss:0kB, file-rss:34916kB, shmem-rss:0kB [ 299.103571][T13811] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 299.115815][T13811] CPU: 0 PID: 13811 Comm: syz-executor.0 Not tainted 5.2.0+ #40 [ 299.123626][T13811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.133770][T13811] Call Trace: [ 299.137317][T13811] dump_stack+0x172/0x1f0 [ 299.141660][T13811] dump_header+0x10f/0xd33 [ 299.146105][T13811] ? oom_kill_process+0x94/0x3f0 [ 299.151359][T13811] oom_kill_process.cold+0x10/0x15 [ 299.156558][T13811] out_of_memory+0x7f5/0x12e0 [ 299.161393][T13811] ? retint_kernel+0x2b/0x2b [ 299.165982][T13811] ? oom_killer_disable+0x280/0x280 [ 299.171277][T13811] mem_cgroup_out_of_memory+0x1ca/0x230 [ 299.176820][T13811] ? memcg_event_wake+0x230/0x230 [ 299.181858][T13811] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 299.187850][T13811] ? cgroup_file_notify+0x140/0x1b0 [ 299.193046][T13811] memory_max_write+0x22f/0x390 [ 299.198082][T13811] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 299.203922][T13811] ? mem_cgroup_write+0x360/0x360 [ 299.209033][T13811] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 299.214582][T13811] cgroup_file_write+0x241/0x790 [ 299.219518][T13811] ? mem_cgroup_write+0x360/0x360 [ 299.224537][T13811] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 299.230271][T13811] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 299.235991][T13811] kernfs_fop_write+0x2b8/0x480 [ 299.240932][T13811] __vfs_write+0x8a/0x110 [ 299.245261][T13811] ? kernfs_fop_open+0xd80/0xd80 [ 299.250399][T13811] vfs_write+0x20c/0x580 [ 299.254666][T13811] ksys_write+0x14f/0x290 [ 299.259198][T13811] ? __ia32_sys_read+0xb0/0xb0 [ 299.264147][T13811] __x64_sys_write+0x73/0xb0 [ 299.268744][T13811] ? do_syscall_64+0x5b/0x680 [ 299.273418][T13811] do_syscall_64+0xfd/0x680 [ 299.277934][T13811] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.283908][T13811] RIP: 0033:0x459819 [ 299.287895][T13811] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.308216][T13811] RSP: 002b:00007f22a3ce5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 299.316772][T13811] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 299.325025][T13811] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 299.333122][T13811] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 299.341179][T13811] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22a3ce66d4 [ 299.349387][T13811] R13: 00000000004c9746 R14: 00000000004e0b00 R15: 00000000ffffffff [ 299.364570][T13811] memory: usage 6916kB, limit 0kB, failcnt 29 [ 299.371048][T13811] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 299.379345][T13811] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 299.386885][T13811] Memory cgroup stats for /syz0: cache:4KB rss:2168KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2168KB inactive_file:0KB active_file:4KB unevictable:0KB [ 299.411227][T13811] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=13810,uid=0 [ 299.428258][T13811] Memory cgroup out of memory: Killed process 13810 (syz-executor.0) total-vm:72576kB, anon-rss:2184kB, file-rss:35848kB, shmem-rss:0kB [ 299.445417][ T1048] oom_reaper: reaped process 13810 (syz-executor.0), now anon-rss:0kB, file-rss:34912kB, shmem-rss:0kB [ 299.637014][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 299.648847][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 299.662116][T13793] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 299.674690][T13793] CPU: 0 PID: 13793 Comm: syz-executor.0 Not tainted 5.2.0+ #40 [ 299.682332][T13793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.692384][T13793] Call Trace: [ 299.695683][T13793] dump_stack+0x172/0x1f0 [ 299.700286][T13793] dump_header+0x10f/0xd33 [ 299.704703][T13793] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 299.710505][T13793] ? ___ratelimit+0x60/0x595 [ 299.715200][T13793] ? do_raw_spin_unlock+0x57/0x270 [ 299.720321][T13793] oom_kill_process.cold+0x10/0x15 [ 299.725532][T13793] out_of_memory+0x7f5/0x12e0 [ 299.730225][T13793] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 299.736293][T13793] ? oom_killer_disable+0x280/0x280 [ 299.741601][T13793] mem_cgroup_out_of_memory+0x1ca/0x230 [ 299.747154][T13793] ? memcg_event_wake+0x230/0x230 [ 299.752178][T13793] ? do_raw_spin_unlock+0x57/0x270 [ 299.757298][T13793] ? _raw_spin_unlock+0x2d/0x50 [ 299.762314][T13793] try_charge+0x1042/0x1410 [ 299.767097][T13793] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 299.772733][T13793] ? percpu_ref_tryget_live+0x111/0x290 [ 299.778425][T13793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.784668][T13793] ? kasan_check_read+0x11/0x20 [ 299.789516][T13793] ? get_mem_cgroup_from_mm+0x156/0x320 [ 299.795078][T13793] mem_cgroup_try_charge+0x259/0x6b0 [ 299.800460][T13793] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 299.806221][T13793] wp_page_copy+0x416/0x1770 [ 299.810813][T13793] ? find_held_lock+0x35/0x130 [ 299.815581][T13793] ? pmd_pfn+0x1d0/0x1d0 [ 299.819913][T13793] ? lock_downgrade+0x920/0x920 [ 299.824778][T13793] ? swp_swapcount+0x540/0x540 [ 299.829888][T13793] ? kasan_check_read+0x11/0x20 [ 299.834830][T13793] ? do_raw_spin_unlock+0x57/0x270 [ 299.839937][T13793] do_wp_page+0x5d8/0x16c0 [ 299.844449][T13793] ? finish_mkwrite_fault+0x540/0x540 [ 299.849830][T13793] __handle_mm_fault+0x22e3/0x3eb0 [ 299.854952][T13793] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 299.860599][T13793] ? kasan_check_read+0x11/0x20 [ 299.865570][T13793] handle_mm_fault+0x1b5/0x6b0 [ 299.870357][T13793] __do_page_fault+0x5f4/0xdb0 [ 299.875203][T13793] do_page_fault+0x71/0x57d [ 299.879993][T13793] ? page_fault+0x8/0x30 [ 299.884585][T13793] page_fault+0x1e/0x30 [ 299.888760][T13793] RIP: 0033:0x4308f6 [ 299.892793][T13793] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 6c 46 64 00 85 c0 0f 84 [ 299.913420][T13793] RSP: 002b:00007fff524d60a0 EFLAGS: 00010206 [ 299.919628][T13793] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 299.927777][T13793] RDX: 00005555560d6930 RSI: 00005555560de970 RDI: 0000000000000003 [ 299.936183][T13793] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555560d5940 [ 299.944399][T13793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 299.952558][T13793] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 299.961544][T13793] memory: usage 4584kB, limit 0kB, failcnt 37 [ 299.962979][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 299.976618][ T3007] bridge0: port 2(bridge_slave_1) entered blocking state 15:20:37 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) close(r0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x101}, 0x0) recvmsg$kcm(r2, &(0x7f000000d540)={&(0x7f000000d380)=@ll, 0x80, &(0x7f000000d440)=[{&(0x7f000000d400)=""/27, 0x1b}], 0x1, &(0x7f000000d480)=""/151, 0x97}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40) 15:20:37 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) 15:20:37 executing program 1: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) close(r0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x101}, 0x0) recvmsg$kcm(r2, &(0x7f000000d540)={&(0x7f000000d380)=@ll, 0x80, &(0x7f000000d440)=[{&(0x7f000000d400)=""/27, 0x1b}], 0x1, &(0x7f000000d480)=""/151, 0x97}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40) 15:20:37 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 299.983925][ T3007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.984542][T13793] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 300.006025][T13793] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 300.009179][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 300.016830][T13793] Memory cgroup stats for /syz0: cache:4KB rss:40KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:4KB unevictable:0KB [ 300.022634][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 300.050977][T13793] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=13793,uid=0 [ 300.073838][T13793] Memory cgroup out of memory: Killed process 13793 (syz-executor.0) total-vm:72444kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 300.094386][ T1048] oom_reaper: reaped process 13793 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 300.113313][T13790] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 300.123742][T13790] CPU: 0 PID: 13790 Comm: syz-executor.4 Not tainted 5.2.0+ #40 [ 300.131415][T13790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.141805][T13790] Call Trace: [ 300.145290][T13790] dump_stack+0x172/0x1f0 [ 300.149627][T13790] dump_header+0x10f/0xd33 [ 300.154061][T13790] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 300.159983][T13790] ? ___ratelimit+0x60/0x595 [ 300.164672][T13790] ? do_raw_spin_unlock+0x57/0x270 [ 300.169890][T13790] oom_kill_process.cold+0x10/0x15 [ 300.175019][T13790] out_of_memory+0x7f5/0x12e0 [ 300.179718][T13790] ? oom_killer_disable+0x280/0x280 [ 300.185043][T13790] mem_cgroup_out_of_memory+0x1ca/0x230 [ 300.190695][T13790] ? memcg_event_wake+0x230/0x230 [ 300.195819][T13790] ? do_raw_spin_unlock+0x57/0x270 [ 300.201120][T13790] ? _raw_spin_unlock+0x2d/0x50 [ 300.205989][T13790] try_charge+0x1042/0x1410 [ 300.210506][T13790] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 300.216103][T13790] ? percpu_ref_tryget_live+0x111/0x290 [ 300.221759][T13790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.229063][T13790] ? kasan_check_read+0x11/0x20 [ 300.233941][T13790] ? get_mem_cgroup_from_mm+0x156/0x320 [ 300.239506][T13790] mem_cgroup_try_charge+0x259/0x6b0 [ 300.244904][T13790] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 300.250644][T13790] wp_page_copy+0x416/0x1770 [ 300.255245][T13790] ? find_held_lock+0x35/0x130 [ 300.260032][T13790] ? pmd_pfn+0x1d0/0x1d0 [ 300.264416][T13790] ? lock_downgrade+0x920/0x920 [ 300.269446][T13790] ? swp_swapcount+0x540/0x540 [ 300.274234][T13790] ? kasan_check_read+0x11/0x20 [ 300.279233][T13790] ? do_raw_spin_unlock+0x57/0x270 [ 300.284648][T13790] do_wp_page+0x5d8/0x16c0 [ 300.289072][T13790] ? finish_mkwrite_fault+0x540/0x540 [ 300.294639][T13790] __handle_mm_fault+0x22e3/0x3eb0 [ 300.299859][T13790] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 300.305443][T13790] ? kasan_check_read+0x11/0x20 [ 300.310568][T13790] handle_mm_fault+0x1b5/0x6b0 [ 300.315520][T13790] __do_page_fault+0x5f4/0xdb0 [ 300.320389][T13790] do_page_fault+0x71/0x57d [ 300.324886][T13790] ? page_fault+0x8/0x30 [ 300.329486][T13790] page_fault+0x1e/0x30 [ 300.333625][T13790] RIP: 0033:0x4308f6 [ 300.337518][T13790] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 6c 46 64 00 85 c0 0f 84 [ 300.357681][T13790] RSP: 002b:00007ffe862a0750 EFLAGS: 00010206 [ 300.364013][T13790] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 300.372093][T13790] RDX: 00005555559b8930 RSI: 00005555559c0970 RDI: 0000000000000003 [ 300.380288][T13790] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555559b7940 [ 300.388337][T13790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 300.396395][T13790] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 300.405379][T13790] memory: usage 3712kB, limit 0kB, failcnt 34 [ 300.406483][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 300.411466][T13790] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 300.420316][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 300.433036][T13790] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 300.435793][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 300.442180][T13790] Memory cgroup stats for /syz4: cache:0KB rss:40KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB [ 300.451310][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 300.478697][T13790] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13790,uid=0 [ 300.479963][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 300.503171][T13790] Memory cgroup out of memory: Killed process 13790 (syz-executor.4) total-vm:72444kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 300.503623][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 300.525359][ T1048] oom_reaper: reaped process 13790 (syz-executor.4), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 300.531441][T13795] 8021q: adding VLAN 0 to HW filter on device team0 [ 300.552258][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 300.573833][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 300.581635][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 300.603749][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 301.004753][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 301.025220][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 301.050526][ T8593] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.057680][ T8593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.093366][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 301.121305][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 301.131878][ T8593] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.139113][ T8593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.154472][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 301.172906][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 301.601873][T13795] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 301.620317][T13795] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 15:20:38 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 301.648426][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 301.674079][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 301.688051][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 301.705752][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 301.724060][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 301.732834][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 301.741731][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 301.751156][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 301.759941][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.769668][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 301.785777][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 301.824911][T13816] IPVS: ftp: loaded support on port[0] = 21 [ 301.837790][T13815] IPVS: ftp: loaded support on port[0] = 21 [ 301.894710][T13795] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 302.149211][T13815] chnl_net:caif_netlink_parms(): no params data found [ 302.189642][T13816] chnl_net:caif_netlink_parms(): no params data found [ 302.413356][T13816] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.420523][T13816] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.449136][T13816] device bridge_slave_0 entered promiscuous mode [ 302.477076][T13815] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.486977][T13815] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.505398][T13815] device bridge_slave_0 entered promiscuous mode [ 302.526528][T13815] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.542088][T13815] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.562026][T13815] device bridge_slave_1 entered promiscuous mode [ 302.571028][T13816] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.580285][T13816] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.601631][T13816] device bridge_slave_1 entered promiscuous mode [ 302.658000][T13815] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 302.680833][T13816] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 302.695145][T13815] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 302.730327][T13816] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 302.788824][ T26] Left network mode [ 302.810427][T13815] team0: Port device team_slave_0 added [ 302.818836][T13815] team0: Port device team_slave_1 added [ 302.827186][T13816] team0: Port device team_slave_0 added [ 304.932878][T13816] team0: Port device team_slave_1 added [ 304.985958][T13815] device hsr_slave_0 entered promiscuous mode [ 305.023550][T13815] device hsr_slave_1 entered promiscuous mode [ 305.888379][T13816] device hsr_slave_0 entered promiscuous mode [ 305.943566][T13816] device hsr_slave_1 entered promiscuous mode [ 307.857872][T13815] 8021q: adding VLAN 0 to HW filter on device bond0 [ 307.883190][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 307.891334][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 307.905767][T13815] 8021q: adding VLAN 0 to HW filter on device team0 [ 307.922679][T13816] 8021q: adding VLAN 0 to HW filter on device bond0 [ 308.713875][T13816] 8021q: adding VLAN 0 to HW filter on device team0 [ 308.720897][ T8601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 308.740600][ T8601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 308.751421][ T8601] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.758642][ T8601] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.776962][ T8601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 308.802255][ T8601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 308.823733][ T8601] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.830919][ T8601] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.849193][ T8601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 308.860852][ T8601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 309.781742][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 309.791209][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 309.809021][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 309.822566][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 309.840674][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 309.851552][ T8935] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.858958][ T8935] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.875794][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 309.892298][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 309.910131][ T8935] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.917339][ T8935] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.934447][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 309.950654][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 309.961320][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 309.979211][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 309.990699][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 310.008231][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 310.022313][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 310.039228][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 310.057358][T13815] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 310.069754][T13815] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 310.754116][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 310.762864][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 310.774154][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 310.812400][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 310.822091][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 310.841325][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 310.850605][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 310.869314][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 310.878731][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 311.672991][T13815] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 311.688522][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 311.703872][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 311.724098][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 311.724612][ T8935] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 311.766615][T13816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 312.923987][T13816] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 312.998104][T13837] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 313.234125][T13837] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 313.253259][T13837] CPU: 1 PID: 13837 Comm: syz-executor.3 Not tainted 5.2.0+ #40 [ 313.261061][T13837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.271129][T13837] Call Trace: [ 313.274450][T13837] dump_stack+0x172/0x1f0 [ 313.278904][T13837] dump_header+0x10f/0xd33 [ 313.283447][T13837] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 313.289275][T13837] ? ___ratelimit+0x60/0x595 [ 313.293906][T13837] ? do_raw_spin_unlock+0x57/0x270 [ 313.299026][T13837] oom_kill_process.cold+0x10/0x15 [ 313.304323][T13837] out_of_memory+0x7f5/0x12e0 [ 313.309283][T13837] ? __sched_text_start+0x8/0x8 [ 313.314255][T13837] ? oom_killer_disable+0x280/0x280 [ 313.319569][T13837] mem_cgroup_out_of_memory+0x1ca/0x230 [ 313.325459][T13837] ? memcg_event_wake+0x230/0x230 [ 313.330776][T13837] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 313.336594][T13837] ? cgroup_file_notify+0x140/0x1b0 [ 313.341826][T13837] memory_max_write+0x22f/0x390 [ 313.346694][T13837] ? mem_cgroup_write+0x360/0x360 [ 313.351728][T13837] ? lock_acquire+0x1ea/0x3f0 [ 313.356521][T13837] cgroup_file_write+0x241/0x790 [ 313.361547][T13837] ? mem_cgroup_write+0x360/0x360 [ 313.366588][T13837] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 313.372321][T13837] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 313.377968][T13837] kernfs_fop_write+0x2b8/0x480 [ 313.382982][T13837] __vfs_write+0x8a/0x110 [ 313.387604][T13837] ? kernfs_fop_open+0xd80/0xd80 [ 313.392564][T13837] vfs_write+0x20c/0x580 [ 313.396832][T13837] ksys_write+0x14f/0x290 [ 313.401189][T13837] ? __ia32_sys_read+0xb0/0xb0 [ 313.406173][T13837] ? do_syscall_64+0x26/0x680 [ 313.410958][T13837] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.417046][T13837] ? do_syscall_64+0x26/0x680 [ 313.421841][T13837] __x64_sys_write+0x73/0xb0 [ 313.426550][T13837] do_syscall_64+0xfd/0x680 [ 313.431190][T13837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.437272][T13837] RIP: 0033:0x459819 [ 313.441277][T13837] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.461586][T13837] RSP: 002b:00007f6a59fe3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 313.470092][T13837] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 313.478172][T13837] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 313.486244][T13837] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 313.494326][T13837] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a59fe46d4 [ 313.502979][T13837] R13: 00000000004c9746 R14: 00000000004e0b00 R15: 00000000ffffffff [ 313.527209][T13837] memory: usage 7592kB, limit 0kB, failcnt 142175 [ 313.534250][T13837] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 313.542018][T13837] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 313.552623][T13837] Memory cgroup stats for /syz3: cache:8KB rss:2172KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:4KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2172KB inactive_file:0KB active_file:8KB unevictable:0KB [ 313.578761][T13837] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=13836,uid=0 [ 313.595365][T13837] Memory cgroup out of memory: Killed process 13836 (syz-executor.3) total-vm:72576kB, anon-rss:2180kB, file-rss:35844kB, shmem-rss:0kB [ 313.612411][ T1048] oom_reaper: reaped process 13836 (syz-executor.3), now anon-rss:0kB, file-rss:34924kB, shmem-rss:0kB [ 313.810218][T13815] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 313.821808][T13815] CPU: 0 PID: 13815 Comm: syz-executor.3 Not tainted 5.2.0+ #40 [ 313.829556][T13815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.840009][T13815] Call Trace: [ 313.843312][T13815] dump_stack+0x172/0x1f0 [ 313.847791][T13815] dump_header+0x10f/0xd33 [ 313.852209][T13815] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 313.858121][T13815] ? ___ratelimit+0x60/0x595 [ 313.862881][T13815] ? do_raw_spin_unlock+0x57/0x270 [ 313.868091][T13815] oom_kill_process.cold+0x10/0x15 [ 313.873200][T13815] out_of_memory+0x7f5/0x12e0 [ 313.877902][T13815] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 313.883793][T13815] ? oom_killer_disable+0x280/0x280 [ 313.889196][T13815] mem_cgroup_out_of_memory+0x1ca/0x230 [ 313.894742][T13815] ? memcg_event_wake+0x230/0x230 [ 313.899850][T13815] ? do_raw_spin_unlock+0x57/0x270 [ 313.904966][T13815] ? _raw_spin_unlock+0x2d/0x50 [ 313.909814][T13815] try_charge+0x1042/0x1410 [ 313.914317][T13815] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 313.919860][T13815] ? percpu_ref_tryget_live+0x111/0x290 [ 313.925499][T13815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.931740][T13815] ? kasan_check_read+0x11/0x20 [ 313.936893][T13815] ? get_mem_cgroup_from_mm+0x156/0x320 [ 313.942548][T13815] mem_cgroup_try_charge+0x259/0x6b0 [ 313.948383][T13815] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 313.954136][T13815] wp_page_copy+0x416/0x1770 [ 313.959001][T13815] ? find_held_lock+0x35/0x130 [ 313.963771][T13815] ? pmd_pfn+0x1d0/0x1d0 [ 313.968017][T13815] ? lock_downgrade+0x920/0x920 [ 313.972892][T13815] ? swp_swapcount+0x540/0x540 [ 313.977717][T13815] ? kasan_check_read+0x11/0x20 [ 313.982719][T13815] ? do_raw_spin_unlock+0x57/0x270 [ 313.987869][T13815] do_wp_page+0x5d8/0x16c0 [ 313.992379][T13815] ? finish_mkwrite_fault+0x540/0x540 [ 313.997859][T13815] __handle_mm_fault+0x22e3/0x3eb0 [ 314.002980][T13815] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 314.008683][T13815] ? kasan_check_read+0x11/0x20 [ 314.013709][T13815] handle_mm_fault+0x1b5/0x6b0 [ 314.018500][T13815] __do_page_fault+0x5f4/0xdb0 [ 314.023381][T13815] do_page_fault+0x71/0x57d [ 314.027970][T13815] ? page_fault+0x8/0x30 [ 314.032197][T13815] page_fault+0x1e/0x30 [ 314.036343][T13815] RIP: 0033:0x4308f6 [ 314.040386][T13815] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 6c 46 64 00 85 c0 0f 84 [ 314.060435][T13815] RSP: 002b:00007ffe8ba4c040 EFLAGS: 00010206 [ 314.066693][T13815] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 314.074959][T13815] RDX: 0000555555a94930 RSI: 0000555555a9c970 RDI: 0000000000000003 [ 314.083131][T13815] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555555a93940 [ 314.091183][T13815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 314.099268][T13815] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 314.120074][T13815] memory: usage 5252kB, limit 0kB, failcnt 142183 [ 314.126986][T13815] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 314.136515][T13815] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 314.148946][T13815] Memory cgroup stats for /syz3: cache:8KB rss:40KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:4KB active_file:4KB unevictable:0KB [ 314.170535][T13815] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=13815,uid=0 [ 314.186666][T13815] Memory cgroup out of memory: Killed process 13815 (syz-executor.3) total-vm:72444kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB [ 314.201946][ T1048] oom_reaper: reaped process 13815 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 318.993486][ T26] device hsr_slave_0 left promiscuous mode [ 319.033261][ T26] device hsr_slave_1 left promiscuous mode [ 319.113491][ T26] device bridge_slave_1 left promiscuous mode [ 319.119933][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.174165][ T26] device bridge_slave_0 left promiscuous mode [ 319.180667][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.273479][ T26] device hsr_slave_0 left promiscuous mode [ 319.322196][ T26] device hsr_slave_1 left promiscuous mode [ 319.403567][ T26] device bridge_slave_1 left promiscuous mode [ 319.409906][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.464175][ T26] device bridge_slave_0 left promiscuous mode [ 319.470401][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.573465][ T26] device hsr_slave_0 left promiscuous mode [ 319.622131][ T26] device hsr_slave_1 left promiscuous mode [ 319.703464][ T26] device bridge_slave_1 left promiscuous mode [ 319.709700][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.764934][ T26] device bridge_slave_0 left promiscuous mode [ 319.771342][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.873621][ T26] device hsr_slave_0 left promiscuous mode [ 319.915896][ T26] device hsr_slave_1 left promiscuous mode [ 319.993499][ T26] device bridge_slave_1 left promiscuous mode [ 320.013268][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.054193][ T26] device bridge_slave_0 left promiscuous mode [ 320.060537][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.153545][ T26] device hsr_slave_0 left promiscuous mode [ 320.193277][ T26] device hsr_slave_1 left promiscuous mode [ 320.283459][ T26] device bridge_slave_1 left promiscuous mode [ 320.289697][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.344214][ T26] device bridge_slave_0 left promiscuous mode [ 320.350718][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.443987][ T26] device hsr_slave_0 left promiscuous mode [ 320.493259][ T26] device hsr_slave_1 left promiscuous mode [ 320.573564][ T26] device bridge_slave_1 left promiscuous mode [ 320.579952][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.644168][ T26] device bridge_slave_0 left promiscuous mode [ 320.650637][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.897926][ T26] team0 (unregistering): Port device team_slave_1 removed [ 340.920482][ T26] team0 (unregistering): Port device team_slave_0 removed [ 340.951955][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 341.019256][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 341.160890][ T26] bond0 (unregistering): Released all slaves [ 341.301915][ T26] team0 (unregistering): Port device team_slave_1 removed [ 341.329368][ T26] team0 (unregistering): Port device team_slave_0 removed [ 341.353179][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 341.402171][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 341.522839][ T26] bond0 (unregistering): Released all slaves [ 341.648695][ T26] team0 (unregistering): Port device team_slave_1 removed [ 341.662458][ T26] team0 (unregistering): Port device team_slave_0 removed [ 341.684939][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 341.749839][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 341.916283][ T26] bond0 (unregistering): Released all slaves [ 342.081940][ T26] team0 (unregistering): Port device team_slave_1 removed [ 342.110518][ T26] team0 (unregistering): Port device team_slave_0 removed [ 342.140930][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 342.210039][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 342.354392][ T26] bond0 (unregistering): Released all slaves [ 342.492123][ T26] team0 (unregistering): Port device team_slave_1 removed [ 342.517769][ T26] team0 (unregistering): Port device team_slave_0 removed [ 342.536020][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 342.609565][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 342.779022][ T26] bond0 (unregistering): Released all slaves [ 342.980967][ T26] team0 (unregistering): Port device team_slave_1 removed [ 343.009217][ T26] team0 (unregistering): Port device team_slave_0 removed [ 343.032382][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 343.109274][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 343.242980][ T26] bond0 (unregistering): Released all slaves [ 348.413479][ T26] device hsr_slave_0 left promiscuous mode [ 348.453311][ T26] device hsr_slave_1 left promiscuous mode [ 348.533551][ T26] device bridge_slave_1 left promiscuous mode [ 348.540021][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.594321][ T26] device bridge_slave_0 left promiscuous mode [ 348.601833][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.178701][ T26] team0 (unregistering): Port device team_slave_1 removed [ 350.192021][ T26] team0 (unregistering): Port device team_slave_0 removed [ 350.204168][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 350.288734][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 350.378057][ T26] bond0 (unregistering): Released all slaves 15:21:27 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0x2, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) 15:21:27 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) close(r0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x101}, 0x0) recvmsg$kcm(r2, &(0x7f000000d540)={&(0x7f000000d380)=@ll, 0x80, &(0x7f000000d440)=[{&(0x7f000000d400)=""/27, 0x1b}], 0x1, &(0x7f000000d480)=""/151, 0x97}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40) 15:21:27 executing program 1: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) close(r0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x101}, 0x0) recvmsg$kcm(r2, &(0x7f000000d540)={&(0x7f000000d380)=@ll, 0x80, &(0x7f000000d440)=[{&(0x7f000000d400)=""/27, 0x1b}], 0x1, &(0x7f000000d480)=""/151, 0x97}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40) 15:21:27 executing program 5: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) close(r0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x101}, 0x0) recvmsg$kcm(r2, &(0x7f000000d540)={&(0x7f000000d380)=@ll, 0x80, &(0x7f000000d440)=[{&(0x7f000000d400)=""/27, 0x1b}], 0x1, &(0x7f000000d480)=""/151, 0x97}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40) 15:21:27 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x3, 0x4, 0x20000000001009}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)}, 0x10) 15:21:27 executing program 0: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) close(r0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x101}, 0x0) recvmsg$kcm(r2, &(0x7f000000d540)={&(0x7f000000d380)=@ll, 0x80, &(0x7f000000d440)=[{&(0x7f000000d400)=""/27, 0x1b}], 0x1, &(0x7f000000d480)=""/151, 0x97}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40) 15:21:28 executing program 1: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) close(r0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x101}, 0x0) recvmsg$kcm(r2, &(0x7f000000d540)={&(0x7f000000d380)=@ll, 0x80, &(0x7f000000d440)=[{&(0x7f000000d400)=""/27, 0x1b}], 0x1, &(0x7f000000d480)=""/151, 0x97}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40) 15:21:29 executing program 5: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) close(r0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x101}, 0x0) recvmsg$kcm(r2, &(0x7f000000d540)={&(0x7f000000d380)=@ll, 0x80, &(0x7f000000d440)=[{&(0x7f000000d400)=""/27, 0x1b}], 0x1, &(0x7f000000d480)=""/151, 0x97}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40) [ 352.399463][T13879] IPVS: ftp: loaded support on port[0] = 21 [ 352.449492][T13880] IPVS: ftp: loaded support on port[0] = 21 [ 352.472806][T13881] IPVS: ftp: loaded support on port[0] = 21 [ 352.617117][T13882] IPVS: ftp: loaded support on port[0] = 21 15:21:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="3800000000000000290000000400000078040401772c302bc97898dbff0000b408000000fab771172119000020c49481a84e5e0000388022"], 0x38}, 0x8000) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280), 0xe803}], 0x1}, 0x0) 15:21:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="3800000000000000290000000400000078040401772c302bc97898dbff0000b408000000fab771172119000020c49481a84e5e0000388022"], 0x38}, 0x8000) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280), 0xe803}], 0x1}, 0x0) 15:21:30 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="3800000000000000290000000400000078040401772c302bc97898dbff0000b408000000fab771172119000020c49481a84e5e0000388022"], 0x38}, 0x8000) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280), 0xe803}], 0x1}, 0x0) [ 353.117061][T13879] chnl_net:caif_netlink_parms(): no params data found 15:21:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="3800000000000000290000000400000078040401772c302bc97898dbff0000b408000000fab771172119000020c49481a84e5e0000388022"], 0x38}, 0x8000) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280), 0xe803}], 0x1}, 0x0) [ 353.208956][T13880] chnl_net:caif_netlink_parms(): no params data found [ 353.244845][T13881] chnl_net:caif_netlink_parms(): no params data found [ 353.338215][T13879] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.357727][T13879] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.367843][T13879] device bridge_slave_0 entered promiscuous mode [ 353.441775][T13879] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.452515][T13879] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.476773][T13879] device bridge_slave_1 entered promiscuous mode [ 353.495232][T13881] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.503050][T13881] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.522260][T13881] device bridge_slave_0 entered promiscuous mode [ 353.545336][T13880] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.552948][T13880] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.567332][T13880] device bridge_slave_0 entered promiscuous mode [ 353.578351][T13882] chnl_net:caif_netlink_parms(): no params data found [ 353.589477][T13881] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.597309][T13881] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.605632][T13881] device bridge_slave_1 entered promiscuous mode [ 353.615107][T13879] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 353.627167][T13879] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 353.637376][T13880] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.645737][T13880] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.655689][T13880] device bridge_slave_1 entered promiscuous mode [ 353.684491][T13881] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 353.718884][T13880] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 353.751178][T13881] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 353.763183][T13880] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 353.791917][T13879] team0: Port device team_slave_0 added [ 353.809152][T13879] team0: Port device team_slave_1 added [ 353.828328][T13882] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.837348][T13882] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.846210][T13882] device bridge_slave_0 entered promiscuous mode [ 353.860294][T13881] team0: Port device team_slave_0 added [ 353.876835][T13882] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.885838][T13882] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.895660][T13882] device bridge_slave_1 entered promiscuous mode [ 353.904908][T13881] team0: Port device team_slave_1 added [ 353.923886][T13882] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 353.935436][T13880] team0: Port device team_slave_0 added [ 353.960476][T13880] team0: Port device team_slave_1 added [ 353.972506][T13882] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 354.020437][T13882] team0: Port device team_slave_0 added [ 354.096119][T13879] device hsr_slave_0 entered promiscuous mode [ 354.143773][T13879] device hsr_slave_1 entered promiscuous mode [ 354.211306][T13882] team0: Port device team_slave_1 added [ 354.255389][T13880] device hsr_slave_0 entered promiscuous mode [ 354.313638][T13880] device hsr_slave_1 entered promiscuous mode [ 354.455205][T13881] device hsr_slave_0 entered promiscuous mode [ 354.523718][T13881] device hsr_slave_1 entered promiscuous mode [ 354.656358][T13882] device hsr_slave_0 entered promiscuous mode [ 354.713767][T13882] device hsr_slave_1 entered promiscuous mode [ 354.839222][T13879] 8021q: adding VLAN 0 to HW filter on device bond0 [ 354.860566][T13881] 8021q: adding VLAN 0 to HW filter on device bond0 [ 354.870788][T13880] 8021q: adding VLAN 0 to HW filter on device bond0 [ 354.891082][T13879] 8021q: adding VLAN 0 to HW filter on device team0 [ 354.906533][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 354.916116][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 354.934863][T13880] 8021q: adding VLAN 0 to HW filter on device team0 [ 355.066158][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 355.076514][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 355.085770][ T3007] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.093708][ T3007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 355.101594][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 355.109723][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 355.118396][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 355.127781][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 355.137687][ T3007] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.145592][ T3007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 355.156480][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 355.166086][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 355.175128][ T3007] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.182761][ T3007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 355.208630][T13881] 8021q: adding VLAN 0 to HW filter on device team0 [ 355.239970][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 355.248740][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 355.257834][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 355.267032][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 355.276484][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 355.286246][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 355.295493][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 355.305289][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 355.314814][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 355.324700][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 355.334646][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 355.344113][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 355.352911][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 355.362020][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 355.371684][T13850] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.379975][T13850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 355.390451][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 355.399482][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 355.409888][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 355.495370][T13882] 8021q: adding VLAN 0 to HW filter on device bond0 [ 355.505934][T13879] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 355.515482][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 355.525650][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 355.534919][ T3502] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.543732][ T3502] bridge0: port 1(bridge_slave_0) entered forwarding state [ 355.552310][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 355.564944][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 355.576400][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 355.585063][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 355.594581][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 355.614847][T13882] 8021q: adding VLAN 0 to HW filter on device team0 [ 355.692005][T13880] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 355.704100][T13880] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 355.717102][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 355.726849][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 355.735673][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 355.747102][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 355.756369][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 355.766079][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 355.775766][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 355.786070][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 355.795303][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 355.806738][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 355.815280][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 355.825545][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 355.835097][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.842900][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 355.937707][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 355.948025][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 355.958196][ T3502] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.965684][ T3502] bridge0: port 1(bridge_slave_0) entered forwarding state [ 355.977319][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 355.986781][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 355.996636][ T3502] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.004460][ T3502] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.012649][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 356.029500][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 356.039243][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 356.048648][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 356.058377][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 356.068153][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 356.078427][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 356.086993][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 356.111837][T13880] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 356.195244][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 356.208411][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 356.230802][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 356.239889][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 356.248478][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 356.257409][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 356.266775][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 356.275680][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 356.289376][T13882] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 356.303784][T13882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 356.382648][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 356.392177][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 356.401159][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 356.417580][T13879] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 356.428227][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 356.437674][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 356.573932][T13881] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 356.586647][T13881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 356.602044][T13828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 356.611041][T13828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 356.630778][T13882] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 356.925979][T13881] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 357.375524][T13933] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 357.616023][T13933] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 357.640587][T13933] CPU: 1 PID: 13933 Comm: syz-executor.2 Not tainted 5.2.0+ #40 [ 357.648262][T13933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.658501][T13933] Call Trace: [ 357.661837][T13933] dump_stack+0x172/0x1f0 [ 357.666198][T13933] dump_header+0x10f/0xd33 [ 357.670629][T13933] ? oom_kill_process+0x94/0x3f0 [ 357.675804][T13933] oom_kill_process.cold+0x10/0x15 [ 357.680997][T13933] out_of_memory+0x7f5/0x12e0 [ 357.685875][T13933] ? retint_kernel+0x2b/0x2b [ 357.690562][T13933] ? oom_killer_disable+0x280/0x280 [ 357.695800][T13933] mem_cgroup_out_of_memory+0x1ca/0x230 [ 357.701361][T13933] ? memcg_event_wake+0x230/0x230 [ 357.706497][T13933] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 357.712405][T13933] ? cgroup_file_notify+0x140/0x1b0 [ 357.717705][T13933] memory_max_write+0x22f/0x390 [ 357.722570][T13933] ? mem_cgroup_write+0x360/0x360 [ 357.727600][T13933] ? lock_acquire+0x16f/0x3f0 [ 357.732303][T13933] ? kernfs_fop_write+0x227/0x480 [ 357.737348][T13933] cgroup_file_write+0x241/0x790 [ 357.742405][T13933] ? mem_cgroup_write+0x360/0x360 [ 357.747591][T13933] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 357.753328][T13933] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 357.759035][T13933] kernfs_fop_write+0x2b8/0x480 [ 357.765137][T13933] __vfs_write+0x8a/0x110 [ 357.778948][T13933] ? kernfs_fop_open+0xd80/0xd80 [ 357.783929][T13933] vfs_write+0x20c/0x580 [ 357.788310][T13933] ksys_write+0x14f/0x290 [ 357.792656][T13933] ? __ia32_sys_read+0xb0/0xb0 [ 357.797441][T13933] ? do_syscall_64+0x26/0x680 [ 357.802227][T13933] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 357.808307][T13933] ? do_syscall_64+0x26/0x680 [ 357.813164][T13933] __x64_sys_write+0x73/0xb0 [ 357.817762][T13933] do_syscall_64+0xfd/0x680 [ 357.822282][T13933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 357.828187][T13933] RIP: 0033:0x459819 [ 357.832095][T13933] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 357.851823][T13933] RSP: 002b:00007f4718c84c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 357.860247][T13933] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 357.868226][T13933] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 357.876377][T13933] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 357.884368][T13933] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4718c856d4 [ 357.892432][T13933] R13: 00000000004c9746 R14: 00000000004e0b00 R15: 00000000ffffffff [ 357.927463][T13933] memory: usage 9172kB, limit 0kB, failcnt 268838 [ 357.937948][T13933] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 357.946602][T13933] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 357.961655][T13933] Memory cgroup stats for /syz2: cache:8KB rss:2180KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2180KB inactive_file:4KB active_file:4KB unevictable:0KB [ 358.005550][T13933] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=13932,uid=0 [ 358.032950][T13933] Memory cgroup out of memory: Killed process 13932 (syz-executor.2) total-vm:72708kB, anon-rss:2188kB, file-rss:35836kB, shmem-rss:0kB [ 358.065109][ T1048] oom_reaper: reaped process 13932 (syz-executor.2), now anon-rss:0kB, file-rss:34916kB, shmem-rss:0kB 15:21:35 executing program 0: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) close(r0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x101}, 0x0) recvmsg$kcm(r2, &(0x7f000000d540)={&(0x7f000000d380)=@ll, 0x80, &(0x7f000000d440)=[{&(0x7f000000d400)=""/27, 0x1b}], 0x1, &(0x7f000000d480)=""/151, 0x97}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40) [ 358.234746][T13882] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 358.245893][T13882] CPU: 0 PID: 13882 Comm: syz-executor.2 Not tainted 5.2.0+ #40 [ 358.253529][T13882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.263731][T13882] Call Trace: [ 358.267113][T13882] dump_stack+0x172/0x1f0 [ 358.271432][T13882] dump_header+0x10f/0xd33 [ 358.275874][T13882] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 358.281661][T13882] ? ___ratelimit+0x60/0x595 [ 358.286233][T13882] ? do_raw_spin_unlock+0x57/0x270 [ 358.291345][T13882] oom_kill_process.cold+0x10/0x15 [ 358.296548][T13882] out_of_memory+0x7f5/0x12e0 [ 358.301214][T13882] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 358.307021][T13882] ? oom_killer_disable+0x280/0x280 [ 358.312218][T13882] mem_cgroup_out_of_memory+0x1ca/0x230 [ 358.317841][T13882] ? memcg_event_wake+0x230/0x230 [ 358.322876][T13882] ? do_raw_spin_unlock+0x57/0x270 [ 358.328162][T13882] ? _raw_spin_unlock+0x2d/0x50 [ 358.332997][T13882] try_charge+0x1042/0x1410 [ 358.337578][T13882] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 358.343113][T13882] ? percpu_ref_tryget_live+0x111/0x290 [ 358.348646][T13882] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 358.354987][T13882] ? kasan_check_read+0x11/0x20 [ 358.359829][T13882] ? get_mem_cgroup_from_mm+0x156/0x320 [ 358.365384][T13882] mem_cgroup_try_charge+0x259/0x6b0 [ 358.370659][T13882] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 358.376279][T13882] wp_page_copy+0x416/0x1770 [ 358.381112][T13882] ? find_held_lock+0x35/0x130 [ 358.385873][T13882] ? pmd_pfn+0x1d0/0x1d0 [ 358.390254][T13882] ? lock_downgrade+0x920/0x920 [ 358.395095][T13882] ? swp_swapcount+0x540/0x540 [ 358.399844][T13882] ? kasan_check_read+0x11/0x20 [ 358.404677][T13882] ? do_raw_spin_unlock+0x57/0x270 [ 358.409898][T13882] do_wp_page+0x5d8/0x16c0 [ 358.414480][T13882] ? finish_mkwrite_fault+0x540/0x540 [ 358.419844][T13882] __handle_mm_fault+0x22e3/0x3eb0 [ 358.425038][T13882] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 358.430661][T13882] ? kasan_check_read+0x11/0x20 [ 358.435621][T13882] handle_mm_fault+0x1b5/0x6b0 [ 358.440462][T13882] __do_page_fault+0x5f4/0xdb0 [ 358.445215][T13882] do_page_fault+0x71/0x57d [ 358.449698][T13882] ? page_fault+0x8/0x30 [ 358.454067][T13882] page_fault+0x1e/0x30 [ 358.458207][T13882] RIP: 0033:0x4308f6 [ 358.462088][T13882] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 6c 46 64 00 85 c0 0f 84 [ 358.481775][T13882] RSP: 002b:00007ffcb34c2270 EFLAGS: 00010206 [ 358.487912][T13882] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 358.495867][T13882] RDX: 0000555556e0f930 RSI: 0000555556e17970 RDI: 0000000000000003 [ 358.503823][T13882] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556e0e940 [ 358.511776][T13882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 358.519844][T13882] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 358.541704][T13882] memory: usage 6796kB, limit 0kB, failcnt 268846 [ 358.557044][T13882] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 358.574093][T13882] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 15:21:35 executing program 4: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) close(r0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x101}, 0x0) recvmsg$kcm(r2, &(0x7f000000d540)={&(0x7f000000d380)=@ll, 0x80, &(0x7f000000d440)=[{&(0x7f000000d400)=""/27, 0x1b}], 0x1, &(0x7f000000d480)=""/151, 0x97}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40) 15:21:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="3800000000000000290000000400000078040401772c302bc97898dbff0000b408000000fab771172119000020c49481a84e5e0000388022"], 0x38}, 0x8000) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280), 0xe803}], 0x1}, 0x0) 15:21:35 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="3800000000000000290000000400000078040401772c302bc97898dbff0000b408000000fab771172119000020c49481a84e5e0000388022"], 0x38}, 0x8000) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280), 0xe803}], 0x1}, 0x0) 15:21:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x3, 0x4, 0x20000000001009}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)}, 0x10) 15:21:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="1b0000001e008104e0e8bd6efb080003000e001400130000000600", 0x1b}], 0x1}, 0x0) [ 358.581491][T13882] Memory cgroup stats for /syz2: cache:8KB rss:40KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:4KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:8KB unevictable:0KB [ 358.614839][T13882] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=13882,uid=0 15:21:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x3, 0x4, 0x20000000001009}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)}, 0x10) [ 358.653444][T13882] Memory cgroup out of memory: Killed process 13882 (syz-executor.2) total-vm:72444kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB 15:21:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60f9, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x1ff, 0x0, 0x3fac, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(r1, &(0x7f0000000040), 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, 0x0) 15:21:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x3, 0x4, 0x20000000001009}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)}, 0x10) 15:21:36 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="3800000000000000290000000400000078040401772c302bc97898dbff0000b408000000fab771172119000020c49481a84e5e0000388022"], 0x38}, 0x8000) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280), 0xe803}], 0x1}, 0x0) 15:21:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="a3375f83dd2586651779c2b1dc11", 0x0, 0x3dc}, 0x28) 15:21:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="a3375f83dd2586651779c2b1dc11", 0x0, 0x3dc}, 0x28) 15:21:36 executing program 0: socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) close(r0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x101}, 0x0) recvmsg$kcm(r2, &(0x7f000000d540)={&(0x7f000000d380)=@ll, 0x80, &(0x7f000000d440)=[{&(0x7f000000d400)=""/27, 0x1b}], 0x1, &(0x7f000000d480)=""/151, 0x97}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40) 15:21:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="a3375f83dd2586651779c2b1dc11", 0x0, 0x3dc}, 0x28) 15:21:37 executing program 4: r0 = socket$kcm(0xa, 0x3, 0x11) socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x32, &(0x7f0000000280), 0xcc) 15:21:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x1}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00, 0x0, 0x0, 0x2000]}, 0x2c) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:21:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="a3375f83dd2586651779c2b1dc11", 0x0, 0x3dc}, 0x28) 15:21:37 executing program 5: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xff3, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) 15:21:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x2, 0x4, 0x417, 0x0, 0x1}, 0x3c) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 15:21:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000003b40)={0x11, 0x680d, 0x200, 0xffffffff, 0x20, r1, 0xffff, [], 0x0, 0xffffffffffffff9c, 0x2, 0x3}, 0x3c) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003b80)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000003bc0)={0x11, 0x100, 0xffff, 0xff, 0x20, r2, 0x4d6d, [], 0x0, r3, 0x4, 0x4}, 0x3c) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r4, &(0x7f0000001500)={&(0x7f0000001440)=@ethernet={0x0, @random}, 0x80, &(0x7f00000014c0), 0x0, &(0x7f0000001580)=""/4096, 0x1000}, 0x0) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) recvmsg(r0, &(0x7f0000003b00)={&(0x7f0000002580)=@alg, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002600)=""/115, 0x73}, {&(0x7f0000002680)=""/75, 0x4b}, {&(0x7f0000002700)=""/205, 0xcd}, {&(0x7f0000002800)=""/188, 0xbc}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/12, 0xc}, {&(0x7f00000038c0)=""/104, 0x68}, {&(0x7f0000003940)=""/53, 0x35}, {&(0x7f0000003980)=""/51, 0x33}], 0x9, &(0x7f0000003a80)=""/79, 0x4f}, 0x160) 15:21:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60f9, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x1ff, 0x0, 0x3fac, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(r1, &(0x7f0000000040), 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, 0x0) 15:21:37 executing program 5: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xff3, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) 15:21:37 executing program 4: r0 = socket$kcm(0xa, 0x3, 0x11) socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x32, &(0x7f0000000280), 0xcc) 15:21:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000003b40)={0x11, 0x680d, 0x200, 0xffffffff, 0x20, r1, 0xffff, [], 0x0, 0xffffffffffffff9c, 0x2, 0x3}, 0x3c) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003b80)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000003bc0)={0x11, 0x100, 0xffff, 0xff, 0x20, r2, 0x4d6d, [], 0x0, r3, 0x4, 0x4}, 0x3c) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r4, &(0x7f0000001500)={&(0x7f0000001440)=@ethernet={0x0, @random}, 0x80, &(0x7f00000014c0), 0x0, &(0x7f0000001580)=""/4096, 0x1000}, 0x0) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) recvmsg(r0, &(0x7f0000003b00)={&(0x7f0000002580)=@alg, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002600)=""/115, 0x73}, {&(0x7f0000002680)=""/75, 0x4b}, {&(0x7f0000002700)=""/205, 0xcd}, {&(0x7f0000002800)=""/188, 0xbc}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/12, 0xc}, {&(0x7f00000038c0)=""/104, 0x68}, {&(0x7f0000003940)=""/53, 0x35}, {&(0x7f0000003980)=""/51, 0x33}], 0x9, &(0x7f0000003a80)=""/79, 0x4f}, 0x160) 15:21:37 executing program 5: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xff3, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) [ 360.613883][ T26] device hsr_slave_0 left promiscuous mode [ 360.647976][ T26] device hsr_slave_1 left promiscuous mode 15:21:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000003b40)={0x11, 0x680d, 0x200, 0xffffffff, 0x20, r1, 0xffff, [], 0x0, 0xffffffffffffff9c, 0x2, 0x3}, 0x3c) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003b80)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000003bc0)={0x11, 0x100, 0xffff, 0xff, 0x20, r2, 0x4d6d, [], 0x0, r3, 0x4, 0x4}, 0x3c) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r4, &(0x7f0000001500)={&(0x7f0000001440)=@ethernet={0x0, @random}, 0x80, &(0x7f00000014c0), 0x0, &(0x7f0000001580)=""/4096, 0x1000}, 0x0) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) recvmsg(r0, &(0x7f0000003b00)={&(0x7f0000002580)=@alg, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002600)=""/115, 0x73}, {&(0x7f0000002680)=""/75, 0x4b}, {&(0x7f0000002700)=""/205, 0xcd}, {&(0x7f0000002800)=""/188, 0xbc}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/12, 0xc}, {&(0x7f00000038c0)=""/104, 0x68}, {&(0x7f0000003940)=""/53, 0x35}, {&(0x7f0000003980)=""/51, 0x33}], 0x9, &(0x7f0000003a80)=""/79, 0x4f}, 0x160) [ 360.743916][ T26] device bridge_slave_1 left promiscuous mode [ 360.750977][ T26] bridge0: port 2(bridge_slave_1) entered disabled state 15:21:38 executing program 4: r0 = socket$kcm(0xa, 0x3, 0x11) socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x32, &(0x7f0000000280), 0xcc) [ 360.847121][ T26] device bridge_slave_0 left promiscuous mode [ 360.862533][ T26] bridge0: port 1(bridge_slave_0) entered disabled state 15:21:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000003b40)={0x11, 0x680d, 0x200, 0xffffffff, 0x20, r1, 0xffff, [], 0x0, 0xffffffffffffff9c, 0x2, 0x3}, 0x3c) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003b80)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000003bc0)={0x11, 0x100, 0xffff, 0xff, 0x20, r2, 0x4d6d, [], 0x0, r3, 0x4, 0x4}, 0x3c) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r4, &(0x7f0000001500)={&(0x7f0000001440)=@ethernet={0x0, @random}, 0x80, &(0x7f00000014c0), 0x0, &(0x7f0000001580)=""/4096, 0x1000}, 0x0) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) recvmsg(r0, &(0x7f0000003b00)={&(0x7f0000002580)=@alg, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002600)=""/115, 0x73}, {&(0x7f0000002680)=""/75, 0x4b}, {&(0x7f0000002700)=""/205, 0xcd}, {&(0x7f0000002800)=""/188, 0xbc}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/12, 0xc}, {&(0x7f00000038c0)=""/104, 0x68}, {&(0x7f0000003940)=""/53, 0x35}, {&(0x7f0000003980)=""/51, 0x33}], 0x9, &(0x7f0000003a80)=""/79, 0x4f}, 0x160) 15:21:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000003b40)={0x11, 0x680d, 0x200, 0xffffffff, 0x20, r1, 0xffff, [], 0x0, 0xffffffffffffff9c, 0x2, 0x3}, 0x3c) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003b80)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000003bc0)={0x11, 0x100, 0xffff, 0xff, 0x20, r2, 0x4d6d, [], 0x0, r3, 0x4, 0x4}, 0x3c) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r4, &(0x7f0000001500)={&(0x7f0000001440)=@ethernet={0x0, @random}, 0x80, &(0x7f00000014c0), 0x0, &(0x7f0000001580)=""/4096, 0x1000}, 0x0) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) recvmsg(r0, &(0x7f0000003b00)={&(0x7f0000002580)=@alg, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002600)=""/115, 0x73}, {&(0x7f0000002680)=""/75, 0x4b}, {&(0x7f0000002700)=""/205, 0xcd}, {&(0x7f0000002800)=""/188, 0xbc}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/12, 0xc}, {&(0x7f00000038c0)=""/104, 0x68}, {&(0x7f0000003940)=""/53, 0x35}, {&(0x7f0000003980)=""/51, 0x33}], 0x9, &(0x7f0000003a80)=""/79, 0x4f}, 0x160) 15:21:38 executing program 5: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xff3, 0x0, 0x1000000101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) sendmsg(r0, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) [ 362.798414][ T26] team0 (unregistering): Port device team_slave_1 removed [ 362.812030][ T26] team0 (unregistering): Port device team_slave_0 removed [ 362.824418][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 362.909489][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 362.999398][ T26] bond0 (unregistering): Released all slaves [ 363.111391][T14061] IPVS: ftp: loaded support on port[0] = 21 [ 363.181444][T14061] chnl_net:caif_netlink_parms(): no params data found [ 363.296580][T14061] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.310885][T14061] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.319623][T14061] device bridge_slave_0 entered promiscuous mode [ 363.334636][T14061] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.341929][T14061] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.356970][T14061] device bridge_slave_1 entered promiscuous mode [ 363.391751][T14061] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 363.412263][T14061] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 363.443010][T14061] team0: Port device team_slave_0 added [ 363.458096][T14061] team0: Port device team_slave_1 added [ 363.529530][T14061] device hsr_slave_0 entered promiscuous mode [ 363.576207][T14061] device hsr_slave_1 entered promiscuous mode [ 363.657753][T14061] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.665105][T14061] bridge0: port 2(bridge_slave_1) entered forwarding state [ 363.672709][T14061] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.679840][T14061] bridge0: port 1(bridge_slave_0) entered forwarding state [ 363.752121][T14061] 8021q: adding VLAN 0 to HW filter on device bond0 [ 363.775590][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 363.791492][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.800745][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.826309][T14061] 8021q: adding VLAN 0 to HW filter on device team0 [ 363.845605][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 363.861003][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.868163][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 363.901877][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 363.912326][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.919483][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 363.950674][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 363.961830][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 363.976490][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 363.994671][T14061] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 364.005154][T14061] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 364.018644][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 364.027911][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 364.037053][T13850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 364.059546][T14061] 8021q: adding VLAN 0 to HW filter on device batadv0 15:21:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x2, 0x4, 0x417, 0x0, 0x1}, 0x3c) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 15:21:41 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60f9, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x1ff, 0x0, 0x3fac, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(r1, &(0x7f0000000040), 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, 0x0) 15:21:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000003b40)={0x11, 0x680d, 0x200, 0xffffffff, 0x20, r1, 0xffff, [], 0x0, 0xffffffffffffff9c, 0x2, 0x3}, 0x3c) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003b80)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000003bc0)={0x11, 0x100, 0xffff, 0xff, 0x20, r2, 0x4d6d, [], 0x0, r3, 0x4, 0x4}, 0x3c) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r4, &(0x7f0000001500)={&(0x7f0000001440)=@ethernet={0x0, @random}, 0x80, &(0x7f00000014c0), 0x0, &(0x7f0000001580)=""/4096, 0x1000}, 0x0) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) recvmsg(r0, &(0x7f0000003b00)={&(0x7f0000002580)=@alg, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002600)=""/115, 0x73}, {&(0x7f0000002680)=""/75, 0x4b}, {&(0x7f0000002700)=""/205, 0xcd}, {&(0x7f0000002800)=""/188, 0xbc}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/12, 0xc}, {&(0x7f00000038c0)=""/104, 0x68}, {&(0x7f0000003940)=""/53, 0x35}, {&(0x7f0000003980)=""/51, 0x33}], 0x9, &(0x7f0000003a80)=""/79, 0x4f}, 0x160) 15:21:41 executing program 4: r0 = socket$kcm(0xa, 0x3, 0x11) socket$kcm(0xa, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x32, &(0x7f0000000280), 0xcc) 15:21:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000003b40)={0x11, 0x680d, 0x200, 0xffffffff, 0x20, r1, 0xffff, [], 0x0, 0xffffffffffffff9c, 0x2, 0x3}, 0x3c) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003b80)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000003bc0)={0x11, 0x100, 0xffff, 0xff, 0x20, r2, 0x4d6d, [], 0x0, r3, 0x4, 0x4}, 0x3c) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r4, &(0x7f0000001500)={&(0x7f0000001440)=@ethernet={0x0, @random}, 0x80, &(0x7f00000014c0), 0x0, &(0x7f0000001580)=""/4096, 0x1000}, 0x0) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) recvmsg(r0, &(0x7f0000003b00)={&(0x7f0000002580)=@alg, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002600)=""/115, 0x73}, {&(0x7f0000002680)=""/75, 0x4b}, {&(0x7f0000002700)=""/205, 0xcd}, {&(0x7f0000002800)=""/188, 0xbc}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/12, 0xc}, {&(0x7f00000038c0)=""/104, 0x68}, {&(0x7f0000003940)=""/53, 0x35}, {&(0x7f0000003980)=""/51, 0x33}], 0x9, &(0x7f0000003a80)=""/79, 0x4f}, 0x160) 15:21:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000003b40)={0x11, 0x680d, 0x200, 0xffffffff, 0x20, r1, 0xffff, [], 0x0, 0xffffffffffffff9c, 0x2, 0x3}, 0x3c) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003b80)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000003bc0)={0x11, 0x100, 0xffff, 0xff, 0x20, r2, 0x4d6d, [], 0x0, r3, 0x4, 0x4}, 0x3c) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r4, &(0x7f0000001500)={&(0x7f0000001440)=@ethernet={0x0, @random}, 0x80, &(0x7f00000014c0), 0x0, &(0x7f0000001580)=""/4096, 0x1000}, 0x0) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) recvmsg(r0, &(0x7f0000003b00)={&(0x7f0000002580)=@alg, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002600)=""/115, 0x73}, {&(0x7f0000002680)=""/75, 0x4b}, {&(0x7f0000002700)=""/205, 0xcd}, {&(0x7f0000002800)=""/188, 0xbc}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/12, 0xc}, {&(0x7f00000038c0)=""/104, 0x68}, {&(0x7f0000003940)=""/53, 0x35}, {&(0x7f0000003980)=""/51, 0x33}], 0x9, &(0x7f0000003a80)=""/79, 0x4f}, 0x160) 15:21:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x2, 0x4, 0x417, 0x0, 0x1}, 0x3c) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 15:21:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000003b40)={0x11, 0x680d, 0x200, 0xffffffff, 0x20, r1, 0xffff, [], 0x0, 0xffffffffffffff9c, 0x2, 0x3}, 0x3c) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003b80)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000003bc0)={0x11, 0x100, 0xffff, 0xff, 0x20, r2, 0x4d6d, [], 0x0, r3, 0x4, 0x4}, 0x3c) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r4, &(0x7f0000001500)={&(0x7f0000001440)=@ethernet={0x0, @random}, 0x80, &(0x7f00000014c0), 0x0, &(0x7f0000001580)=""/4096, 0x1000}, 0x0) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) recvmsg(r0, &(0x7f0000003b00)={&(0x7f0000002580)=@alg, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002600)=""/115, 0x73}, {&(0x7f0000002680)=""/75, 0x4b}, {&(0x7f0000002700)=""/205, 0xcd}, {&(0x7f0000002800)=""/188, 0xbc}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/12, 0xc}, {&(0x7f00000038c0)=""/104, 0x68}, {&(0x7f0000003940)=""/53, 0x35}, {&(0x7f0000003980)=""/51, 0x33}], 0x9, &(0x7f0000003a80)=""/79, 0x4f}, 0x160) 15:21:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000003b40)={0x11, 0x680d, 0x200, 0xffffffff, 0x20, r1, 0xffff, [], 0x0, 0xffffffffffffff9c, 0x2, 0x3}, 0x3c) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003b80)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000003bc0)={0x11, 0x100, 0xffff, 0xff, 0x20, r2, 0x4d6d, [], 0x0, r3, 0x4, 0x4}, 0x3c) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r4, &(0x7f0000001500)={&(0x7f0000001440)=@ethernet={0x0, @random}, 0x80, &(0x7f00000014c0), 0x0, &(0x7f0000001580)=""/4096, 0x1000}, 0x0) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) recvmsg(r0, &(0x7f0000003b00)={&(0x7f0000002580)=@alg, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002600)=""/115, 0x73}, {&(0x7f0000002680)=""/75, 0x4b}, {&(0x7f0000002700)=""/205, 0xcd}, {&(0x7f0000002800)=""/188, 0xbc}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/12, 0xc}, {&(0x7f00000038c0)=""/104, 0x68}, {&(0x7f0000003940)=""/53, 0x35}, {&(0x7f0000003980)=""/51, 0x33}], 0x9, &(0x7f0000003a80)=""/79, 0x4f}, 0x160) 15:21:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000003b40)={0x11, 0x680d, 0x200, 0xffffffff, 0x20, r1, 0xffff, [], 0x0, 0xffffffffffffff9c, 0x2, 0x3}, 0x3c) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003b80)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000003bc0)={0x11, 0x100, 0xffff, 0xff, 0x20, r2, 0x4d6d, [], 0x0, r3, 0x4, 0x4}, 0x3c) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r4, &(0x7f0000001500)={&(0x7f0000001440)=@ethernet={0x0, @random}, 0x80, &(0x7f00000014c0), 0x0, &(0x7f0000001580)=""/4096, 0x1000}, 0x0) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) recvmsg(r0, &(0x7f0000003b00)={&(0x7f0000002580)=@alg, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002600)=""/115, 0x73}, {&(0x7f0000002680)=""/75, 0x4b}, {&(0x7f0000002700)=""/205, 0xcd}, {&(0x7f0000002800)=""/188, 0xbc}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/12, 0xc}, {&(0x7f00000038c0)=""/104, 0x68}, {&(0x7f0000003940)=""/53, 0x35}, {&(0x7f0000003980)=""/51, 0x33}], 0x9, &(0x7f0000003a80)=""/79, 0x4f}, 0x160) 15:21:41 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6bc0143f304e71f", 0x30}], 0x1}, 0x0) 15:21:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x2, 0x4, 0x417, 0x0, 0x1}, 0x3c) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 364.530041][T14100] net_ratelimit: 10 callbacks suppressed [ 364.530068][T14100] Dead loop on virtual device ip6_vti0, fix it urgently! 15:21:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000003b40)={0x11, 0x680d, 0x200, 0xffffffff, 0x20, r1, 0xffff, [], 0x0, 0xffffffffffffff9c, 0x2, 0x3}, 0x3c) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003b80)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000003bc0)={0x11, 0x100, 0xffff, 0xff, 0x20, r2, 0x4d6d, [], 0x0, r3, 0x4, 0x4}, 0x3c) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r4, &(0x7f0000001500)={&(0x7f0000001440)=@ethernet={0x0, @random}, 0x80, &(0x7f00000014c0), 0x0, &(0x7f0000001580)=""/4096, 0x1000}, 0x0) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) recvmsg(r0, &(0x7f0000003b00)={&(0x7f0000002580)=@alg, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002600)=""/115, 0x73}, {&(0x7f0000002680)=""/75, 0x4b}, {&(0x7f0000002700)=""/205, 0xcd}, {&(0x7f0000002800)=""/188, 0xbc}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/12, 0xc}, {&(0x7f00000038c0)=""/104, 0x68}, {&(0x7f0000003940)=""/53, 0x35}, {&(0x7f0000003980)=""/51, 0x33}], 0x9, &(0x7f0000003a80)=""/79, 0x4f}, 0x160) 15:21:41 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60f9, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x1ff, 0x0, 0x3fac, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(r1, &(0x7f0000000040), 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, 0x0) 15:21:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000003b40)={0x11, 0x680d, 0x200, 0xffffffff, 0x20, r1, 0xffff, [], 0x0, 0xffffffffffffff9c, 0x2, 0x3}, 0x3c) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003b80)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000003bc0)={0x11, 0x100, 0xffff, 0xff, 0x20, r2, 0x4d6d, [], 0x0, r3, 0x4, 0x4}, 0x3c) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r4, &(0x7f0000001500)={&(0x7f0000001440)=@ethernet={0x0, @random}, 0x80, &(0x7f00000014c0), 0x0, &(0x7f0000001580)=""/4096, 0x1000}, 0x0) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) recvmsg(r0, &(0x7f0000003b00)={&(0x7f0000002580)=@alg, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002600)=""/115, 0x73}, {&(0x7f0000002680)=""/75, 0x4b}, {&(0x7f0000002700)=""/205, 0xcd}, {&(0x7f0000002800)=""/188, 0xbc}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/12, 0xc}, {&(0x7f00000038c0)=""/104, 0x68}, {&(0x7f0000003940)=""/53, 0x35}, {&(0x7f0000003980)=""/51, 0x33}], 0x9, &(0x7f0000003a80)=""/79, 0x4f}, 0x160) 15:21:41 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6bc0143f304e71f", 0x30}], 0x1}, 0x0) 15:21:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000003b40)={0x11, 0x680d, 0x200, 0xffffffff, 0x20, r1, 0xffff, [], 0x0, 0xffffffffffffff9c, 0x2, 0x3}, 0x3c) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003b80)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000003bc0)={0x11, 0x100, 0xffff, 0xff, 0x20, r2, 0x4d6d, [], 0x0, r3, 0x4, 0x4}, 0x3c) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r4, &(0x7f0000001500)={&(0x7f0000001440)=@ethernet={0x0, @random}, 0x80, &(0x7f00000014c0), 0x0, &(0x7f0000001580)=""/4096, 0x1000}, 0x0) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) recvmsg(r0, &(0x7f0000003b00)={&(0x7f0000002580)=@alg, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002600)=""/115, 0x73}, {&(0x7f0000002680)=""/75, 0x4b}, {&(0x7f0000002700)=""/205, 0xcd}, {&(0x7f0000002800)=""/188, 0xbc}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/12, 0xc}, {&(0x7f00000038c0)=""/104, 0x68}, {&(0x7f0000003940)=""/53, 0x35}, {&(0x7f0000003980)=""/51, 0x33}], 0x9, &(0x7f0000003a80)=""/79, 0x4f}, 0x160) 15:21:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 364.843150][T14118] Dead loop on virtual device ip6_vti0, fix it urgently! 15:21:42 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x40000000000002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup(r2, &(0x7f0000000000)='syz1\xa0', 0x1ff) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="fa0c000012008152915a655267d7d137ab2ff96e27bf28b285fe3903a44a6017edcaa3a2b4dade3baee72569b51366463fedf5e787c05b0cb5927a3a7edfb4d078e9ae1504d489e058be9fafaa633705b6d4bf6a01f2cd9ebf19724a1b0b9760612582bccd3983ce4474844c065e914dab8bbd52a45f431678bfe28633bf7c8dc83df809238ed87f1e393883ef750ce79c6f84e5e5de176e2f26024e4e3a3d8fbdaf3254022f265d8ccc5fd7205d9d9c2c407ec58162523082d81a39c43f782332ba8e82b4107a049cb82bba8b5edd80473844291437b8d22edca68047582e6be601e9df5e60a32c7cd202c5a30b8b606e43362739551cbb013b65e238f41cc00d7900140cf06b7bc9030f2563bcf9d4f4b7f48c79ec1a323d06276a0a3f8846b7c62b66f9709cabcaad234c53f3bc9b11165a6321f1db1057f076cfaebf8fbfa033fdc1dc2c3e314b36b3b3dd50425447da8bc5938ff7a17361100ab0b1ffeab7ac487411824224781eb9cdd4edef57ae91cd61f56a56c0599cfc3a491447207610f242da6cd6b030ae5f35e3181c44ae68665a023759b9ef4358db46107edc49194aed72b62600ec0ae4fc9065be059fc010cd6e6c9ea77c666b5e25693fbcf595e3e57113ff3a0e0c63d0604a16ea5adb8b7b54d47d4d8804612fde571863064528a49bf684d8a880a11afd819f186c177c49cac3ba1e9d1aa7ad0ff36b9e36d73c05b8abcaf96df0bacd2c9653f30ec29e1284af8749a9b2803c2727e992a6e65df192e1875c3e6d3553ffb7cb34ffee8f8ac0123c390454b42a0316952cbc9949376d9320ec207f77c2d5eb9e86d720cf8e9008a9a51932b45cd4cab21414c92d1c20f9e15e3fc16c7ce181e9ab19b01b70343934c823b1215e173405dd225233823cd4a604a77f06b14eb05b860e6cf8790335788c43abe9de1598e9952e5c7e6b2f8b17b1788ff3033e7d1635b008834bdf4054e6195e55000827c6202b227dde06f23ae21c00b371bdb6b7ea47b2e78844b52a77f9f0929790dcd7df2752e4af092d539c87c18751a5eb3eb4d38a2a0e070064b4ffaacff0543b115cc89f6c7e78f12147ebfcf1c80bac8f98deb59cbe670adb4cd1882a7e0ca4ba85ae9d445223ffb32301d46c0c9b05a830cbea0f72294ab3b539e4ed7cac2e22b235e8ceedeb643fb90b061a58368e76036ff3c1828d8a4e21288662afb6f2acab00d734db7ffc8373a928571819ce9ea6cb0956a6093b2b1f65662b76bc6ac8a171451714e1d0e4ff7647fe7551d3cf16f37cb5547317e4fef51e4fb471de6ffbb90c2dd4a64266c4c2f75fc62e58ec306fb92212fb262d8b138899a3b53e67cde2f97d94cd2265cc04d32b29edf77e75b1f88372495cb2937f183bfc8604d72efb3af5c1f41b665b25592676b0ad2185478eade7e663e743e0e09cce6224c787ce1d789dc4a9b350bfe3a75f551341b11dd96cdaea17989dad565b16324a69842dc29a0ed16744ea5935598ac8238e146139189927a14d3b2863044b63b468ae75f48fab68ad235c36daffebfe4b468fc9b13198b1a683dcd3b3b4294ba22caddbacf8792d5783bc12e2538e4609e6bb6e9eeab98a06452c252a657f400260458c29fae8879097698c9aba2b2d889fc78f00d0d8271e09e8542b71018be6ff8cb03cb423e79303047d6ce124a00f64461b899bbddc4fe87ff677533391e16c01fa9cd6420bdc856c4c7f057b249ee9817efd6ab2cd02eb887d2631435ef2d5a1c7e57ac046ef615a1285ca89ade18ae69af3b3f8f76ca8aa060e373c0f99424fe1c5fadc72fe145fd2d4e4da4b78597890516857de188fcdaf15e3b0871b346cd39ab772cc25fab49e60c818cde934b137144adfc4fbde3ddbeccce9679f02b66746e822c67b3ed5fdafb4a936a2683b39a002115ecd62220605ca542610a80f2e3530aa89d3ed6ed9c57bbfd5db3a0b62786a608309a355443c616032008f9458b2f10db93e29470192370084e9322c309c9b23333b46d04e79176659503ad4b05deebb3c67d715ee6e84a89002ea6f7f71bf41ad36b42c8ae01c97174dbb641e50641aba60c291a84e906c013087370a5043e07d36fcead378f6c1e6ed3f5ac695124b82b20261cf7c9b82172e09c81d7d39eed72aee5678613a3c671ddd44f2c7c75a3b5d316aa165d56594fccab20903d7f503a08928e76c779918b2463b720ee6367a43e494a1db3ed1a80690e665570c01ce7eb979cdd95d4e1ca51730eb2cd63ffb2a56049601627c9788254945142dce85adbe1eb5997d16cdfe2a3758b13dc6bb121e2206ae64206868c1c5e89a101bc121719ac435dcad093f5f67cefd863cc7c8f3fc8a9dc62a83c115f1ce714b18af067951aa06dd9bb4ed98a820bf4704d156977caa4e6415b2a0df0386e2f6a061bf44abc8a397cf4abdafc51b78ebec9831f3c60fde6e62a1fd082903080aef20ff8de8bc0dced06f627514600539ca7114a088848da4244a85b4cf5b976d3a698c9a568d417e276917baba05d1a02181db2e6cc35986da4ccc63f8cd8e85a4a923dd27e2f499664601fdc44fdf46e2d2880cd5a7ece89c370234c438dcc0b43865cc62bad21e9dc37da758cbe01752f02fd9cbfe98630a30a78bb1239e25cdaba3d45d13cd3e7216d9d8070f3ff1a0cd9a0c91f29974c98f2677ba88c1091bde4be0cd37ea5eeb3b9cd59560a00ddd40bbd60ffb8d4daa973ef0977c18dd4b38a605cee957872dca85787c37b6931293eddb77015faf143d1d28d24822d1a5d134799e8175a38b255aaf0e39b68c7f734e2e1e7044626daa84c9113e86d86ef63c863703703ea163319261dcf516c32d49478f7af30d52baa18ea6b0fc286c06b7e4ee019bf3fe74845a652d4a52aaa241a189c411e90e2953863a2bc4124e573607b94cdff19e280731824931a83f056cb5857672619b97ce38081592c0c319ce72e04e9eadce89775cfb5a4b2842663bc79bde565435cbcd46c4d505ceef7dde86512d39d4cb270deb7e79ebf8602bdc0d76c3e833d36ee08be10be634f44056c2f3fd6a328c7cd562e9c96ff7845fc3df81a876bb07f1cc833bed6ca1dc5cf935a4e959db6a4fae6edbc45357d8758faa9cd04cd41eb6efcfbd91658519bf520b90107f767d126854818485e98cb7ef56804de6950bf4e72098a949d14ea0e4e9f2534cf16cac0aeb970fc5c39f37e93910d5c99ac163792260d2280ec5c9a79bf295588ec23f524aae65f800f9c39e338f3d66b1a69e5488e04823eab36ae6ec6a2c5ce133ccd819a2b217b1ab7f4afd1697bb42929b3131358b5421c83f925571934442d0fd0ce3990d4e5d31d8b956f76df3c2f8533e46b892c88692ce009155dd5c7dbe4c86874b95762650f63e4b4aabb41320978b05b80cfe8fa2830904ef6b5c4f7ad46ca5dac151c9077c4d2c6adfe5066a8eb09a9bc6892330ea2b259a53c7137f8498254e1b04bf920c35c5333c4d640b11da60917ae921037b4aedbd6a0fbeeaf88ef6defc830552b4cbe3fe2a844806a48923dd428ea1c8d797bd8e6aabd1d1a8c97c8038b627120a77f4e47fa1f788aa9da268b0ec10fc453cb722685df76547dbf55a16663aa2b2a51e9c52456cccdf682592d1369dd12e3d3cb504e0f2d7004e62c297d5a25d0298045dae8fca8cb795ea57288b85a7e705820087d55ca6c42e920e2aa1174e128622cf64a197fd728cb2949536ba63e8bda8589261f1377caea37302e47228d3708a5666c66ba711d3c0b310a8c47e86d26597299d523c28c90e4feab43e950f398f7b61ccf7e6490d75ba6d8214e2d5ef2d7a088db490e1ebacf4e6eecc896cb1c704f0a8fcdf4ccb5dfa53eaf43d709287f36c10188c19fd59da7d73494de089c1b0a69ee22dcb847001c5317846a876bee1685d11c4db0673ec4c3a12008bb719650525b3c39e2b0469edda93830b3f1bde3e5b0b4637197866bb08c5858cf0d9876e3c7cad54169887bf9c80f9f4be362e1bc8c27f3434e9a918bac355c184bd899b9aebe6be20e70c0c69234342eb8b57aa9ffb7797a32df91cec2bbc90201658ca2297bf1fe68e65363867e1f6ad79b827f363d64fbd3b188d95307d011c4ce5bf4407908c058eeb97ec98dd0ebfdab6b348fa387f2a7573cac25344c983e8fd526c30ee6d59fe99a30c7d7e2864aa22bfa49df5f32da68309cab3ed9c2ce69b6ecb8508ce28a43ebd6c809b8afd07a4606e664965d316f3707a3abee9bcdc32a78031b0171fb565d90c16cd56e5792c0cf618b799715f32538e38f493d4e19ec76fc8a07576a13975706bfc2bb1516c2d18a4385cc37a206eac6c9fb8d073572ba2671d2198abf24fdd0c40d079ae44962c26743b4bf5950ac5ee34c5d7bd60b364ce670958112c37b9829bed7e1327356d6b94af3ba020c2337b2dba37d00af8a128a614390cdde62ce871f948427fb5c187df9a1540a5cc71da1a86144acbfd94bf433f744f0c4f2a675eba3ed251c5b11b08dfefc726c0394a9b75121d88467ed4b2cd69819dfe50693a4a4c8370d3af12f41c0067283bbb5a90044a340fc357a11081a6c13bb9c32d9caa448479fd5f0302b6729ca7233094540b14546d6bcc15771c2686279b34f9c0914f5306d0fabd5979266ea01a17a22507e560dbf904dd62c40e2bccb468710ee4c1caf4e786", 0xcfa}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f0000003040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xffffffffffffff25, &(0x7f0000003100), 0x0, &(0x7f0000003140)=""/29, 0x1d}, 0x0) mkdirat$cgroup(r2, &(0x7f0000000fc0)='syz0\x00', 0x1ff) recvmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000200)=@sco, 0x26c, &(0x7f0000002b80), 0x218, &(0x7f00000076c0)=""/156, 0xfffffffffffffe11, 0xfffffffffffffffa}, 0x0) recvmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x0, 0x0}, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000001000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f80)={&(0x7f0000000100)='./cgroup.cpu/syz0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) 15:21:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000003b40)={0x11, 0x680d, 0x200, 0xffffffff, 0x20, r1, 0xffff, [], 0x0, 0xffffffffffffff9c, 0x2, 0x3}, 0x3c) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003b80)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000003bc0)={0x11, 0x100, 0xffff, 0xff, 0x20, r2, 0x4d6d, [], 0x0, r3, 0x4, 0x4}, 0x3c) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r4, &(0x7f0000001500)={&(0x7f0000001440)=@ethernet={0x0, @random}, 0x80, &(0x7f00000014c0), 0x0, &(0x7f0000001580)=""/4096, 0x1000}, 0x0) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) recvmsg(r0, &(0x7f0000003b00)={&(0x7f0000002580)=@alg, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002600)=""/115, 0x73}, {&(0x7f0000002680)=""/75, 0x4b}, {&(0x7f0000002700)=""/205, 0xcd}, {&(0x7f0000002800)=""/188, 0xbc}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/12, 0xc}, {&(0x7f00000038c0)=""/104, 0x68}, {&(0x7f0000003940)=""/53, 0x35}, {&(0x7f0000003980)=""/51, 0x33}], 0x9, &(0x7f0000003a80)=""/79, 0x4f}, 0x160) 15:21:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000003b40)={0x11, 0x680d, 0x200, 0xffffffff, 0x20, r1, 0xffff, [], 0x0, 0xffffffffffffff9c, 0x2, 0x3}, 0x3c) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003b80)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000003bc0)={0x11, 0x100, 0xffff, 0xff, 0x20, r2, 0x4d6d, [], 0x0, r3, 0x4, 0x4}, 0x3c) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r4, &(0x7f0000001500)={&(0x7f0000001440)=@ethernet={0x0, @random}, 0x80, &(0x7f00000014c0), 0x0, &(0x7f0000001580)=""/4096, 0x1000}, 0x0) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) recvmsg(r0, &(0x7f0000003b00)={&(0x7f0000002580)=@alg, 0x80, &(0x7f00000039c0)=[{&(0x7f0000002600)=""/115, 0x73}, {&(0x7f0000002680)=""/75, 0x4b}, {&(0x7f0000002700)=""/205, 0xcd}, {&(0x7f0000002800)=""/188, 0xbc}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/12, 0xc}, {&(0x7f00000038c0)=""/104, 0x68}, {&(0x7f0000003940)=""/53, 0x35}, {&(0x7f0000003980)=""/51, 0x33}], 0x9, &(0x7f0000003a80)=""/79, 0x4f}, 0x160) 15:21:42 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6bc0143f304e71f", 0x30}], 0x1}, 0x0) 15:21:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 365.091972][T14129] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.5'. [ 365.183477][T14129] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.5'. [ 365.239339][T14144] Dead loop on virtual device ip6_vti0, fix it urgently! [ 365.249413][T14142] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.5'. 15:21:42 executing program 3: socket$kcm(0x2, 0xfffffffffffffffd, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000380)='memory.swap.current\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="2e0000001e008109e00f80ecdb4cb92e0a4824181e0cd30be8bd6efb080003000e00140013000000060005001200", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000001580)={&(0x7f00000015c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)=""/236, 0xec}, {&(0x7f00000003c0)=""/236, 0xec}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/151, 0x97}], 0x4, &(0x7f00000014c0)=""/132, 0x84}, 0x40000120) 15:21:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 365.303346][T14145] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.5'. [ 365.377990][T14142] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.5'. 15:21:42 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000140)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000740)="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", 0xe4d}], 0x1}, 0x0) 15:21:42 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6bc0143f304e71f", 0x30}], 0x1}, 0x0) 15:21:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 365.442945][T14142] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.5'. [ 365.467413][T14145] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.5'. 15:21:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e00000026008163e44cc91b4dd65b2f0b80c37823072a556d1c958c00"/46, 0x2e}], 0x1}, 0x0) [ 365.559493][T14159] Dead loop on virtual device ip6_vti0, fix it urgently! 15:21:42 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x40000000000002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup(r2, &(0x7f0000000000)='syz1\xa0', 0x1ff) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="fa0c000012008152915a655267d7d137ab2ff96e27bf28b285fe3903a44a6017edcaa3a2b4dade3baee72569b51366463fedf5e787c05b0cb5927a3a7edfb4d078e9ae1504d489e058be9fafaa633705b6d4bf6a01f2cd9ebf19724a1b0b9760612582bccd3983ce4474844c065e914dab8bbd52a45f431678bfe28633bf7c8dc83df809238ed87f1e393883ef750ce79c6f84e5e5de176e2f26024e4e3a3d8fbdaf3254022f265d8ccc5fd7205d9d9c2c407ec58162523082d81a39c43f782332ba8e82b4107a049cb82bba8b5edd80473844291437b8d22edca68047582e6be601e9df5e60a32c7cd202c5a30b8b606e43362739551cbb013b65e238f41cc00d7900140cf06b7bc9030f2563bcf9d4f4b7f48c79ec1a323d06276a0a3f8846b7c62b66f9709cabcaad234c53f3bc9b11165a6321f1db1057f076cfaebf8fbfa033fdc1dc2c3e314b36b3b3dd50425447da8bc5938ff7a17361100ab0b1ffeab7ac487411824224781eb9cdd4edef57ae91cd61f56a56c0599cfc3a491447207610f242da6cd6b030ae5f35e3181c44ae68665a023759b9ef4358db46107edc49194aed72b62600ec0ae4fc9065be059fc010cd6e6c9ea77c666b5e25693fbcf595e3e57113ff3a0e0c63d0604a16ea5adb8b7b54d47d4d8804612fde571863064528a49bf684d8a880a11afd819f186c177c49cac3ba1e9d1aa7ad0ff36b9e36d73c05b8abcaf96df0bacd2c9653f30ec29e1284af8749a9b2803c2727e992a6e65df192e1875c3e6d3553ffb7cb34ffee8f8ac0123c390454b42a0316952cbc9949376d9320ec207f77c2d5eb9e86d720cf8e9008a9a51932b45cd4cab21414c92d1c20f9e15e3fc16c7ce181e9ab19b01b70343934c823b1215e173405dd225233823cd4a604a77f06b14eb05b860e6cf8790335788c43abe9de1598e9952e5c7e6b2f8b17b1788ff3033e7d1635b008834bdf4054e6195e55000827c6202b227dde06f23ae21c00b371bdb6b7ea47b2e78844b52a77f9f0929790dcd7df2752e4af092d539c87c18751a5eb3eb4d38a2a0e070064b4ffaacff0543b115cc89f6c7e78f12147ebfcf1c80bac8f98deb59cbe670adb4cd1882a7e0ca4ba85ae9d445223ffb32301d46c0c9b05a830cbea0f72294ab3b539e4ed7cac2e22b235e8ceedeb643fb90b061a58368e76036ff3c1828d8a4e21288662afb6f2acab00d734db7ffc8373a928571819ce9ea6cb0956a6093b2b1f65662b76bc6ac8a171451714e1d0e4ff7647fe7551d3cf16f37cb5547317e4fef51e4fb471de6ffbb90c2dd4a64266c4c2f75fc62e58ec306fb92212fb262d8b138899a3b53e67cde2f97d94cd2265cc04d32b29edf77e75b1f88372495cb2937f183bfc8604d72efb3af5c1f41b665b25592676b0ad2185478eade7e663e743e0e09cce6224c787ce1d789dc4a9b350bfe3a75f551341b11dd96cdaea17989dad565b16324a69842dc29a0ed16744ea5935598ac8238e146139189927a14d3b2863044b63b468ae75f48fab68ad235c36daffebfe4b468fc9b13198b1a683dcd3b3b4294ba22caddbacf8792d5783bc12e2538e4609e6bb6e9eeab98a06452c252a657f400260458c29fae8879097698c9aba2b2d889fc78f00d0d8271e09e8542b71018be6ff8cb03cb423e79303047d6ce124a00f64461b899bbddc4fe87ff677533391e16c01fa9cd6420bdc856c4c7f057b249ee9817efd6ab2cd02eb887d2631435ef2d5a1c7e57ac046ef615a1285ca89ade18ae69af3b3f8f76ca8aa060e373c0f99424fe1c5fadc72fe145fd2d4e4da4b78597890516857de188fcdaf15e3b0871b346cd39ab772cc25fab49e60c818cde934b137144adfc4fbde3ddbeccce9679f02b66746e822c67b3ed5fdafb4a936a2683b39a002115ecd62220605ca542610a80f2e3530aa89d3ed6ed9c57bbfd5db3a0b62786a608309a355443c616032008f9458b2f10db93e29470192370084e9322c309c9b23333b46d04e79176659503ad4b05deebb3c67d715ee6e84a89002ea6f7f71bf41ad36b42c8ae01c97174dbb641e50641aba60c291a84e906c013087370a5043e07d36fcead378f6c1e6ed3f5ac695124b82b20261cf7c9b82172e09c81d7d39eed72aee5678613a3c671ddd44f2c7c75a3b5d316aa165d56594fccab20903d7f503a08928e76c779918b2463b720ee6367a43e494a1db3ed1a80690e665570c01ce7eb979cdd95d4e1ca51730eb2cd63ffb2a56049601627c9788254945142dce85adbe1eb5997d16cdfe2a3758b13dc6bb121e2206ae64206868c1c5e89a101bc121719ac435dcad093f5f67cefd863cc7c8f3fc8a9dc62a83c115f1ce714b18af067951aa06dd9bb4ed98a820bf4704d156977caa4e6415b2a0df0386e2f6a061bf44abc8a397cf4abdafc51b78ebec9831f3c60fde6e62a1fd082903080aef20ff8de8bc0dced06f627514600539ca7114a088848da4244a85b4cf5b976d3a698c9a568d417e276917baba05d1a02181db2e6cc35986da4ccc63f8cd8e85a4a923dd27e2f499664601fdc44fdf46e2d2880cd5a7ece89c370234c438dcc0b43865cc62bad21e9dc37da758cbe01752f02fd9cbfe98630a30a78bb1239e25cdaba3d45d13cd3e7216d9d8070f3ff1a0cd9a0c91f29974c98f2677ba88c1091bde4be0cd37ea5eeb3b9cd59560a00ddd40bbd60ffb8d4daa973ef0977c18dd4b38a605cee957872dca85787c37b6931293eddb77015faf143d1d28d24822d1a5d134799e8175a38b255aaf0e39b68c7f734e2e1e7044626daa84c9113e86d86ef63c863703703ea163319261dcf516c32d49478f7af30d52baa18ea6b0fc286c06b7e4ee019bf3fe74845a652d4a52aaa241a189c411e90e2953863a2bc4124e573607b94cdff19e280731824931a83f056cb5857672619b97ce38081592c0c319ce72e04e9eadce89775cfb5a4b2842663bc79bde565435cbcd46c4d505ceef7dde86512d39d4cb270deb7e79ebf8602bdc0d76c3e833d36ee08be10be634f44056c2f3fd6a328c7cd562e9c96ff7845fc3df81a876bb07f1cc833bed6ca1dc5cf935a4e959db6a4fae6edbc45357d8758faa9cd04cd41eb6efcfbd91658519bf520b90107f767d126854818485e98cb7ef56804de6950bf4e72098a949d14ea0e4e9f2534cf16cac0aeb970fc5c39f37e93910d5c99ac163792260d2280ec5c9a79bf295588ec23f524aae65f800f9c39e338f3d66b1a69e5488e04823eab36ae6ec6a2c5ce133ccd819a2b217b1ab7f4afd1697bb42929b3131358b5421c83f925571934442d0fd0ce3990d4e5d31d8b956f76df3c2f8533e46b892c88692ce009155dd5c7dbe4c86874b95762650f63e4b4aabb41320978b05b80cfe8fa2830904ef6b5c4f7ad46ca5dac151c9077c4d2c6adfe5066a8eb09a9bc6892330ea2b259a53c7137f8498254e1b04bf920c35c5333c4d640b11da60917ae921037b4aedbd6a0fbeeaf88ef6defc830552b4cbe3fe2a844806a48923dd428ea1c8d797bd8e6aabd1d1a8c97c8038b627120a77f4e47fa1f788aa9da268b0ec10fc453cb722685df76547dbf55a16663aa2b2a51e9c52456cccdf682592d1369dd12e3d3cb504e0f2d7004e62c297d5a25d0298045dae8fca8cb795ea57288b85a7e705820087d55ca6c42e920e2aa1174e128622cf64a197fd728cb2949536ba63e8bda8589261f1377caea37302e47228d3708a5666c66ba711d3c0b310a8c47e86d26597299d523c28c90e4feab43e950f398f7b61ccf7e6490d75ba6d8214e2d5ef2d7a088db490e1ebacf4e6eecc896cb1c704f0a8fcdf4ccb5dfa53eaf43d709287f36c10188c19fd59da7d73494de089c1b0a69ee22dcb847001c5317846a876bee1685d11c4db0673ec4c3a12008bb719650525b3c39e2b0469edda93830b3f1bde3e5b0b4637197866bb08c5858cf0d9876e3c7cad54169887bf9c80f9f4be362e1bc8c27f3434e9a918bac355c184bd899b9aebe6be20e70c0c69234342eb8b57aa9ffb7797a32df91cec2bbc90201658ca2297bf1fe68e65363867e1f6ad79b827f363d64fbd3b188d95307d011c4ce5bf4407908c058eeb97ec98dd0ebfdab6b348fa387f2a7573cac25344c983e8fd526c30ee6d59fe99a30c7d7e2864aa22bfa49df5f32da68309cab3ed9c2ce69b6ecb8508ce28a43ebd6c809b8afd07a4606e664965d316f3707a3abee9bcdc32a78031b0171fb565d90c16cd56e5792c0cf618b799715f32538e38f493d4e19ec76fc8a07576a13975706bfc2bb1516c2d18a4385cc37a206eac6c9fb8d073572ba2671d2198abf24fdd0c40d079ae44962c26743b4bf5950ac5ee34c5d7bd60b364ce670958112c37b9829bed7e1327356d6b94af3ba020c2337b2dba37d00af8a128a614390cdde62ce871f948427fb5c187df9a1540a5cc71da1a86144acbfd94bf433f744f0c4f2a675eba3ed251c5b11b08dfefc726c0394a9b75121d88467ed4b2cd69819dfe50693a4a4c8370d3af12f41c0067283bbb5a90044a340fc357a11081a6c13bb9c32d9caa448479fd5f0302b6729ca7233094540b14546d6bcc15771c2686279b34f9c0914f5306d0fabd5979266ea01a17a22507e560dbf904dd62c40e2bccb468710ee4c1caf4e786", 0xcfa}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f0000003040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xffffffffffffff25, &(0x7f0000003100), 0x0, &(0x7f0000003140)=""/29, 0x1d}, 0x0) mkdirat$cgroup(r2, &(0x7f0000000fc0)='syz0\x00', 0x1ff) recvmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000200)=@sco, 0x26c, &(0x7f0000002b80), 0x218, &(0x7f00000076c0)=""/156, 0xfffffffffffffe11, 0xfffffffffffffffa}, 0x0) recvmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x0, 0x0}, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000001000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f80)={&(0x7f0000000100)='./cgroup.cpu/syz0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) 15:21:42 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'nr0\x01\x00', 0x32}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 15:21:42 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000140)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000740)="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", 0xe4d}], 0x1}, 0x0) 15:21:42 executing program 3: socket$kcm(0x2, 0xfffffffffffffffd, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000380)='memory.swap.current\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="2e0000001e008109e00f80ecdb4cb92e0a4824181e0cd30be8bd6efb080003000e00140013000000060005001200", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000001580)={&(0x7f00000015c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)=""/236, 0xec}, {&(0x7f00000003c0)=""/236, 0xec}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/151, 0x97}], 0x4, &(0x7f00000014c0)=""/132, 0x84}, 0x40000120) 15:21:42 executing program 4: socket$kcm(0x2, 0xfffffffffffffffd, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000380)='memory.swap.current\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="2e0000001e008109e00f80ecdb4cb92e0a4824181e0cd30be8bd6efb080003000e00140013000000060005001200", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000001580)={&(0x7f00000015c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)=""/236, 0xec}, {&(0x7f00000003c0)=""/236, 0xec}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/151, 0x97}], 0x4, &(0x7f00000014c0)=""/132, 0x84}, 0x40000120) [ 365.761116][T14170] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.5'. 15:21:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e00000026008163e44cc91b4dd65b2f0b80c37823072a556d1c958c00"/46, 0x2e}], 0x1}, 0x0) [ 365.804265][T14172] device nr0 entered promiscuous mode [ 365.837448][T14170] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.5'. 15:21:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e00000026008163e44cc91b4dd65b2f0b80c37823072a556d1c958c00"/46, 0x2e}], 0x1}, 0x0) 15:21:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e00000026008163e44cc91b4dd65b2f0b80c37823072a556d1c958c00"/46, 0x2e}], 0x1}, 0x0) 15:21:43 executing program 1: socket$kcm(0x2, 0xfffffffffffffffd, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000380)='memory.swap.current\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="2e0000001e008109e00f80ecdb4cb92e0a4824181e0cd30be8bd6efb080003000e00140013000000060005001200", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000001580)={&(0x7f00000015c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)=""/236, 0xec}, {&(0x7f00000003c0)=""/236, 0xec}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/151, 0x97}], 0x4, &(0x7f00000014c0)=""/132, 0x84}, 0x40000120) 15:21:43 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x40000000000002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup(r2, &(0x7f0000000000)='syz1\xa0', 0x1ff) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="fa0c000012008152915a655267d7d137ab2ff96e27bf28b285fe3903a44a6017edcaa3a2b4dade3baee72569b51366463fedf5e787c05b0cb5927a3a7edfb4d078e9ae1504d489e058be9fafaa633705b6d4bf6a01f2cd9ebf19724a1b0b9760612582bccd3983ce4474844c065e914dab8bbd52a45f431678bfe28633bf7c8dc83df809238ed87f1e393883ef750ce79c6f84e5e5de176e2f26024e4e3a3d8fbdaf3254022f265d8ccc5fd7205d9d9c2c407ec58162523082d81a39c43f782332ba8e82b4107a049cb82bba8b5edd80473844291437b8d22edca68047582e6be601e9df5e60a32c7cd202c5a30b8b606e43362739551cbb013b65e238f41cc00d7900140cf06b7bc9030f2563bcf9d4f4b7f48c79ec1a323d06276a0a3f8846b7c62b66f9709cabcaad234c53f3bc9b11165a6321f1db1057f076cfaebf8fbfa033fdc1dc2c3e314b36b3b3dd50425447da8bc5938ff7a17361100ab0b1ffeab7ac487411824224781eb9cdd4edef57ae91cd61f56a56c0599cfc3a491447207610f242da6cd6b030ae5f35e3181c44ae68665a023759b9ef4358db46107edc49194aed72b62600ec0ae4fc9065be059fc010cd6e6c9ea77c666b5e25693fbcf595e3e57113ff3a0e0c63d0604a16ea5adb8b7b54d47d4d8804612fde571863064528a49bf684d8a880a11afd819f186c177c49cac3ba1e9d1aa7ad0ff36b9e36d73c05b8abcaf96df0bacd2c9653f30ec29e1284af8749a9b2803c2727e992a6e65df192e1875c3e6d3553ffb7cb34ffee8f8ac0123c390454b42a0316952cbc9949376d9320ec207f77c2d5eb9e86d720cf8e9008a9a51932b45cd4cab21414c92d1c20f9e15e3fc16c7ce181e9ab19b01b70343934c823b1215e173405dd225233823cd4a604a77f06b14eb05b860e6cf8790335788c43abe9de1598e9952e5c7e6b2f8b17b1788ff3033e7d1635b008834bdf4054e6195e55000827c6202b227dde06f23ae21c00b371bdb6b7ea47b2e78844b52a77f9f0929790dcd7df2752e4af092d539c87c18751a5eb3eb4d38a2a0e070064b4ffaacff0543b115cc89f6c7e78f12147ebfcf1c80bac8f98deb59cbe670adb4cd1882a7e0ca4ba85ae9d445223ffb32301d46c0c9b05a830cbea0f72294ab3b539e4ed7cac2e22b235e8ceedeb643fb90b061a58368e76036ff3c1828d8a4e21288662afb6f2acab00d734db7ffc8373a928571819ce9ea6cb0956a6093b2b1f65662b76bc6ac8a171451714e1d0e4ff7647fe7551d3cf16f37cb5547317e4fef51e4fb471de6ffbb90c2dd4a64266c4c2f75fc62e58ec306fb92212fb262d8b138899a3b53e67cde2f97d94cd2265cc04d32b29edf77e75b1f88372495cb2937f183bfc8604d72efb3af5c1f41b665b25592676b0ad2185478eade7e663e743e0e09cce6224c787ce1d789dc4a9b350bfe3a75f551341b11dd96cdaea17989dad565b16324a69842dc29a0ed16744ea5935598ac8238e146139189927a14d3b2863044b63b468ae75f48fab68ad235c36daffebfe4b468fc9b13198b1a683dcd3b3b4294ba22caddbacf8792d5783bc12e2538e4609e6bb6e9eeab98a06452c252a657f400260458c29fae8879097698c9aba2b2d889fc78f00d0d8271e09e8542b71018be6ff8cb03cb423e79303047d6ce124a00f64461b899bbddc4fe87ff677533391e16c01fa9cd6420bdc856c4c7f057b249ee9817efd6ab2cd02eb887d2631435ef2d5a1c7e57ac046ef615a1285ca89ade18ae69af3b3f8f76ca8aa060e373c0f99424fe1c5fadc72fe145fd2d4e4da4b78597890516857de188fcdaf15e3b0871b346cd39ab772cc25fab49e60c818cde934b137144adfc4fbde3ddbeccce9679f02b66746e822c67b3ed5fdafb4a936a2683b39a002115ecd62220605ca542610a80f2e3530aa89d3ed6ed9c57bbfd5db3a0b62786a608309a355443c616032008f9458b2f10db93e29470192370084e9322c309c9b23333b46d04e79176659503ad4b05deebb3c67d715ee6e84a89002ea6f7f71bf41ad36b42c8ae01c97174dbb641e50641aba60c291a84e906c013087370a5043e07d36fcead378f6c1e6ed3f5ac695124b82b20261cf7c9b82172e09c81d7d39eed72aee5678613a3c671ddd44f2c7c75a3b5d316aa165d56594fccab20903d7f503a08928e76c779918b2463b720ee6367a43e494a1db3ed1a80690e665570c01ce7eb979cdd95d4e1ca51730eb2cd63ffb2a56049601627c9788254945142dce85adbe1eb5997d16cdfe2a3758b13dc6bb121e2206ae64206868c1c5e89a101bc121719ac435dcad093f5f67cefd863cc7c8f3fc8a9dc62a83c115f1ce714b18af067951aa06dd9bb4ed98a820bf4704d156977caa4e6415b2a0df0386e2f6a061bf44abc8a397cf4abdafc51b78ebec9831f3c60fde6e62a1fd082903080aef20ff8de8bc0dced06f627514600539ca7114a088848da4244a85b4cf5b976d3a698c9a568d417e276917baba05d1a02181db2e6cc35986da4ccc63f8cd8e85a4a923dd27e2f499664601fdc44fdf46e2d2880cd5a7ece89c370234c438dcc0b43865cc62bad21e9dc37da758cbe01752f02fd9cbfe98630a30a78bb1239e25cdaba3d45d13cd3e7216d9d8070f3ff1a0cd9a0c91f29974c98f2677ba88c1091bde4be0cd37ea5eeb3b9cd59560a00ddd40bbd60ffb8d4daa973ef0977c18dd4b38a605cee957872dca85787c37b6931293eddb77015faf143d1d28d24822d1a5d134799e8175a38b255aaf0e39b68c7f734e2e1e7044626daa84c9113e86d86ef63c863703703ea163319261dcf516c32d49478f7af30d52baa18ea6b0fc286c06b7e4ee019bf3fe74845a652d4a52aaa241a189c411e90e2953863a2bc4124e573607b94cdff19e280731824931a83f056cb5857672619b97ce38081592c0c319ce72e04e9eadce89775cfb5a4b2842663bc79bde565435cbcd46c4d505ceef7dde86512d39d4cb270deb7e79ebf8602bdc0d76c3e833d36ee08be10be634f44056c2f3fd6a328c7cd562e9c96ff7845fc3df81a876bb07f1cc833bed6ca1dc5cf935a4e959db6a4fae6edbc45357d8758faa9cd04cd41eb6efcfbd91658519bf520b90107f767d126854818485e98cb7ef56804de6950bf4e72098a949d14ea0e4e9f2534cf16cac0aeb970fc5c39f37e93910d5c99ac163792260d2280ec5c9a79bf295588ec23f524aae65f800f9c39e338f3d66b1a69e5488e04823eab36ae6ec6a2c5ce133ccd819a2b217b1ab7f4afd1697bb42929b3131358b5421c83f925571934442d0fd0ce3990d4e5d31d8b956f76df3c2f8533e46b892c88692ce009155dd5c7dbe4c86874b95762650f63e4b4aabb41320978b05b80cfe8fa2830904ef6b5c4f7ad46ca5dac151c9077c4d2c6adfe5066a8eb09a9bc6892330ea2b259a53c7137f8498254e1b04bf920c35c5333c4d640b11da60917ae921037b4aedbd6a0fbeeaf88ef6defc830552b4cbe3fe2a844806a48923dd428ea1c8d797bd8e6aabd1d1a8c97c8038b627120a77f4e47fa1f788aa9da268b0ec10fc453cb722685df76547dbf55a16663aa2b2a51e9c52456cccdf682592d1369dd12e3d3cb504e0f2d7004e62c297d5a25d0298045dae8fca8cb795ea57288b85a7e705820087d55ca6c42e920e2aa1174e128622cf64a197fd728cb2949536ba63e8bda8589261f1377caea37302e47228d3708a5666c66ba711d3c0b310a8c47e86d26597299d523c28c90e4feab43e950f398f7b61ccf7e6490d75ba6d8214e2d5ef2d7a088db490e1ebacf4e6eecc896cb1c704f0a8fcdf4ccb5dfa53eaf43d709287f36c10188c19fd59da7d73494de089c1b0a69ee22dcb847001c5317846a876bee1685d11c4db0673ec4c3a12008bb719650525b3c39e2b0469edda93830b3f1bde3e5b0b4637197866bb08c5858cf0d9876e3c7cad54169887bf9c80f9f4be362e1bc8c27f3434e9a918bac355c184bd899b9aebe6be20e70c0c69234342eb8b57aa9ffb7797a32df91cec2bbc90201658ca2297bf1fe68e65363867e1f6ad79b827f363d64fbd3b188d95307d011c4ce5bf4407908c058eeb97ec98dd0ebfdab6b348fa387f2a7573cac25344c983e8fd526c30ee6d59fe99a30c7d7e2864aa22bfa49df5f32da68309cab3ed9c2ce69b6ecb8508ce28a43ebd6c809b8afd07a4606e664965d316f3707a3abee9bcdc32a78031b0171fb565d90c16cd56e5792c0cf618b799715f32538e38f493d4e19ec76fc8a07576a13975706bfc2bb1516c2d18a4385cc37a206eac6c9fb8d073572ba2671d2198abf24fdd0c40d079ae44962c26743b4bf5950ac5ee34c5d7bd60b364ce670958112c37b9829bed7e1327356d6b94af3ba020c2337b2dba37d00af8a128a614390cdde62ce871f948427fb5c187df9a1540a5cc71da1a86144acbfd94bf433f744f0c4f2a675eba3ed251c5b11b08dfefc726c0394a9b75121d88467ed4b2cd69819dfe50693a4a4c8370d3af12f41c0067283bbb5a90044a340fc357a11081a6c13bb9c32d9caa448479fd5f0302b6729ca7233094540b14546d6bcc15771c2686279b34f9c0914f5306d0fabd5979266ea01a17a22507e560dbf904dd62c40e2bccb468710ee4c1caf4e786", 0xcfa}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f0000003040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xffffffffffffff25, &(0x7f0000003100), 0x0, &(0x7f0000003140)=""/29, 0x1d}, 0x0) mkdirat$cgroup(r2, &(0x7f0000000fc0)='syz0\x00', 0x1ff) recvmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000200)=@sco, 0x26c, &(0x7f0000002b80), 0x218, &(0x7f00000076c0)=""/156, 0xfffffffffffffe11, 0xfffffffffffffffa}, 0x0) recvmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x0, 0x0}, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000001000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f80)={&(0x7f0000000100)='./cgroup.cpu/syz0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) [ 366.318493][T14182] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.5'. 15:21:43 executing program 3: socket$kcm(0x2, 0xfffffffffffffffd, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000380)='memory.swap.current\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="2e0000001e008109e00f80ecdb4cb92e0a4824181e0cd30be8bd6efb080003000e00140013000000060005001200", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000001580)={&(0x7f00000015c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)=""/236, 0xec}, {&(0x7f00000003c0)=""/236, 0xec}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/151, 0x97}], 0x4, &(0x7f00000014c0)=""/132, 0x84}, 0x40000120) 15:21:43 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000140)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000740)="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", 0xe4d}], 0x1}, 0x0) 15:21:43 executing program 4: socket$kcm(0x2, 0xfffffffffffffffd, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000380)='memory.swap.current\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="2e0000001e008109e00f80ecdb4cb92e0a4824181e0cd30be8bd6efb080003000e00140013000000060005001200", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000001580)={&(0x7f00000015c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)=""/236, 0xec}, {&(0x7f00000003c0)=""/236, 0xec}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/151, 0x97}], 0x4, &(0x7f00000014c0)=""/132, 0x84}, 0x40000120) [ 366.608926][T14172] device nr0 entered promiscuous mode 15:21:44 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'nr0\x01\x00', 0x32}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 15:21:44 executing program 1: socket$kcm(0x2, 0xfffffffffffffffd, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000380)='memory.swap.current\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="2e0000001e008109e00f80ecdb4cb92e0a4824181e0cd30be8bd6efb080003000e00140013000000060005001200", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000001580)={&(0x7f00000015c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)=""/236, 0xec}, {&(0x7f00000003c0)=""/236, 0xec}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/151, 0x97}], 0x4, &(0x7f00000014c0)=""/132, 0x84}, 0x40000120) 15:21:44 executing program 3: socket$kcm(0x2, 0xfffffffffffffffd, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000380)='memory.swap.current\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="2e0000001e008109e00f80ecdb4cb92e0a4824181e0cd30be8bd6efb080003000e00140013000000060005001200", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000001580)={&(0x7f00000015c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)=""/236, 0xec}, {&(0x7f00000003c0)=""/236, 0xec}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/151, 0x97}], 0x4, &(0x7f00000014c0)=""/132, 0x84}, 0x40000120) 15:21:44 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000140)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000740)="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", 0xe4d}], 0x1}, 0x0) 15:21:44 executing program 4: socket$kcm(0x2, 0xfffffffffffffffd, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000380)='memory.swap.current\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="2e0000001e008109e00f80ecdb4cb92e0a4824181e0cd30be8bd6efb080003000e00140013000000060005001200", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000001580)={&(0x7f00000015c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)=""/236, 0xec}, {&(0x7f00000003c0)=""/236, 0xec}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/151, 0x97}], 0x4, &(0x7f00000014c0)=""/132, 0x84}, 0x40000120) 15:21:44 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x40000000000002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup(r2, &(0x7f0000000000)='syz1\xa0', 0x1ff) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f0000003040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xffffffffffffff25, &(0x7f0000003100), 0x0, &(0x7f0000003140)=""/29, 0x1d}, 0x0) mkdirat$cgroup(r2, &(0x7f0000000fc0)='syz0\x00', 0x1ff) recvmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000200)=@sco, 0x26c, &(0x7f0000002b80), 0x218, &(0x7f00000076c0)=""/156, 0xfffffffffffffe11, 0xfffffffffffffffa}, 0x0) recvmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x0, 0x0}, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000001000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f80)={&(0x7f0000000100)='./cgroup.cpu/syz0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) 15:21:44 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0, 0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="140000000000000004000000"], 0xc}, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='cgroup.controllers\x00', r0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x100, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r4, &(0x7f00000002c0)="fde3abfcd388f83367f1b649f6730a1a5b15d16a66f36afa043b5d815614a990732632d411776f7d755c703eca9e69b96479a817cf24e2dc6509cac545a7e2203e7e04", 0x0}, 0x18) recvmsg(0xffffffffffffffff, 0x0, 0x203e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0xfffffffffffffc29) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0xb02e5f4ddde18735, 0x650, 0x3, 0x7f, 0x21, r4, 0x81, [], 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x3c) socket$kcm(0x10, 0x0, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f00000003c0)='./file0\x00', r4}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f0000000240)='cgroup.controllers\x00', 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r6, 0x4) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r4) r7 = openat$cgroup_ro(r4, &(0x7f0000000500)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000540)=r7, 0x4) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000440)=r4) 15:21:44 executing program 1: socket$kcm(0x2, 0xfffffffffffffffd, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000380)='memory.swap.current\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="2e0000001e008109e00f80ecdb4cb92e0a4824181e0cd30be8bd6efb080003000e00140013000000060005001200", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000001580)={&(0x7f00000015c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)=""/236, 0xec}, {&(0x7f00000003c0)=""/236, 0xec}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/151, 0x97}], 0x4, &(0x7f00000014c0)=""/132, 0x84}, 0x40000120) 15:21:44 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f0000000380)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_type(r0, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000340)=0x82) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'ifb0\x00'}) perf_event_open(&(0x7f00000003c0)={0x0, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x400000) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r4, 0x28, &(0x7f0000000440)}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:21:44 executing program 4: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000c40), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=0xffffffffffffffff, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x2, @loopback={0x0, 0x42}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000100)="fa", 0x1}], 0x1}, 0x40) 15:21:44 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) 15:21:44 executing program 4: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000c40), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=0xffffffffffffffff, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x2, @loopback={0x0, 0x42}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000100)="fa", 0x1}], 0x1}, 0x40) [ 367.525840][T14243] device nr0 entered promiscuous mode [ 367.865431][T14270] device nr0 entered promiscuous mode 15:21:45 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'nr0\x01\x00', 0x32}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 15:21:45 executing program 4: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000c40), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=0xffffffffffffffff, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x2, @loopback={0x0, 0x42}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000100)="fa", 0x1}], 0x1}, 0x40) 15:21:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x4, [{0x0, 0x5, 0x4}, {0x0, 0x5}]}]}}, &(0x7f00000003c0)=""/144, 0x3e, 0x90, 0x1}, 0x20) 15:21:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x4, [{0x0, 0x5, 0x4}, {0x0, 0x5}]}]}}, &(0x7f00000003c0)=""/144, 0x3e, 0x90, 0x1}, 0x20) 15:21:45 executing program 4: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x400000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000c40), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=0xffffffffffffffff, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x2, @loopback={0x0, 0x42}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000100)="fa", 0x1}], 0x1}, 0x40) 15:21:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x4, [{0x0, 0x5, 0x4}, {0x0, 0x5}]}]}}, &(0x7f00000003c0)=""/144, 0x3e, 0x90, 0x1}, 0x20) [ 368.341485][T14285] device nr0 entered promiscuous mode 15:21:45 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0, 0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="140000000000000004000000"], 0xc}, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='cgroup.controllers\x00', r0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x100, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r4, &(0x7f00000002c0)="fde3abfcd388f83367f1b649f6730a1a5b15d16a66f36afa043b5d815614a990732632d411776f7d755c703eca9e69b96479a817cf24e2dc6509cac545a7e2203e7e04", 0x0}, 0x18) recvmsg(0xffffffffffffffff, 0x0, 0x203e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0xfffffffffffffc29) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0xb02e5f4ddde18735, 0x650, 0x3, 0x7f, 0x21, r4, 0x81, [], 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x3c) socket$kcm(0x10, 0x0, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f00000003c0)='./file0\x00', r4}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f0000000240)='cgroup.controllers\x00', 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r6, 0x4) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r4) r7 = openat$cgroup_ro(r4, &(0x7f0000000500)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000540)=r7, 0x4) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000440)=r4) 15:21:45 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000001e000507ed008064d200100001000080000000000080000000000300f88000f01700d0bd000000000000", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) socket$kcm(0x29, 0x0, 0x0) recvmsg(r1, &(0x7f00000005c0)={&(0x7f0000000080)=@xdp, 0x80, 0x0}, 0x0) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000001880)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) getpid() perf_event_open(&(0x7f0000001780)={0x0, 0x70, 0x4, 0x8, 0xdfdc, 0x800, 0x0, 0x0, 0x8, 0x0, 0x0, 0x261, 0x100000001, 0x4, 0x1000, 0x0, 0x0, 0x10001, 0x7fff7ffffffffc, 0x0, 0x0, 0x0, 0x7ffffffe, 0x0, 0x5, 0x0, 0x0, 0x800, 0x1, 0x0, 0x6, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0xff, 0x9, 0x0, 0xfffffffffffffeac, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x7f, 0x4, 0x0, 0x20000000, 0x2, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) socket$kcm(0x10, 0x0, 0x4) openat$cgroup_ro(r3, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) 15:21:45 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f0000000380)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_type(r0, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000340)=0x82) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'ifb0\x00'}) perf_event_open(&(0x7f00000003c0)={0x0, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x400000) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r4, 0x28, &(0x7f0000000440)}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:21:45 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) 15:21:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x4, [{0x0, 0x5, 0x4}, {0x0, 0x5}]}]}}, &(0x7f00000003c0)=""/144, 0x3e, 0x90, 0x1}, 0x20) 15:21:46 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'nr0\x01\x00', 0x32}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 15:21:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) r1 = perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x80, 0x1f, 0x5, 0x0, 0x1, 0xd40, 0x1, 0x2, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x20, 0x0, 0x0, 0x3, 0xffffffff, 0x0, 0x3, 0x4, 0x0, 0x7d1b, 0x3, 0x8, 0x8949, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x7}, 0x400, 0x400, 0x0, 0x0, 0xc505, 0x6, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000880)={&(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000400)=""/186, 0xba}, 0x2) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f00000000c0)={'tunl0\x00', @dev}) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xa01, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'yam0\x00', 0x8000}) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x18b) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r1, 0x0, 0x2, &(0x7f0000000040)='@\x00'}, 0x30) perf_event_open(0x0, r7, 0x3, r1, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000006c80)) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000200)={r8, r2}) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r9) 15:21:46 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000001e000507ed008064d200100001000080000000000080000000000300f88000f01700d0bd000000000000", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) socket$kcm(0x29, 0x0, 0x0) recvmsg(r1, &(0x7f00000005c0)={&(0x7f0000000080)=@xdp, 0x80, 0x0}, 0x0) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000001880)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) getpid() perf_event_open(&(0x7f0000001780)={0x0, 0x70, 0x4, 0x8, 0xdfdc, 0x800, 0x0, 0x0, 0x8, 0x0, 0x0, 0x261, 0x100000001, 0x4, 0x1000, 0x0, 0x0, 0x10001, 0x7fff7ffffffffc, 0x0, 0x0, 0x0, 0x7ffffffe, 0x0, 0x5, 0x0, 0x0, 0x800, 0x1, 0x0, 0x6, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0xff, 0x9, 0x0, 0xfffffffffffffeac, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x7f, 0x4, 0x0, 0x20000000, 0x2, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) socket$kcm(0x10, 0x0, 0x4) openat$cgroup_ro(r3, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) [ 368.906988][ T26] device hsr_slave_0 left promiscuous mode [ 368.968163][ T26] device hsr_slave_1 left promiscuous mode [ 369.043598][ T26] device bridge_slave_1 left promiscuous mode [ 369.050595][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.104055][ T26] device bridge_slave_0 left promiscuous mode [ 369.110946][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.042235][ T26] team0 (unregistering): Port device team_slave_1 removed [ 371.056060][ T26] team0 (unregistering): Port device team_slave_0 removed [ 371.067729][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 371.118659][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 371.201935][ T26] bond0 (unregistering): Released all slaves [ 371.331871][T14328] device nr0 entered promiscuous mode 15:21:48 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0, 0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="140000000000000004000000"], 0xc}, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='cgroup.controllers\x00', r0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x100, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r4, &(0x7f00000002c0)="fde3abfcd388f83367f1b649f6730a1a5b15d16a66f36afa043b5d815614a990732632d411776f7d755c703eca9e69b96479a817cf24e2dc6509cac545a7e2203e7e04", 0x0}, 0x18) recvmsg(0xffffffffffffffff, 0x0, 0x203e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0xfffffffffffffc29) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0xb02e5f4ddde18735, 0x650, 0x3, 0x7f, 0x21, r4, 0x81, [], 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x3c) socket$kcm(0x10, 0x0, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f00000003c0)='./file0\x00', r4}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f0000000240)='cgroup.controllers\x00', 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r6, 0x4) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r4) r7 = openat$cgroup_ro(r4, &(0x7f0000000500)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000540)=r7, 0x4) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000440)=r4) [ 371.478829][T14342] device nr0 entered promiscuous mode [ 371.494342][T14327] __nla_validate_parse: 13 callbacks suppressed [ 371.494353][T14327] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 15:21:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) 15:21:48 executing program 2: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback=0xac14141f}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) 15:21:48 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000001e000507ed008064d200100001000080000000000080000000000300f88000f01700d0bd000000000000", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) socket$kcm(0x29, 0x0, 0x0) recvmsg(r1, &(0x7f00000005c0)={&(0x7f0000000080)=@xdp, 0x80, 0x0}, 0x0) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000001880)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) getpid() perf_event_open(&(0x7f0000001780)={0x0, 0x70, 0x4, 0x8, 0xdfdc, 0x800, 0x0, 0x0, 0x8, 0x0, 0x0, 0x261, 0x100000001, 0x4, 0x1000, 0x0, 0x0, 0x10001, 0x7fff7ffffffffc, 0x0, 0x0, 0x0, 0x7ffffffe, 0x0, 0x5, 0x0, 0x0, 0x800, 0x1, 0x0, 0x6, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0xff, 0x9, 0x0, 0xfffffffffffffeac, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x7f, 0x4, 0x0, 0x20000000, 0x2, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000001f7a2b5074dbd9cd0a7f38f58ecd7ba3f1ac2186192e7f768100000000000000000000f9ff000000d2b4def8dab15d959db2d0f571058be5f122ff230944ddc2d87570d77bfb1f0c502e333135840d4178d4b0fd71cec36b2786ca699c345c01f52b4180743c1bfe8b8cdcc31df5c76e3bc01257441771988e34402e0a15e6eea3717623d8573155f667a2c532f1b359816f08a60ee0103eef84bb4b2ef70598703f6ec0a65675293804462ac9fa1fae3c72c4684d862c9e1b60b7954c658de173afb4af0f8cbe4b03c49197848d6a4bbf5f73d6e1d8f8b283fff14c3f36df30b160845bd3c11b83105f5525bbd6b92836587e1cb37923b01809a697064990933496a7a63a2cc527274a3525"]) socket$kcm(0x10, 0x0, 0x4) openat$cgroup_ro(r3, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) [ 371.675112][T14351] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 15:21:48 executing program 2: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback=0xac14141f}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) 15:21:49 executing program 2: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback=0xac14141f}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) 15:21:49 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f0000000380)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_type(r0, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000340)=0x82) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'ifb0\x00'}) perf_event_open(&(0x7f00000003c0)={0x0, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x400000) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r4, 0x28, &(0x7f0000000440)}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:21:49 executing program 2: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback=0xac14141f}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) 15:21:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) r1 = perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x80, 0x1f, 0x5, 0x0, 0x1, 0xd40, 0x1, 0x2, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x20, 0x0, 0x0, 0x3, 0xffffffff, 0x0, 0x3, 0x4, 0x0, 0x7d1b, 0x3, 0x8, 0x8949, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x7}, 0x400, 0x400, 0x0, 0x0, 0xc505, 0x6, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000880)={&(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000400)=""/186, 0xba}, 0x2) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f00000000c0)={'tunl0\x00', @dev}) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xa01, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'yam0\x00', 0x8000}) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df006100260600009e000000cfab170e16ae833ecfe701bbfb3aaedcdcdf2f1700800000fdb857cc209887e3e610feb2209458ec8c3df08d445bc28100468568f0b62a989224f97702be4425c1acb100000300000000000000004000f0ad0000000008000089529e69617fd3c9b5b2c243d012670010449ee917594a4c133e2554cf8ce0efe540e58fc43c06ffd3e9de5047414156b26a3dc73dddc3d04e6894b461f2b14379dba56a00bb5ddfa58bb531980200000000000000b7980ef3b7486155f4a229d118c30bb369ec3f29890f314b80812ed31aefabd91304ac0df9a4f93c8a744c9989112a13cc678b1c6bc5dc897712a82e1ffa8cf8d1bc9d356b9994efbc14274e06a0caa3d833b60d3c6a0a6641de35874612a3abe3619eaf21332324c079900c0fbe0413dd77f9fa93fffa88722d804b19ab6ea73a3816f20675f2b5e32d100000000000000000000014da59d4fc00c5b6336543504243731a12815866bd450cca78ecfd5ddff7335d1db0116b86792575b8d7f72ed2"], 0x18b) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r1, 0x0, 0x2, &(0x7f0000000040)='@\x00'}, 0x30) perf_event_open(0x0, r7, 0x3, r1, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000006c80)) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000200)={r8, r2}) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r9) 15:21:49 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) [ 372.219402][T14360] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 15:21:49 executing program 2: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback=0xac14141f}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) 15:21:49 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000001e000507ed008064d200100001000080000000000080000000000300f88000f01700d0bd000000000000", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) socket$kcm(0x29, 0x0, 0x0) recvmsg(r1, &(0x7f00000005c0)={&(0x7f0000000080)=@xdp, 0x80, 0x0}, 0x0) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000001880)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) getpid() perf_event_open(&(0x7f0000001780)={0x0, 0x70, 0x4, 0x8, 0xdfdc, 0x800, 0x0, 0x0, 0x8, 0x0, 0x0, 0x261, 0x100000001, 0x4, 0x1000, 0x0, 0x0, 0x10001, 0x7fff7ffffffffc, 0x0, 0x0, 0x0, 0x7ffffffe, 0x0, 0x5, 0x0, 0x0, 0x800, 0x1, 0x0, 0x6, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0xff, 0x9, 0x0, 0xfffffffffffffeac, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x7f, 0x4, 0x0, 0x20000000, 0x2, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000001f7a2b5074dbd9cd0a7f38f58ecd7ba3f1ac2186192e7f768100000000000000000000f9ff000000d2b4def8dab15d959db2d0f571058be5f122ff230944ddc2d87570d77bfb1f0c502e333135840d4178d4b0fd71cec36b2786ca699c345c01f52b4180743c1bfe8b8cdcc31df5c76e3bc01257441771988e34402e0a15e6eea3717623d8573155f667a2c532f1b359816f08a60ee0103eef84bb4b2ef70598703f6ec0a65675293804462ac9fa1fae3c72c4684d862c9e1b60b7954c658de173afb4af0f8cbe4b03c49197848d6a4bbf5f73d6e1d8f8b283fff14c3f36df30b160845bd3c11b83105f5525bbd6b92836587e1cb37923b01809a697064990933496a7a63a2cc527274a3525"]) socket$kcm(0x10, 0x0, 0x4) openat$cgroup_ro(r3, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) 15:21:49 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0, 0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="140000000000000004000000"], 0xc}, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='cgroup.controllers\x00', r0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x100, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r4, &(0x7f00000002c0)="fde3abfcd388f83367f1b649f6730a1a5b15d16a66f36afa043b5d815614a990732632d411776f7d755c703eca9e69b96479a817cf24e2dc6509cac545a7e2203e7e04", 0x0}, 0x18) recvmsg(0xffffffffffffffff, 0x0, 0x203e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0xfffffffffffffc29) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0xb02e5f4ddde18735, 0x650, 0x3, 0x7f, 0x21, r4, 0x81, [], 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x3c) socket$kcm(0x10, 0x0, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f00000003c0)='./file0\x00', r4}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f0000000240)='cgroup.controllers\x00', 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r6, 0x4) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r4) r7 = openat$cgroup_ro(r4, &(0x7f0000000500)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000540)=r7, 0x4) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000440)=r4) [ 372.518964][T14379] device nr0 entered promiscuous mode [ 372.582236][T14396] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 372.615546][T14398] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 15:21:49 executing program 5: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback=0xac14141f}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) 15:21:49 executing program 2: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback=0xac14141f}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) [ 372.852802][T14385] device nr0 entered promiscuous mode 15:21:50 executing program 5: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback=0xac14141f}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) 15:21:50 executing program 2: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback=0xac14141f}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) 15:21:50 executing program 5: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xff0f}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback=0xac14141f}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r0) 15:21:50 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f0000000380)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_type(r0, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000340)=0x82) openat$cgroup_type(r1, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'ifb0\x00'}) perf_event_open(&(0x7f00000003c0)={0x0, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x400000) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r4, 0x28, &(0x7f0000000440)}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 15:21:50 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000400)=@in={0x2, 0x4e21, @local}, 0x80, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x0, 0x7, "9403"}], 0x18}, 0x0) [ 373.868378][T14429] device nr0 entered promiscuous mode 15:21:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) r1 = perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x80, 0x1f, 0x5, 0x0, 0x1, 0xd40, 0x1, 0x2, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x20, 0x0, 0x0, 0x3, 0xffffffff, 0x0, 0x3, 0x4, 0x0, 0x7d1b, 0x3, 0x8, 0x8949, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x7}, 0x400, 0x400, 0x0, 0x0, 0xc505, 0x6, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000880)={&(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000400)=""/186, 0xba}, 0x2) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f00000000c0)={'tunl0\x00', @dev}) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xa01, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'yam0\x00', 0x8000}) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x18b) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r1, 0x0, 0x2, &(0x7f0000000040)='@\x00'}, 0x30) perf_event_open(0x0, r7, 0x3, r1, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000006c80)) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000200)={r8, r2}) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r9) 15:21:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="1400000022008151e01980ecdb4ca90401006516", 0x14}], 0x1}, 0x0) 15:21:51 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) gettid() write$cgroup_pid(r1, &(0x7f0000000500), 0x12) r2 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xe, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r2, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:21:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)=""/28, 0xfe80}], 0x1, &(0x7f0000000300)=""/199, 0xc7}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x8800, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:21:51 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000400)=@in={0x2, 0x4e21, @local}, 0x80, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x0, 0x7, "9403"}], 0x18}, 0x0) 15:21:51 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000400)=@in={0x2, 0x4e21, @local}, 0x80, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x0, 0x7, "9403"}], 0x18}, 0x0) 15:21:51 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) gettid() write$cgroup_pid(r1, &(0x7f0000000500), 0x12) r2 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xe, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r2, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:21:51 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000400)=@in={0x2, 0x4e21, @local}, 0x80, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x0, 0x7, "9403"}], 0x18}, 0x0) 15:21:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="1400000022008151e01980ecdb4ca90401006516", 0x14}], 0x1}, 0x0) 15:21:51 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) gettid() write$cgroup_pid(r1, &(0x7f0000000500), 0x12) r2 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xe, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r2, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:21:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)=""/28, 0xfe80}], 0x1, &(0x7f0000000300)=""/199, 0xc7}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x8800, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:21:51 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) gettid() write$cgroup_pid(r1, &(0x7f0000000500), 0x12) r2 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xe, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r2, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 374.901905][T14445] device nr0 entered promiscuous mode 15:21:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) r1 = perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x80, 0x1f, 0x5, 0x0, 0x1, 0xd40, 0x1, 0x2, 0x0, 0x0, 0x7fffffff, 0x4, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x20, 0x0, 0x0, 0x3, 0xffffffff, 0x0, 0x3, 0x4, 0x0, 0x7d1b, 0x3, 0x8, 0x8949, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x7}, 0x400, 0x400, 0x0, 0x0, 0xc505, 0x6, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000880)={&(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000400)=""/186, 0xba}, 0x2) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f00000000c0)={'tunl0\x00', @dev}) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xa01, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'yam0\x00', 0x8000}) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x18b) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r1, 0x0, 0x2, &(0x7f0000000040)='@\x00'}, 0x30) perf_event_open(0x0, r7, 0x3, r1, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000006c80)) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000200)={r8, r2}) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r9) 15:21:52 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) gettid() write$cgroup_pid(r1, &(0x7f0000000500), 0x12) r2 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xe, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r2, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:21:52 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) gettid() write$cgroup_pid(r1, &(0x7f0000000500), 0x12) r2 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xe, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r2, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:21:52 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) gettid() write$cgroup_pid(r1, &(0x7f0000000500), 0x12) r2 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xe, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r2, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:21:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="1400000022008151e01980ecdb4ca90401006516", 0x14}], 0x1}, 0x0) 15:21:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)=""/28, 0xfe80}], 0x1, &(0x7f0000000300)=""/199, 0xc7}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x8800, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:21:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="1400000022008151e01980ecdb4ca90401006516", 0x14}], 0x1}, 0x0) 15:21:52 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) gettid() write$cgroup_pid(r1, &(0x7f0000000500), 0x12) r2 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xe, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r2, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:21:52 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) gettid() write$cgroup_pid(r1, &(0x7f0000000500), 0x12) r2 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xe, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r2, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:21:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)=""/28, 0xfe80}], 0x1, &(0x7f0000000300)=""/199, 0xc7}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x8800, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:21:52 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) gettid() write$cgroup_pid(r1, &(0x7f0000000500), 0x12) r2 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xe, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r2, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:21:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001380)={&(0x7f0000000100)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000001240)=[{0x0}], 0x1, &(0x7f0000001280)=""/200, 0xc8}, 0x10042) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x3}, 0x14) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) [ 376.127307][T14491] device nr0 entered promiscuous mode 15:21:53 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\xff', 0x8001241, 0x0) write$cgroup_type(r0, 0x0, 0x0) 15:21:53 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) gettid() write$cgroup_pid(r1, &(0x7f0000000500), 0x12) r2 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xe, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r2, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:21:53 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004020000000000"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x4, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x4, 0xba, &(0x7f0000000400)=""/186, 0x0, 0x0, [], 0x0, 0x0, r0, 0x2, 0x0, 0x1, 0x10, &(0x7f0000000140), 0x2}, 0x70) 15:21:53 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) gettid() write$cgroup_pid(r1, &(0x7f0000000500), 0x12) r2 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xe, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r2, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:21:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)={0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001500), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x16, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0xfc) 15:21:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001380)={&(0x7f0000000100)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000001240)=[{0x0}], 0x1, &(0x7f0000001280)=""/200, 0xc8}, 0x10042) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x3}, 0x14) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 15:21:53 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004020000000000"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x4, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x4, 0xba, &(0x7f0000000400)=""/186, 0x0, 0x0, [], 0x0, 0x0, r0, 0x2, 0x0, 0x1, 0x10, &(0x7f0000000140), 0x2}, 0x70) 15:21:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)={0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001500), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x16, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0xfc) 15:21:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001380)={&(0x7f0000000100)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000001240)=[{0x0}], 0x1, &(0x7f0000001280)=""/200, 0xc8}, 0x10042) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x3}, 0x14) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 15:21:53 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\xff', 0x8001241, 0x0) write$cgroup_type(r0, 0x0, 0x0) 15:21:53 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) gettid() write$cgroup_pid(r1, &(0x7f0000000500), 0x12) r2 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xe, 0x0, 0x0) gettid() setsockopt$sock_attach_bpf(r2, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:21:54 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x167) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@typedef={0x2}, @func_proto]}, {0x0, [0xb55e109fe4e8d9d1, 0x61, 0x0]}}, &(0x7f00000003c0)=""/4096, 0x35, 0x1000, 0x1}, 0x20) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) recvmsg(0xffffffffffffffff, 0x0, 0x0) 15:21:54 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004020000000000"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x4, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x4, 0xba, &(0x7f0000000400)=""/186, 0x0, 0x0, [], 0x0, 0x0, r0, 0x2, 0x0, 0x1, 0x10, &(0x7f0000000140), 0x2}, 0x70) 15:21:54 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\xff', 0x8001241, 0x0) write$cgroup_type(r0, 0x0, 0x0) 15:21:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001380)={&(0x7f0000000100)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000001240)=[{0x0}], 0x1, &(0x7f0000001280)=""/200, 0xc8}, 0x10042) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0xffffff7f00000000, 0xe, 0x0, &(0x7f00000000c0)="3b1163cd78b89e1ba101df682bb0", 0x0}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x3}, 0x14) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) 15:21:54 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x167) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@typedef={0x2}, @func_proto]}, {0x0, [0xb55e109fe4e8d9d1, 0x61, 0x0]}}, &(0x7f00000003c0)=""/4096, 0x35, 0x1000, 0x1}, 0x20) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) recvmsg(0xffffffffffffffff, 0x0, 0x0) 15:21:54 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004020000000000"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x4, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x4, 0xba, &(0x7f0000000400)=""/186, 0x0, 0x0, [], 0x0, 0x0, r0, 0x2, 0x0, 0x1, 0x10, &(0x7f0000000140), 0x2}, 0x70) 15:21:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)={0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001500), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x16, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0xfc) 15:21:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000018008102e00f80ecdb4cb92e0a06022c000cd307e8bd6efb12001400030014a00200000006000500fec0", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 15:21:54 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\xff', 0x8001241, 0x0) write$cgroup_type(r0, 0x0, 0x0) 15:21:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00000011008105e00f80ecdb4cb9f207c804a01a000000880386fb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 15:21:54 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x167) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@typedef={0x2}, @func_proto]}, {0x0, [0xb55e109fe4e8d9d1, 0x61, 0x0]}}, &(0x7f00000003c0)=""/4096, 0x35, 0x1000, 0x1}, 0x20) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 377.350690][T14583] validate_nla: 8 callbacks suppressed [ 377.350700][T14583] netlink: 'syz-executor.4': attribute type 20 has an invalid length. 15:21:54 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x1281, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r0, 0x4) mkdir(&(0x7f0000000700)='./file0\x00', 0x0) [ 377.452516][T14583] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 377.460174][T14583] IPv6: NLM_F_CREATE should be set when creating new route [ 377.467580][T14583] IPv6: NLM_F_CREATE should be set when creating new route [ 377.474828][T14583] IPv6: NLM_F_CREATE should be set when creating new route 15:21:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x24}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000280)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() socket$kcm(0x11, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 15:21:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)={0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001500), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x16, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0xfc) 15:21:54 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x167) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@typedef={0x2}, @func_proto]}, {0x0, [0xb55e109fe4e8d9d1, 0x61, 0x0]}}, &(0x7f00000003c0)=""/4096, 0x35, 0x1000, 0x1}, 0x20) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) recvmsg(0xffffffffffffffff, 0x0, 0x0) 15:21:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000018008102e00f80ecdb4cb92e0a06022c000cd307e8bd6efb12001400030014a00200000006000500fec0", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 15:21:54 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x1281, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r0, 0x4) mkdir(&(0x7f0000000700)='./file0\x00', 0x0) 15:21:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00000011008105e00f80ecdb4cb9f207c804a01a000000880386fb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) [ 377.754726][T14609] netlink: 'syz-executor.4': attribute type 20 has an invalid length. 15:21:55 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=""/184, 0xb8}, 0x40000061) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000018c0)={0x0, 0x0, 0x659956bc71df6d89, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001900)={0x12, 0x5, 0x0, 0x1, 0x20, 0xffffffffffffff9c, 0x4, [], 0x0, r1, 0x2, 0xfffffffffffffc01}, 0x3c) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7db, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="b1eb01001d090000000032f46b6c406f50ee000030000000480000000040ec08cf0e"], 0x0, 0x22, 0x0, 0x100000}, 0x20) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x8, [@link_local, @broadcast, @remote, @broadcast, @broadcast, @empty, @remote, @dev={[], 0x17}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 15:21:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00000011008105e00f80ecdb4cb9f207c804a01a000000880386fb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) [ 377.827730][T14609] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 15:21:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000018008102e00f80ecdb4cb92e0a06022c000cd307e8bd6efb12001400030014a00200000006000500fec0", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 15:21:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x24}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000280)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() socket$kcm(0x11, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 15:21:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x24}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000280)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() socket$kcm(0x11, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 15:21:55 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x1281, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r0, 0x4) mkdir(&(0x7f0000000700)='./file0\x00', 0x0) 15:21:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00000011008105e00f80ecdb4cb9f207c804a01a000000880386fb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 15:21:55 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=""/184, 0xb8}, 0x40000061) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000018c0)={0x0, 0x0, 0x659956bc71df6d89, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001900)={0x12, 0x5, 0x0, 0x1, 0x20, 0xffffffffffffff9c, 0x4, [], 0x0, r1, 0x2, 0xfffffffffffffc01}, 0x3c) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7db, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="b1eb01001d090000000032f46b6c406f50ee000030000000480000000040ec08cf0e"], 0x0, 0x22, 0x0, 0x100000}, 0x20) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x8, [@link_local, @broadcast, @remote, @broadcast, @broadcast, @empty, @remote, @dev={[], 0x17}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) [ 378.190198][T14635] netlink: 'syz-executor.4': attribute type 20 has an invalid length. [ 378.277878][T14635] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 15:21:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000018008102e00f80ecdb4cb92e0a06022c000cd307e8bd6efb12001400030014a00200000006000500fec0", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 15:21:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x24}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000280)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() socket$kcm(0x11, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 15:21:55 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=""/184, 0xb8}, 0x40000061) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000018c0)={0x0, 0x0, 0x659956bc71df6d89, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001900)={0x12, 0x5, 0x0, 0x1, 0x20, 0xffffffffffffff9c, 0x4, [], 0x0, r1, 0x2, 0xfffffffffffffc01}, 0x3c) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7db, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="b1eb01001d090000000032f46b6c406f50ee000030000000480000000040ec08cf0e"], 0x0, 0x22, 0x0, 0x100000}, 0x20) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x8, [@link_local, @broadcast, @remote, @broadcast, @broadcast, @empty, @remote, @dev={[], 0x17}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 15:21:55 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x1281, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r0, 0x4) mkdir(&(0x7f0000000700)='./file0\x00', 0x0) 15:21:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x24}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000280)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() socket$kcm(0x11, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 378.569699][T14656] netlink: 'syz-executor.4': attribute type 20 has an invalid length. [ 378.605329][T14656] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 15:21:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x24}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000280)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() socket$kcm(0x11, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 15:21:55 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=""/184, 0xb8}, 0x40000061) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000018c0)={0x0, 0x0, 0x659956bc71df6d89, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001900)={0x12, 0x5, 0x0, 0x1, 0x20, 0xffffffffffffff9c, 0x4, [], 0x0, r1, 0x2, 0xfffffffffffffc01}, 0x3c) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7db, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="b1eb01001d090000000032f46b6c406f50ee000030000000480000000040ec08cf0e"], 0x0, 0x22, 0x0, 0x100000}, 0x20) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x8, [@link_local, @broadcast, @remote, @broadcast, @broadcast, @empty, @remote, @dev={[], 0x17}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 15:21:55 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=""/184, 0xb8}, 0x40000061) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000018c0)={0x0, 0x0, 0x659956bc71df6d89, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001900)={0x12, 0x5, 0x0, 0x1, 0x20, 0xffffffffffffff9c, 0x4, [], 0x0, r1, 0x2, 0xfffffffffffffc01}, 0x3c) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7db, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="b1eb01001d090000000032f46b6c406f50ee000030000000480000000040ec08cf0e"], 0x0, 0x22, 0x0, 0x100000}, 0x20) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x8, [@link_local, @broadcast, @remote, @broadcast, @broadcast, @empty, @remote, @dev={[], 0x17}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 15:21:56 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x0, 0x83d4}, 0x3c) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000380)='&@[\x00') 15:21:56 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=""/184, 0xb8}, 0x40000061) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000018c0)={0x0, 0x0, 0x659956bc71df6d89, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001900)={0x12, 0x5, 0x0, 0x1, 0x20, 0xffffffffffffff9c, 0x4, [], 0x0, r1, 0x2, 0xfffffffffffffc01}, 0x3c) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7db, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="b1eb01001d090000000032f46b6c406f50ee000030000000480000000040ec08cf0e"], 0x0, 0x22, 0x0, 0x100000}, 0x20) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x8, [@link_local, @broadcast, @remote, @broadcast, @broadcast, @empty, @remote, @dev={[], 0x17}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 15:21:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x24}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000280)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() socket$kcm(0x11, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 15:21:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socketpair(0x3, 0x0, 0x4, &(0x7f0000000240)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x10, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00'}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r1, &(0x7f0000000040)="0a2b376f4949f965f3ac97f70758becac31475f3033d1926df85788f7274dc516f199c2d3aa0aea12378ff075f11", 0x0}, 0x18) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280), 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f0000000140)='./file1\x00', r0}, 0x10) setsockopt$sock_attach_bpf(r3, 0x29, 0x33, &(0x7f0000000040), 0x52d) 15:21:56 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=""/184, 0xb8}, 0x40000061) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000018c0)={0x0, 0x0, 0x659956bc71df6d89, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001900)={0x12, 0x5, 0x0, 0x1, 0x20, 0xffffffffffffff9c, 0x4, [], 0x0, r1, 0x2, 0xfffffffffffffc01}, 0x3c) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7db, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="b1eb01001d090000000032f46b6c406f50ee000030000000480000000040ec08cf0e"], 0x0, 0x22, 0x0, 0x100000}, 0x20) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x8, [@link_local, @broadcast, @remote, @broadcast, @broadcast, @empty, @remote, @dev={[], 0x17}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 15:21:56 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x0, 0x83d4}, 0x3c) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000380)='&@[\x00') 15:21:56 executing program 2: socket$kcm(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x33f) r5 = getpid() perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x6, 0x0, 0x1ff, 0x2, 0x0, 0x56, 0x38, 0x5, 0x6, 0x0, 0x35, 0x0, 0x0, 0x0, 0x5, 0x4af5, 0x401, 0x1, 0xfffffffffffffffd, 0x0, 0x80000001, 0x8, 0x3, 0x8, 0x81, 0x0, 0x2, 0x800, 0x2, 0x87c, 0x7, 0x7ff, 0x100000001, 0x35, 0x8, 0x7f, 0x0, 0xd702, 0x1, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0xd61c, 0x3, 0x3, 0x3, 0x4}, r5, 0x8, r0, 0x1) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000700)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xf, 0x0, &(0x7f0000000240), &(0x7f0000000280)='GPL\x00', 0x1, 0xdc, &(0x7f0000000340)=""/220, 0x41f00, 0x1, [], 0x0, 0xe, r2, 0x8, &(0x7f00000002c0)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r6, 0x0, 0x33, 0x0, &(0x7f00000006c0)="f863670234e46aa72d5c0ab2f23ad8af6f9036c45fc1ed3a3a82d8d37d29f69c25790ac45d9f43c7cfa0b91d43f3a8746e73e7", 0x0, 0x1}, 0x28) r7 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x8000) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x7) 15:21:56 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=""/184, 0xb8}, 0x40000061) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000018c0)={0x0, 0x0, 0x659956bc71df6d89, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001900)={0x12, 0x5, 0x0, 0x1, 0x20, 0xffffffffffffff9c, 0x4, [], 0x0, r1, 0x2, 0xfffffffffffffc01}, 0x3c) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7db, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="b1eb01001d090000000032f46b6c406f50ee000030000000480000000040ec08cf0e"], 0x0, 0x22, 0x0, 0x100000}, 0x20) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x8, [@link_local, @broadcast, @remote, @broadcast, @broadcast, @empty, @remote, @dev={[], 0x17}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 15:21:56 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=""/184, 0xb8}, 0x40000061) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000018c0)={0x0, 0x0, 0x659956bc71df6d89, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001900)={0x12, 0x5, 0x0, 0x1, 0x20, 0xffffffffffffff9c, 0x4, [], 0x0, r1, 0x2, 0xfffffffffffffc01}, 0x3c) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7db, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="b1eb01001d090000000032f46b6c406f50ee000030000000480000000040ec08cf0e"], 0x0, 0x22, 0x0, 0x100000}, 0x20) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x8, [@link_local, @broadcast, @remote, @broadcast, @broadcast, @empty, @remote, @dev={[], 0x17}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 15:21:56 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) recvmsg$kcm(r1, &(0x7f000000c100)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:21:56 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x0, 0x83d4}, 0x3c) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000380)='&@[\x00') [ 379.608355][T14706] device nr0 entered promiscuous mode 15:21:56 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x95}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x9, &(0x7f0000000080), 0x9c) 15:21:57 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x95}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x9, &(0x7f0000000080), 0x9c) 15:21:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x17, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x4}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 15:21:57 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=""/184, 0xb8}, 0x40000061) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000018c0)={0x0, 0x0, 0x659956bc71df6d89, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001900)={0x12, 0x5, 0x0, 0x1, 0x20, 0xffffffffffffff9c, 0x4, [], 0x0, r1, 0x2, 0xfffffffffffffc01}, 0x3c) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7db, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="b1eb01001d090000000032f46b6c406f50ee000030000000480000000040ec08cf0e"], 0x0, 0x22, 0x0, 0x100000}, 0x20) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x8, [@link_local, @broadcast, @remote, @broadcast, @broadcast, @empty, @remote, @dev={[], 0x17}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 15:21:57 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x95}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x9, &(0x7f0000000080), 0x9c) 15:21:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x17, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x4}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 15:21:57 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x95}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x9, &(0x7f0000000080), 0x9c) 15:21:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) recvmsg(r0, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x40) recvmsg$kcm(r0, &(0x7f0000001c40)={&(0x7f0000000840)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001bc0)=[{&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/211, 0xd3}, {&(0x7f0000000500)=""/31, 0x1f}], 0x3}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="d7e0ffdc2400", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000000c140)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'syz_tun\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000005c0)={r0}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x20) 15:21:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x17, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x4}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 15:21:57 executing program 2: socket$kcm(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x33f) r5 = getpid() perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x6, 0x0, 0x1ff, 0x2, 0x0, 0x56, 0x38, 0x5, 0x6, 0x0, 0x35, 0x0, 0x0, 0x0, 0x5, 0x4af5, 0x401, 0x1, 0xfffffffffffffffd, 0x0, 0x80000001, 0x8, 0x3, 0x8, 0x81, 0x0, 0x2, 0x800, 0x2, 0x87c, 0x7, 0x7ff, 0x100000001, 0x35, 0x8, 0x7f, 0x0, 0xd702, 0x1, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0xd61c, 0x3, 0x3, 0x3, 0x4}, r5, 0x8, r0, 0x1) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000700)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xf, 0x0, &(0x7f0000000240), &(0x7f0000000280)='GPL\x00', 0x1, 0xdc, &(0x7f0000000340)=""/220, 0x41f00, 0x1, [], 0x0, 0xe, r2, 0x8, &(0x7f00000002c0)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r6, 0x0, 0x33, 0x0, &(0x7f00000006c0)="f863670234e46aa72d5c0ab2f23ad8af6f9036c45fc1ed3a3a82d8d37d29f69c25790ac45d9f43c7cfa0b91d43f3a8746e73e7", 0x0, 0x1}, 0x28) r7 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x8000) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x7) 15:21:57 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) recvmsg$kcm(r1, &(0x7f000000c100)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:21:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x0, 0x83d4}, 0x3c) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000380)='&@[\x00') 15:21:57 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58ad, 0x0, 0x5, 0x100000000, 0x0, 0x1b, 0x0, 0x81, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x8, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x101, 0x80000001, 0x0, 0x6, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x06\xd2\x97\x04\x03\xdc\r') 15:21:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) recvmsg(r0, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x40) recvmsg$kcm(r0, &(0x7f0000001c40)={&(0x7f0000000840)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001bc0)=[{&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/211, 0xd3}, {&(0x7f0000000500)=""/31, 0x1f}], 0x3}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="d7e0ffdc2400", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000000c140)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'syz_tun\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000005c0)={r0}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x20) 15:21:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x17, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x4}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 380.583584][T14768] device lo entered promiscuous mode 15:21:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) recvmsg(r0, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x40) recvmsg$kcm(r0, &(0x7f0000001c40)={&(0x7f0000000840)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001bc0)=[{&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/211, 0xd3}, {&(0x7f0000000500)=""/31, 0x1f}], 0x3}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="d7e0ffdc2400", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000000c140)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'syz_tun\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000005c0)={r0}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x20) 15:21:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) recvmsg(r0, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x40) recvmsg$kcm(r0, &(0x7f0000001c40)={&(0x7f0000000840)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001bc0)=[{&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/211, 0xd3}, {&(0x7f0000000500)=""/31, 0x1f}], 0x3}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="d7e0ffdc2400", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000000c140)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'syz_tun\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000005c0)={r0}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x20) [ 381.364227][T14762] device nr0 entered promiscuous mode 15:21:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) recvmsg(r0, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x40) recvmsg$kcm(r0, &(0x7f0000001c40)={&(0x7f0000000840)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001bc0)=[{&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/211, 0xd3}, {&(0x7f0000000500)=""/31, 0x1f}], 0x3}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="d7e0ffdc2400", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000000c140)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'syz_tun\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000005c0)={r0}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x20) 15:21:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) recvmsg(r0, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x40) recvmsg$kcm(r0, &(0x7f0000001c40)={&(0x7f0000000840)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001bc0)=[{&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/211, 0xd3}, {&(0x7f0000000500)=""/31, 0x1f}], 0x3}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="d7e0ffdc2400", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000000c140)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'syz_tun\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000005c0)={r0}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x20) 15:21:58 executing program 2: socket$kcm(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x33f) r5 = getpid() perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x6, 0x0, 0x1ff, 0x2, 0x0, 0x56, 0x38, 0x5, 0x6, 0x0, 0x35, 0x0, 0x0, 0x0, 0x5, 0x4af5, 0x401, 0x1, 0xfffffffffffffffd, 0x0, 0x80000001, 0x8, 0x3, 0x8, 0x81, 0x0, 0x2, 0x800, 0x2, 0x87c, 0x7, 0x7ff, 0x100000001, 0x35, 0x8, 0x7f, 0x0, 0xd702, 0x1, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0xd61c, 0x3, 0x3, 0x3, 0x4}, r5, 0x8, r0, 0x1) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000700)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xf, 0x0, &(0x7f0000000240), &(0x7f0000000280)='GPL\x00', 0x1, 0xdc, &(0x7f0000000340)=""/220, 0x41f00, 0x1, [], 0x0, 0xe, r2, 0x8, &(0x7f00000002c0)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r6, 0x0, 0x33, 0x0, &(0x7f00000006c0)="f863670234e46aa72d5c0ab2f23ad8af6f9036c45fc1ed3a3a82d8d37d29f69c25790ac45d9f43c7cfa0b91d43f3a8746e73e7", 0x0, 0x1}, 0x28) r7 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x8000) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x7) 15:21:58 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) recvmsg$kcm(r1, &(0x7f000000c100)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:21:58 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58ad, 0x0, 0x5, 0x100000000, 0x0, 0x1b, 0x0, 0x81, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x8, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x101, 0x80000001, 0x0, 0x6, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x06\xd2\x97\x04\x03\xdc\r') 15:21:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) recvmsg(r0, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x40) recvmsg$kcm(r0, &(0x7f0000001c40)={&(0x7f0000000840)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001bc0)=[{&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/211, 0xd3}, {&(0x7f0000000500)=""/31, 0x1f}], 0x3}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="d7e0ffdc2400", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000000c140)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'syz_tun\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000005c0)={r0}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x20) 15:21:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) recvmsg(r0, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x40) recvmsg$kcm(r0, &(0x7f0000001c40)={&(0x7f0000000840)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001bc0)=[{&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/211, 0xd3}, {&(0x7f0000000500)=""/31, 0x1f}], 0x3}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="d7e0ffdc2400", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000000c140)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'syz_tun\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000005c0)={r0}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x20) 15:21:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) recvmsg(r0, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x40) recvmsg$kcm(r0, &(0x7f0000001c40)={&(0x7f0000000840)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001bc0)=[{&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/211, 0xd3}, {&(0x7f0000000500)=""/31, 0x1f}], 0x3}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="d7e0ffdc2400", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000000c140)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'syz_tun\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000005c0)={r0}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x20) 15:21:59 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58ad, 0x0, 0x5, 0x100000000, 0x0, 0x1b, 0x0, 0x81, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x8, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x101, 0x80000001, 0x0, 0x6, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x06\xd2\x97\x04\x03\xdc\r') 15:21:59 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58ad, 0x0, 0x5, 0x100000000, 0x0, 0x1b, 0x0, 0x81, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x8, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x101, 0x80000001, 0x0, 0x6, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x06\xd2\x97\x04\x03\xdc\r') 15:21:59 executing program 4: socket$kcm(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x33f) r5 = getpid() perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x6, 0x0, 0x1ff, 0x2, 0x0, 0x56, 0x38, 0x5, 0x6, 0x0, 0x35, 0x0, 0x0, 0x0, 0x5, 0x4af5, 0x401, 0x1, 0xfffffffffffffffd, 0x0, 0x80000001, 0x8, 0x3, 0x8, 0x81, 0x0, 0x2, 0x800, 0x2, 0x87c, 0x7, 0x7ff, 0x100000001, 0x35, 0x8, 0x7f, 0x0, 0xd702, 0x1, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0xd61c, 0x3, 0x3, 0x3, 0x4}, r5, 0x8, r0, 0x1) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000700)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xf, 0x0, &(0x7f0000000240), &(0x7f0000000280)='GPL\x00', 0x1, 0xdc, &(0x7f0000000340)=""/220, 0x41f00, 0x1, [], 0x0, 0xe, r2, 0x8, &(0x7f00000002c0)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r6, 0x0, 0x33, 0x0, &(0x7f00000006c0)="f863670234e46aa72d5c0ab2f23ad8af6f9036c45fc1ed3a3a82d8d37d29f69c25790ac45d9f43c7cfa0b91d43f3a8746e73e7", 0x0, 0x1}, 0x28) r7 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x8000) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x7) 15:21:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) recvmsg(r0, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x40) recvmsg$kcm(r0, &(0x7f0000001c40)={&(0x7f0000000840)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001bc0)=[{&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/211, 0xd3}, {&(0x7f0000000500)=""/31, 0x1f}], 0x3}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="d7e0ffdc2400", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000000c140)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'syz_tun\x00'}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000005c0)={r0}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x20) [ 382.177597][T14822] device nr0 entered promiscuous mode 15:21:59 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58ad, 0x0, 0x5, 0x100000000, 0x0, 0x1b, 0x0, 0x81, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x8, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x101, 0x80000001, 0x0, 0x6, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x06\xd2\x97\x04\x03\xdc\r') [ 382.288456][T14833] device lo entered promiscuous mode 15:21:59 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x73) recvmsg$kcm(r1, &(0x7f000000c100)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 383.237901][T14841] device nr0 entered promiscuous mode 15:22:00 executing program 2: socket$kcm(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x33f) r5 = getpid() perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x6, 0x0, 0x1ff, 0x2, 0x0, 0x56, 0x38, 0x5, 0x6, 0x0, 0x35, 0x0, 0x0, 0x0, 0x5, 0x4af5, 0x401, 0x1, 0xfffffffffffffffd, 0x0, 0x80000001, 0x8, 0x3, 0x8, 0x81, 0x0, 0x2, 0x800, 0x2, 0x87c, 0x7, 0x7ff, 0x100000001, 0x35, 0x8, 0x7f, 0x0, 0xd702, 0x1, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0xd61c, 0x3, 0x3, 0x3, 0x4}, r5, 0x8, r0, 0x1) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000700)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xf, 0x0, &(0x7f0000000240), &(0x7f0000000280)='GPL\x00', 0x1, 0xdc, &(0x7f0000000340)=""/220, 0x41f00, 0x1, [], 0x0, 0xe, r2, 0x8, &(0x7f00000002c0)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r6, 0x0, 0x33, 0x0, &(0x7f00000006c0)="f863670234e46aa72d5c0ab2f23ad8af6f9036c45fc1ed3a3a82d8d37d29f69c25790ac45d9f43c7cfa0b91d43f3a8746e73e7", 0x0, 0x1}, 0x28) r7 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x8000) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x7) 15:22:00 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58ad, 0x0, 0x5, 0x100000000, 0x0, 0x1b, 0x0, 0x81, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x8, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x101, 0x80000001, 0x0, 0x6, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x06\xd2\x97\x04\x03\xdc\r') 15:22:00 executing program 5: socket$kcm(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x33f) r5 = getpid() perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x6, 0x0, 0x1ff, 0x2, 0x0, 0x56, 0x38, 0x5, 0x6, 0x0, 0x35, 0x0, 0x0, 0x0, 0x5, 0x4af5, 0x401, 0x1, 0xfffffffffffffffd, 0x0, 0x80000001, 0x8, 0x3, 0x8, 0x81, 0x0, 0x2, 0x800, 0x2, 0x87c, 0x7, 0x7ff, 0x100000001, 0x35, 0x8, 0x7f, 0x0, 0xd702, 0x1, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0xd61c, 0x3, 0x3, 0x3, 0x4}, r5, 0x8, r0, 0x1) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000700)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xf, 0x0, &(0x7f0000000240), &(0x7f0000000280)='GPL\x00', 0x1, 0xdc, &(0x7f0000000340)=""/220, 0x41f00, 0x1, [], 0x0, 0xe, r2, 0x8, &(0x7f00000002c0)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r6, 0x0, 0x33, 0x0, &(0x7f00000006c0)="f863670234e46aa72d5c0ab2f23ad8af6f9036c45fc1ed3a3a82d8d37d29f69c25790ac45d9f43c7cfa0b91d43f3a8746e73e7", 0x0, 0x1}, 0x28) r7 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x8000) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x7) 15:22:00 executing program 1: socket$kcm(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x33f) r5 = getpid() perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x6, 0x0, 0x1ff, 0x2, 0x0, 0x56, 0x38, 0x5, 0x6, 0x0, 0x35, 0x0, 0x0, 0x0, 0x5, 0x4af5, 0x401, 0x1, 0xfffffffffffffffd, 0x0, 0x80000001, 0x8, 0x3, 0x8, 0x81, 0x0, 0x2, 0x800, 0x2, 0x87c, 0x7, 0x7ff, 0x100000001, 0x35, 0x8, 0x7f, 0x0, 0xd702, 0x1, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0xd61c, 0x3, 0x3, 0x3, 0x4}, r5, 0x8, r0, 0x1) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000700)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xf, 0x0, &(0x7f0000000240), &(0x7f0000000280)='GPL\x00', 0x1, 0xdc, &(0x7f0000000340)=""/220, 0x41f00, 0x1, [], 0x0, 0xe, r2, 0x8, &(0x7f00000002c0)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r6, 0x0, 0x33, 0x0, &(0x7f00000006c0)="f863670234e46aa72d5c0ab2f23ad8af6f9036c45fc1ed3a3a82d8d37d29f69c25790ac45d9f43c7cfa0b91d43f3a8746e73e7", 0x0, 0x1}, 0x28) r7 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x8000) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x7) 15:22:00 executing program 4: socket$kcm(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x33f) r5 = getpid() perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x6, 0x0, 0x1ff, 0x2, 0x0, 0x56, 0x38, 0x5, 0x6, 0x0, 0x35, 0x0, 0x0, 0x0, 0x5, 0x4af5, 0x401, 0x1, 0xfffffffffffffffd, 0x0, 0x80000001, 0x8, 0x3, 0x8, 0x81, 0x0, 0x2, 0x800, 0x2, 0x87c, 0x7, 0x7ff, 0x100000001, 0x35, 0x8, 0x7f, 0x0, 0xd702, 0x1, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0xd61c, 0x3, 0x3, 0x3, 0x4}, r5, 0x8, r0, 0x1) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000700)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xf, 0x0, &(0x7f0000000240), &(0x7f0000000280)='GPL\x00', 0x1, 0xdc, &(0x7f0000000340)=""/220, 0x41f00, 0x1, [], 0x0, 0xe, r2, 0x8, &(0x7f00000002c0)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r6, 0x0, 0x33, 0x0, &(0x7f00000006c0)="f863670234e46aa72d5c0ab2f23ad8af6f9036c45fc1ed3a3a82d8d37d29f69c25790ac45d9f43c7cfa0b91d43f3a8746e73e7", 0x0, 0x1}, 0x28) r7 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x8000) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x7) 15:22:00 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)) recvmsg(0xffffffffffffff9c, &(0x7f0000003280)={&(0x7f0000000e80)=@hci, 0x80, &(0x7f0000002200)=[{&(0x7f0000000f00)=""/171, 0xab}, {&(0x7f0000000fc0)=""/221, 0xdd}, {&(0x7f00000010c0)=""/157, 0x9d}, {&(0x7f0000002180)=""/70, 0x46}], 0x4, &(0x7f0000002280)=""/4096, 0x1000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0, 0x121}, 0x28) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 15:22:00 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58ad, 0x0, 0x5, 0x100000000, 0x0, 0x1b, 0x0, 0x81, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x8, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x101, 0x80000001, 0x0, 0x6, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x06\xd2\x97\x04\x03\xdc\r') [ 383.707432][T14858] device nr0 entered promiscuous mode [ 383.780636][T14853] device nr0 entered promiscuous mode 15:22:01 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)) recvmsg(0xffffffffffffff9c, &(0x7f0000003280)={&(0x7f0000000e80)=@hci, 0x80, &(0x7f0000002200)=[{&(0x7f0000000f00)=""/171, 0xab}, {&(0x7f0000000fc0)=""/221, 0xdd}, {&(0x7f00000010c0)=""/157, 0x9d}, {&(0x7f0000002180)=""/70, 0x46}], 0x4, &(0x7f0000002280)=""/4096, 0x1000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0, 0x121}, 0x28) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 15:22:01 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)) recvmsg(0xffffffffffffff9c, &(0x7f0000003280)={&(0x7f0000000e80)=@hci, 0x80, &(0x7f0000002200)=[{&(0x7f0000000f00)=""/171, 0xab}, {&(0x7f0000000fc0)=""/221, 0xdd}, {&(0x7f00000010c0)=""/157, 0x9d}, {&(0x7f0000002180)=""/70, 0x46}], 0x4, &(0x7f0000002280)=""/4096, 0x1000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0, 0x121}, 0x28) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 15:22:01 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)) recvmsg(0xffffffffffffff9c, &(0x7f0000003280)={&(0x7f0000000e80)=@hci, 0x80, &(0x7f0000002200)=[{&(0x7f0000000f00)=""/171, 0xab}, {&(0x7f0000000fc0)=""/221, 0xdd}, {&(0x7f00000010c0)=""/157, 0x9d}, {&(0x7f0000002180)=""/70, 0x46}], 0x4, &(0x7f0000002280)=""/4096, 0x1000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0, 0x121}, 0x28) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) [ 384.049585][T14866] device nr0 entered promiscuous mode [ 384.092092][T14868] device nr0 entered promiscuous mode 15:22:01 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)) recvmsg(0xffffffffffffff9c, &(0x7f0000003280)={&(0x7f0000000e80)=@hci, 0x80, &(0x7f0000002200)=[{&(0x7f0000000f00)=""/171, 0xab}, {&(0x7f0000000fc0)=""/221, 0xdd}, {&(0x7f00000010c0)=""/157, 0x9d}, {&(0x7f0000002180)=""/70, 0x46}], 0x4, &(0x7f0000002280)=""/4096, 0x1000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0, 0x121}, 0x28) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 15:22:01 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)) recvmsg(0xffffffffffffff9c, &(0x7f0000003280)={&(0x7f0000000e80)=@hci, 0x80, &(0x7f0000002200)=[{&(0x7f0000000f00)=""/171, 0xab}, {&(0x7f0000000fc0)=""/221, 0xdd}, {&(0x7f00000010c0)=""/157, 0x9d}, {&(0x7f0000002180)=""/70, 0x46}], 0x4, &(0x7f0000002280)=""/4096, 0x1000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0, 0x121}, 0x28) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 15:22:01 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)) recvmsg(0xffffffffffffff9c, &(0x7f0000003280)={&(0x7f0000000e80)=@hci, 0x80, &(0x7f0000002200)=[{&(0x7f0000000f00)=""/171, 0xab}, {&(0x7f0000000fc0)=""/221, 0xdd}, {&(0x7f00000010c0)=""/157, 0x9d}, {&(0x7f0000002180)=""/70, 0x46}], 0x4, &(0x7f0000002280)=""/4096, 0x1000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0, 0x121}, 0x28) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 15:22:01 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)) recvmsg(0xffffffffffffff9c, &(0x7f0000003280)={&(0x7f0000000e80)=@hci, 0x80, &(0x7f0000002200)=[{&(0x7f0000000f00)=""/171, 0xab}, {&(0x7f0000000fc0)=""/221, 0xdd}, {&(0x7f00000010c0)=""/157, 0x9d}, {&(0x7f0000002180)=""/70, 0x46}], 0x4, &(0x7f0000002280)=""/4096, 0x1000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0, 0x121}, 0x28) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 15:22:01 executing program 5: socket$kcm(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x33f) r5 = getpid() perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x6, 0x0, 0x1ff, 0x2, 0x0, 0x56, 0x38, 0x5, 0x6, 0x0, 0x35, 0x0, 0x0, 0x0, 0x5, 0x4af5, 0x401, 0x1, 0xfffffffffffffffd, 0x0, 0x80000001, 0x8, 0x3, 0x8, 0x81, 0x0, 0x2, 0x800, 0x2, 0x87c, 0x7, 0x7ff, 0x100000001, 0x35, 0x8, 0x7f, 0x0, 0xd702, 0x1, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0xd61c, 0x3, 0x3, 0x3, 0x4}, r5, 0x8, r0, 0x1) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000700)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xf, 0x0, &(0x7f0000000240), &(0x7f0000000280)='GPL\x00', 0x1, 0xdc, &(0x7f0000000340)=""/220, 0x41f00, 0x1, [], 0x0, 0xe, r2, 0x8, &(0x7f00000002c0)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r6, 0x0, 0x33, 0x0, &(0x7f00000006c0)="f863670234e46aa72d5c0ab2f23ad8af6f9036c45fc1ed3a3a82d8d37d29f69c25790ac45d9f43c7cfa0b91d43f3a8746e73e7", 0x0, 0x1}, 0x28) r7 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x8000) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x7) 15:22:01 executing program 1: socket$kcm(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x33f) r5 = getpid() perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x6, 0x0, 0x1ff, 0x2, 0x0, 0x56, 0x38, 0x5, 0x6, 0x0, 0x35, 0x0, 0x0, 0x0, 0x5, 0x4af5, 0x401, 0x1, 0xfffffffffffffffd, 0x0, 0x80000001, 0x8, 0x3, 0x8, 0x81, 0x0, 0x2, 0x800, 0x2, 0x87c, 0x7, 0x7ff, 0x100000001, 0x35, 0x8, 0x7f, 0x0, 0xd702, 0x1, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0xd61c, 0x3, 0x3, 0x3, 0x4}, r5, 0x8, r0, 0x1) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000700)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xf, 0x0, &(0x7f0000000240), &(0x7f0000000280)='GPL\x00', 0x1, 0xdc, &(0x7f0000000340)=""/220, 0x41f00, 0x1, [], 0x0, 0xe, r2, 0x8, &(0x7f00000002c0)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r6, 0x0, 0x33, 0x0, &(0x7f00000006c0)="f863670234e46aa72d5c0ab2f23ad8af6f9036c45fc1ed3a3a82d8d37d29f69c25790ac45d9f43c7cfa0b91d43f3a8746e73e7", 0x0, 0x1}, 0x28) r7 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x8000) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x7) 15:22:01 executing program 4: socket$kcm(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x33f) r5 = getpid() perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x6, 0x0, 0x1ff, 0x2, 0x0, 0x56, 0x38, 0x5, 0x6, 0x0, 0x35, 0x0, 0x0, 0x0, 0x5, 0x4af5, 0x401, 0x1, 0xfffffffffffffffd, 0x0, 0x80000001, 0x8, 0x3, 0x8, 0x81, 0x0, 0x2, 0x800, 0x2, 0x87c, 0x7, 0x7ff, 0x100000001, 0x35, 0x8, 0x7f, 0x0, 0xd702, 0x1, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0xd61c, 0x3, 0x3, 0x3, 0x4}, r5, 0x8, r0, 0x1) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000700)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xf, 0x0, &(0x7f0000000240), &(0x7f0000000280)='GPL\x00', 0x1, 0xdc, &(0x7f0000000340)=""/220, 0x41f00, 0x1, [], 0x0, 0xe, r2, 0x8, &(0x7f00000002c0)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r6, 0x0, 0x33, 0x0, &(0x7f00000006c0)="f863670234e46aa72d5c0ab2f23ad8af6f9036c45fc1ed3a3a82d8d37d29f69c25790ac45d9f43c7cfa0b91d43f3a8746e73e7", 0x0, 0x1}, 0x28) r7 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x8000) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x7) 15:22:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='mJ\xcd\xcb\xc1\xcc\xe2\xc5\xbd[\\\xb4\xdb\xa7', 0x7a44, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x4020940d, 0x400007) close(r0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, r1, 0x0, 0x4, &(0x7f0000000000)='[\x0e[\x00', 0xffffffffffffffff}, 0x30) [ 384.812173][ T27] audit: type=1800 audit(1563117721.964:56): pid=14909 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name=6D4ACDCBC1CCE2C5BD5B5CB4DBA7 dev="sda1" ino=16982 res=0 15:22:02 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)) recvmsg(0xffffffffffffff9c, &(0x7f0000003280)={&(0x7f0000000e80)=@hci, 0x80, &(0x7f0000002200)=[{&(0x7f0000000f00)=""/171, 0xab}, {&(0x7f0000000fc0)=""/221, 0xdd}, {&(0x7f00000010c0)=""/157, 0x9d}, {&(0x7f0000002180)=""/70, 0x46}], 0x4, &(0x7f0000002280)=""/4096, 0x1000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0, 0x121}, 0x28) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) [ 384.917093][ T27] audit: type=1800 audit(1563117722.054:57): pid=14909 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name=6D4ACDCBC1CCE2C5BD5B5CB4DBA7 dev="sda1" ino=16982 res=0 15:22:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='mJ\xcd\xcb\xc1\xcc\xe2\xc5\xbd[\\\xb4\xdb\xa7', 0x7a44, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x4020940d, 0x400007) close(r0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, r1, 0x0, 0x4, &(0x7f0000000000)='[\x0e[\x00', 0xffffffffffffffff}, 0x30) 15:22:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='mJ\xcd\xcb\xc1\xcc\xe2\xc5\xbd[\\\xb4\xdb\xa7', 0x7a44, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x4020940d, 0x400007) close(r0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, r1, 0x0, 0x4, &(0x7f0000000000)='[\x0e[\x00', 0xffffffffffffffff}, 0x30) [ 384.990553][T14905] device nr0 entered promiscuous mode [ 385.029018][T14919] device nr0 entered promiscuous mode 15:22:02 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)) recvmsg(0xffffffffffffff9c, &(0x7f0000003280)={&(0x7f0000000e80)=@hci, 0x80, &(0x7f0000002200)=[{&(0x7f0000000f00)=""/171, 0xab}, {&(0x7f0000000fc0)=""/221, 0xdd}, {&(0x7f00000010c0)=""/157, 0x9d}, {&(0x7f0000002180)=""/70, 0x46}], 0x4, &(0x7f0000002280)=""/4096, 0x1000}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0, 0x121}, 0x28) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) [ 385.126036][ T27] audit: type=1800 audit(1563117722.284:58): pid=14926 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name=6D4ACDCBC1CCE2C5BD5B5CB4DBA7 dev="sda1" ino=16979 res=0 15:22:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='mJ\xcd\xcb\xc1\xcc\xe2\xc5\xbd[\\\xb4\xdb\xa7', 0x7a44, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x4020940d, 0x400007) close(r0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, r1, 0x0, 0x4, &(0x7f0000000000)='[\x0e[\x00', 0xffffffffffffffff}, 0x30) [ 385.209795][ T27] audit: type=1800 audit(1563117722.314:59): pid=14927 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name=6D4ACDCBC1CCE2C5BD5B5CB4DBA7 dev="sda1" ino=16983 res=0 15:22:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='mJ\xcd\xcb\xc1\xcc\xe2\xc5\xbd[\\\xb4\xdb\xa7', 0x7a44, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x4020940d, 0x400007) close(r0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, r1, 0x0, 0x4, &(0x7f0000000000)='[\x0e[\x00', 0xffffffffffffffff}, 0x30) 15:22:02 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0xb, &(0x7f00000001c0), 0xfedc) [ 385.366884][ T27] audit: type=1800 audit(1563117722.524:60): pid=14933 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name=6D4ACDCBC1CCE2C5BD5B5CB4DBA7 dev="sda1" ino=16970 res=0 [ 385.429371][ T27] audit: type=1800 audit(1563117722.574:61): pid=14937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name=6D4ACDCBC1CCE2C5BD5B5CB4DBA7 dev="sda1" ino=16980 res=0 15:22:02 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0xb, &(0x7f00000001c0), 0xfedc) [ 385.748246][T14903] device nr0 entered promiscuous mode 15:22:03 executing program 5: socket$kcm(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x33f) r5 = getpid() perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x6, 0x0, 0x1ff, 0x2, 0x0, 0x56, 0x38, 0x5, 0x6, 0x0, 0x35, 0x0, 0x0, 0x0, 0x5, 0x4af5, 0x401, 0x1, 0xfffffffffffffffd, 0x0, 0x80000001, 0x8, 0x3, 0x8, 0x81, 0x0, 0x2, 0x800, 0x2, 0x87c, 0x7, 0x7ff, 0x100000001, 0x35, 0x8, 0x7f, 0x0, 0xd702, 0x1, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0xd61c, 0x3, 0x3, 0x3, 0x4}, r5, 0x8, r0, 0x1) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000700)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xf, 0x0, &(0x7f0000000240), &(0x7f0000000280)='GPL\x00', 0x1, 0xdc, &(0x7f0000000340)=""/220, 0x41f00, 0x1, [], 0x0, 0xe, r2, 0x8, &(0x7f00000002c0)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r6, 0x0, 0x33, 0x0, &(0x7f00000006c0)="f863670234e46aa72d5c0ab2f23ad8af6f9036c45fc1ed3a3a82d8d37d29f69c25790ac45d9f43c7cfa0b91d43f3a8746e73e7", 0x0, 0x1}, 0x28) r7 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x8000) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x7) 15:22:03 executing program 1: socket$kcm(0x2, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x33f) r5 = getpid() perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x6, 0x0, 0x1ff, 0x2, 0x0, 0x56, 0x38, 0x5, 0x6, 0x0, 0x35, 0x0, 0x0, 0x0, 0x5, 0x4af5, 0x401, 0x1, 0xfffffffffffffffd, 0x0, 0x80000001, 0x8, 0x3, 0x8, 0x81, 0x0, 0x2, 0x800, 0x2, 0x87c, 0x7, 0x7ff, 0x100000001, 0x35, 0x8, 0x7f, 0x0, 0xd702, 0x1, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0xd61c, 0x3, 0x3, 0x3, 0x4}, r5, 0x8, r0, 0x1) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000700)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xf, 0x0, &(0x7f0000000240), &(0x7f0000000280)='GPL\x00', 0x1, 0xdc, &(0x7f0000000340)=""/220, 0x41f00, 0x1, [], 0x0, 0xe, r2, 0x8, &(0x7f00000002c0)={0x6}, 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r6, 0x0, 0x33, 0x0, &(0x7f00000006c0)="f863670234e46aa72d5c0ab2f23ad8af6f9036c45fc1ed3a3a82d8d37d29f69c25790ac45d9f43c7cfa0b91d43f3a8746e73e7", 0x0, 0x1}, 0x28) r7 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x8000) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x7) 15:22:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='mJ\xcd\xcb\xc1\xcc\xe2\xc5\xbd[\\\xb4\xdb\xa7', 0x7a44, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x4020940d, 0x400007) close(r0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, r1, 0x0, 0x4, &(0x7f0000000000)='[\x0e[\x00', 0xffffffffffffffff}, 0x30) 15:22:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='mJ\xcd\xcb\xc1\xcc\xe2\xc5\xbd[\\\xb4\xdb\xa7', 0x7a44, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x4020940d, 0x400007) close(r0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, r1, 0x0, 0x4, &(0x7f0000000000)='[\x0e[\x00', 0xffffffffffffffff}, 0x30) 15:22:03 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0xb, &(0x7f00000001c0), 0xfedc) 15:22:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r2, 0x10001, 0x10}, 0xc) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r1}, 0x2c) [ 385.934889][ T27] audit: type=1800 audit(1563117723.094:62): pid=14952 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name=6D4ACDCBC1CCE2C5BD5B5CB4DBA7 dev="sda1" ino=16561 res=0 15:22:03 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0xb, &(0x7f00000001c0), 0xfedc) 15:22:03 executing program 0: socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xfffff7fffffffffe, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) sendmsg(r3, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) openat$cgroup(r0, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.events\x00', 0x0, 0x0) r5 = openat$cgroup(r2, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, 0x0, 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={0x0}, 0x10) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000001700)=@pptp={0x18, 0x2, {0x2, @dev={0xac, 0x14, 0x14, 0xb}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000001bc0)="ce97228fb954357c33c499732c29b2df1a14f58a79be55fa16a7a565eb1cf18ea4a79f523cd93617d1303bc94a68c868bed287ef4bacd156b73a262e7d309df6bdbb07bc88b68d3862c9b6ed66e62915f661a95832be34dcf2ad4ad1442125ecc8a560b0adb2a15770c368e283e5f2c355452c973035d9efd9d00edd0f5284835abbf56af4d870bc472ec0ff09cdcee2a3c9b37724888924c7078bf52ecc67f279a0e5818a402ffc256a9cfa132a1276ff7a79e071b8", 0xb6}], 0x1}, 0x8040) [ 386.066239][ T27] audit: type=1800 audit(1563117723.144:63): pid=14955 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name=6D4ACDCBC1CCE2C5BD5B5CB4DBA7 dev="sda1" ino=16990 res=0 15:22:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r2, 0x10001, 0x10}, 0xc) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r1}, 0x2c) 15:22:03 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r2, 0x10001, 0x10}, 0xc) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r1}, 0x2c) [ 386.194027][T14959] device nr0 entered promiscuous mode 15:22:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r0, &(0x7f0000000200)="edb685d53617c58235f52df210c127d41bab93f2db27681b764a44d208460ef86058ca85e5968dadb3f45a7fecc373d2e17a6fcf5b9631f44af7db917b46f2c12799eb7f67c55d4e2ec5a5b6c514dc42fb8ec196b3af17dd43092b0b18eab831b6a5b5ba677e3dd28fe56096a54d55cf8f54fbd6bc3474807ce7cbbc450af350242673badf7015ed9767cb167eae61c7ea9fdbcfd93734d59ea3a47b106fafe66ef8", 0x0}, 0x18) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 386.292932][T14972] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 15:22:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r2, 0x10001, 0x10}, 0xc) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r1}, 0x2c) [ 386.401631][T14978] netlink: 'syz-executor.0': attribute type 29 has an invalid length. 15:22:03 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r2, 0x10001, 0x10}, 0xc) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r1}, 0x2c) [ 386.640534][T14960] device nr0 entered promiscuous mode [ 386.672993][T14978] netlink: 'syz-executor.0': attribute type 29 has an invalid length. 15:22:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r0, &(0x7f0000000200)="edb685d53617c58235f52df210c127d41bab93f2db27681b764a44d208460ef86058ca85e5968dadb3f45a7fecc373d2e17a6fcf5b9631f44af7db917b46f2c12799eb7f67c55d4e2ec5a5b6c514dc42fb8ec196b3af17dd43092b0b18eab831b6a5b5ba677e3dd28fe56096a54d55cf8f54fbd6bc3474807ce7cbbc450af350242673badf7015ed9767cb167eae61c7ea9fdbcfd93734d59ea3a47b106fafe66ef8", 0x0}, 0x18) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:22:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r2, 0x10001, 0x10}, 0xc) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r1}, 0x2c) 15:22:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x44}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 15:22:04 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r2, 0x10001, 0x10}, 0xc) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r1}, 0x2c) 15:22:04 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') 15:22:04 executing program 0: socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xfffff7fffffffffe, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) sendmsg(r3, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) openat$cgroup(r0, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.events\x00', 0x0, 0x0) r5 = openat$cgroup(r2, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, 0x0, 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={0x0}, 0x10) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000001700)=@pptp={0x18, 0x2, {0x2, @dev={0xac, 0x14, 0x14, 0xb}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000001bc0)="ce97228fb954357c33c499732c29b2df1a14f58a79be55fa16a7a565eb1cf18ea4a79f523cd93617d1303bc94a68c868bed287ef4bacd156b73a262e7d309df6bdbb07bc88b68d3862c9b6ed66e62915f661a95832be34dcf2ad4ad1442125ecc8a560b0adb2a15770c368e283e5f2c355452c973035d9efd9d00edd0f5284835abbf56af4d870bc472ec0ff09cdcee2a3c9b37724888924c7078bf52ecc67f279a0e5818a402ffc256a9cfa132a1276ff7a79e071b8", 0xb6}], 0x1}, 0x8040) 15:22:04 executing program 4: socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xfffff7fffffffffe, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) sendmsg(r3, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) openat$cgroup(r0, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.events\x00', 0x0, 0x0) r5 = openat$cgroup(r2, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, 0x0, 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={0x0}, 0x10) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000001700)=@pptp={0x18, 0x2, {0x2, @dev={0xac, 0x14, 0x14, 0xb}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000001bc0)="ce97228fb954357c33c499732c29b2df1a14f58a79be55fa16a7a565eb1cf18ea4a79f523cd93617d1303bc94a68c868bed287ef4bacd156b73a262e7d309df6bdbb07bc88b68d3862c9b6ed66e62915f661a95832be34dcf2ad4ad1442125ecc8a560b0adb2a15770c368e283e5f2c355452c973035d9efd9d00edd0f5284835abbf56af4d870bc472ec0ff09cdcee2a3c9b37724888924c7078bf52ecc67f279a0e5818a402ffc256a9cfa132a1276ff7a79e071b8", 0xb6}], 0x1}, 0x8040) 15:22:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x44}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 15:22:04 executing program 2: socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xfffff7fffffffffe, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) sendmsg(r3, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) openat$cgroup(r0, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.events\x00', 0x0, 0x0) r5 = openat$cgroup(r2, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, 0x0, 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={0x0}, 0x10) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000001700)=@pptp={0x18, 0x2, {0x2, @dev={0xac, 0x14, 0x14, 0xb}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000001bc0)="ce97228fb954357c33c499732c29b2df1a14f58a79be55fa16a7a565eb1cf18ea4a79f523cd93617d1303bc94a68c868bed287ef4bacd156b73a262e7d309df6bdbb07bc88b68d3862c9b6ed66e62915f661a95832be34dcf2ad4ad1442125ecc8a560b0adb2a15770c368e283e5f2c355452c973035d9efd9d00edd0f5284835abbf56af4d870bc472ec0ff09cdcee2a3c9b37724888924c7078bf52ecc67f279a0e5818a402ffc256a9cfa132a1276ff7a79e071b8", 0xb6}], 0x1}, 0x8040) 15:22:04 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') [ 387.294179][T15017] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 15:22:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x44}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 387.345444][T15021] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 387.383977][T15023] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 387.405440][T15021] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 387.411926][T15024] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 387.427271][T15023] netlink: 'syz-executor.2': attribute type 29 has an invalid length. 15:22:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r0, &(0x7f0000000200)="edb685d53617c58235f52df210c127d41bab93f2db27681b764a44d208460ef86058ca85e5968dadb3f45a7fecc373d2e17a6fcf5b9631f44af7db917b46f2c12799eb7f67c55d4e2ec5a5b6c514dc42fb8ec196b3af17dd43092b0b18eab831b6a5b5ba677e3dd28fe56096a54d55cf8f54fbd6bc3474807ce7cbbc450af350242673badf7015ed9767cb167eae61c7ea9fdbcfd93734d59ea3a47b106fafe66ef8", 0x0}, 0x18) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 387.463499][T15024] netlink: 'syz-executor.4': attribute type 29 has an invalid length. 15:22:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x44}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 15:22:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r0, &(0x7f0000000200)="edb685d53617c58235f52df210c127d41bab93f2db27681b764a44d208460ef86058ca85e5968dadb3f45a7fecc373d2e17a6fcf5b9631f44af7db917b46f2c12799eb7f67c55d4e2ec5a5b6c514dc42fb8ec196b3af17dd43092b0b18eab831b6a5b5ba677e3dd28fe56096a54d55cf8f54fbd6bc3474807ce7cbbc450af350242673badf7015ed9767cb167eae61c7ea9fdbcfd93734d59ea3a47b106fafe66ef8", 0x0}, 0x18) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 387.608144][T15011] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 15:22:04 executing program 2: socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xfffff7fffffffffe, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) sendmsg(r3, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) openat$cgroup(r0, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.events\x00', 0x0, 0x0) r5 = openat$cgroup(r2, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, 0x0, 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={0x0}, 0x10) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000001700)=@pptp={0x18, 0x2, {0x2, @dev={0xac, 0x14, 0x14, 0xb}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000001bc0)="ce97228fb954357c33c499732c29b2df1a14f58a79be55fa16a7a565eb1cf18ea4a79f523cd93617d1303bc94a68c868bed287ef4bacd156b73a262e7d309df6bdbb07bc88b68d3862c9b6ed66e62915f661a95832be34dcf2ad4ad1442125ecc8a560b0adb2a15770c368e283e5f2c355452c973035d9efd9d00edd0f5284835abbf56af4d870bc472ec0ff09cdcee2a3c9b37724888924c7078bf52ecc67f279a0e5818a402ffc256a9cfa132a1276ff7a79e071b8", 0xb6}], 0x1}, 0x8040) 15:22:04 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') 15:22:05 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') [ 387.902634][T15012] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 387.939345][T15050] netlink: 'syz-executor.2': attribute type 29 has an invalid length. 15:22:05 executing program 0: socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xfffff7fffffffffe, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) sendmsg(r3, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) openat$cgroup(r0, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.events\x00', 0x0, 0x0) r5 = openat$cgroup(r2, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, 0x0, 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={0x0}, 0x10) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000001700)=@pptp={0x18, 0x2, {0x2, @dev={0xac, 0x14, 0x14, 0xb}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000001bc0)="ce97228fb954357c33c499732c29b2df1a14f58a79be55fa16a7a565eb1cf18ea4a79f523cd93617d1303bc94a68c868bed287ef4bacd156b73a262e7d309df6bdbb07bc88b68d3862c9b6ed66e62915f661a95832be34dcf2ad4ad1442125ecc8a560b0adb2a15770c368e283e5f2c355452c973035d9efd9d00edd0f5284835abbf56af4d870bc472ec0ff09cdcee2a3c9b37724888924c7078bf52ecc67f279a0e5818a402ffc256a9cfa132a1276ff7a79e071b8", 0xb6}], 0x1}, 0x8040) [ 388.020710][T15050] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 388.094298][T15044] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 15:22:05 executing program 4: socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xfffff7fffffffffe, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) sendmsg(r3, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) openat$cgroup(r0, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.events\x00', 0x0, 0x0) r5 = openat$cgroup(r2, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, 0x0, 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={0x0}, 0x10) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000001700)=@pptp={0x18, 0x2, {0x2, @dev={0xac, 0x14, 0x14, 0xb}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000001bc0)="ce97228fb954357c33c499732c29b2df1a14f58a79be55fa16a7a565eb1cf18ea4a79f523cd93617d1303bc94a68c868bed287ef4bacd156b73a262e7d309df6bdbb07bc88b68d3862c9b6ed66e62915f661a95832be34dcf2ad4ad1442125ecc8a560b0adb2a15770c368e283e5f2c355452c973035d9efd9d00edd0f5284835abbf56af4d870bc472ec0ff09cdcee2a3c9b37724888924c7078bf52ecc67f279a0e5818a402ffc256a9cfa132a1276ff7a79e071b8", 0xb6}], 0x1}, 0x8040) 15:22:05 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') 15:22:05 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') 15:22:05 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') [ 388.419212][T15062] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 15:22:05 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') 15:22:05 executing program 2: socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xfffff7fffffffffe, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) sendmsg(r3, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) openat$cgroup(r0, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.events\x00', 0x0, 0x0) r5 = openat$cgroup(r2, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, 0x0, 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={0x0}, 0x10) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000001700)=@pptp={0x18, 0x2, {0x2, @dev={0xac, 0x14, 0x14, 0xb}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000001bc0)="ce97228fb954357c33c499732c29b2df1a14f58a79be55fa16a7a565eb1cf18ea4a79f523cd93617d1303bc94a68c868bed287ef4bacd156b73a262e7d309df6bdbb07bc88b68d3862c9b6ed66e62915f661a95832be34dcf2ad4ad1442125ecc8a560b0adb2a15770c368e283e5f2c355452c973035d9efd9d00edd0f5284835abbf56af4d870bc472ec0ff09cdcee2a3c9b37724888924c7078bf52ecc67f279a0e5818a402ffc256a9cfa132a1276ff7a79e071b8", 0xb6}], 0x1}, 0x8040) 15:22:05 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') 15:22:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)="23000000420081aee405e9a4ea83c9ee02481b0c07d800400300"/35, 0x23}], 0x1}, 0x0) 15:22:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)="23000000420081aee405e9a4ea83c9ee02481b0c07d800400300"/35, 0x23}], 0x1}, 0x0) [ 388.821517][T15063] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 15:22:06 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xfffffffffffffe7c, &(0x7f0000000000), 0x1139}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='nr0\x01\x00') 15:22:06 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') 15:22:06 executing program 0: socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xfffff7fffffffffe, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) sendmsg(r3, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) openat$cgroup(r0, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.events\x00', 0x0, 0x0) r5 = openat$cgroup(r2, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, 0x0, 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={0x0}, 0x10) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000001700)=@pptp={0x18, 0x2, {0x2, @dev={0xac, 0x14, 0x14, 0xb}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000001bc0)="ce97228fb954357c33c499732c29b2df1a14f58a79be55fa16a7a565eb1cf18ea4a79f523cd93617d1303bc94a68c868bed287ef4bacd156b73a262e7d309df6bdbb07bc88b68d3862c9b6ed66e62915f661a95832be34dcf2ad4ad1442125ecc8a560b0adb2a15770c368e283e5f2c355452c973035d9efd9d00edd0f5284835abbf56af4d870bc472ec0ff09cdcee2a3c9b37724888924c7078bf52ecc67f279a0e5818a402ffc256a9cfa132a1276ff7a79e071b8", 0xb6}], 0x1}, 0x8040) [ 389.189970][T15077] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 15:22:06 executing program 4: socketpair(0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2040) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xfffff7fffffffffe, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb615b567eea2bb2d) sendmsg(r3, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) openat$cgroup(r0, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cgroup.events\x00', 0x0, 0x0) r5 = openat$cgroup(r2, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, 0x0, 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={0x0}, 0x10) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000001700)=@pptp={0x18, 0x2, {0x2, @dev={0xac, 0x14, 0x14, 0xb}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000001bc0)="ce97228fb954357c33c499732c29b2df1a14f58a79be55fa16a7a565eb1cf18ea4a79f523cd93617d1303bc94a68c868bed287ef4bacd156b73a262e7d309df6bdbb07bc88b68d3862c9b6ed66e62915f661a95832be34dcf2ad4ad1442125ecc8a560b0adb2a15770c368e283e5f2c355452c973035d9efd9d00edd0f5284835abbf56af4d870bc472ec0ff09cdcee2a3c9b37724888924c7078bf52ecc67f279a0e5818a402ffc256a9cfa132a1276ff7a79e071b8", 0xb6}], 0x1}, 0x8040) 15:22:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)="23000000420081aee405e9a4ea83c9ee02481b0c07d800400300"/35, 0x23}], 0x1}, 0x0) 15:22:06 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xfffffffffffffe7c, &(0x7f0000000000), 0x1139}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='nr0\x01\x00') 15:22:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)="23000000420081aee405e9a4ea83c9ee02481b0c07d800400300"/35, 0x23}], 0x1}, 0x0) [ 389.435636][T15100] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 15:22:06 executing program 3: r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f00000015c0)={&(0x7f00000000c0)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x24}}, 0x80, 0x0}, 0x20048080) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @remote}, 0xf, 0x0}, 0x0) 15:22:06 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000100)={&(0x7f0000000080), 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)=""/136, 0x88}], 0x1, &(0x7f00000002c0)=""/111, 0x6f}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000002c0)={0x0, 0x70, 0x7f, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x0, 0xffff, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4274, 0x0, 0x8001, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40}, 0x80, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x5}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x5, 0x0, 0x5, 0x3, 0x2, 0x3, 0x0, 0x1f, 0xff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x240b23dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3}, 0x20000, 0x0, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, r0, 0x1) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4b8, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x8, 0xf, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x6, 0x5, 0x5, 0x26fc2a12, 0x7, 0x698, 0x6, 0x0, 0x0, 0x8, 0x7ff, 0x0, 0x0, 0x7, 0x3, 0x0, 0x8666, 0xc8f, 0x200, 0x4, 0xdbf4, 0x7fffffff, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x2}, 0x10, 0x5064, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000400)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x4000) openat$cgroup(r1, 0x0, 0x200002, 0x0) 15:22:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000000)=[{0x18, 0x84}], 0x1f}, 0x0) 15:22:06 executing program 3: r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f00000015c0)={&(0x7f00000000c0)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x24}}, 0x80, 0x0}, 0x20048080) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @remote}, 0xf, 0x0}, 0x0) [ 389.763323][T15110] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 15:22:07 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000100)={&(0x7f0000000080), 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)=""/136, 0x88}], 0x1, &(0x7f00000002c0)=""/111, 0x6f}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000002c0)={0x0, 0x70, 0x7f, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x0, 0xffff, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4274, 0x0, 0x8001, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40}, 0x80, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x5}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x5, 0x0, 0x5, 0x3, 0x2, 0x3, 0x0, 0x1f, 0xff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x240b23dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3}, 0x20000, 0x0, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, r0, 0x1) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4b8, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x8, 0xf, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x6, 0x5, 0x5, 0x26fc2a12, 0x7, 0x698, 0x6, 0x0, 0x0, 0x8, 0x7ff, 0x0, 0x0, 0x7, 0x3, 0x0, 0x8666, 0xc8f, 0x200, 0x4, 0xdbf4, 0x7fffffff, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x2}, 0x10, 0x5064, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000400)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x4000) openat$cgroup(r1, 0x0, 0x200002, 0x0) 15:22:07 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xfffffffffffffe7c, &(0x7f0000000000), 0x1139}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='nr0\x01\x00') 15:22:07 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000100)={&(0x7f0000000080), 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)=""/136, 0x88}], 0x1, &(0x7f00000002c0)=""/111, 0x6f}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000002c0)={0x0, 0x70, 0x7f, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x0, 0xffff, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4274, 0x0, 0x8001, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40}, 0x80, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x5}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x5, 0x0, 0x5, 0x3, 0x2, 0x3, 0x0, 0x1f, 0xff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x240b23dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3}, 0x20000, 0x0, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, r0, 0x1) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4b8, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x8, 0xf, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x6, 0x5, 0x5, 0x26fc2a12, 0x7, 0x698, 0x6, 0x0, 0x0, 0x8, 0x7ff, 0x0, 0x0, 0x7, 0x3, 0x0, 0x8666, 0xc8f, 0x200, 0x4, 0xdbf4, 0x7fffffff, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x2}, 0x10, 0x5064, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000400)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x4000) openat$cgroup(r1, 0x0, 0x200002, 0x0) 15:22:07 executing program 3: r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f00000015c0)={&(0x7f00000000c0)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x24}}, 0x80, 0x0}, 0x20048080) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @remote}, 0xf, 0x0}, 0x0) 15:22:07 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000100)={&(0x7f0000000080), 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)=""/136, 0x88}], 0x1, &(0x7f00000002c0)=""/111, 0x6f}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000002c0)={0x0, 0x70, 0x7f, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x0, 0xffff, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4274, 0x0, 0x8001, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40}, 0x80, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x5}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x5, 0x0, 0x5, 0x3, 0x2, 0x3, 0x0, 0x1f, 0xff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x240b23dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3}, 0x20000, 0x0, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, r0, 0x1) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4b8, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x8, 0xf, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x6, 0x5, 0x5, 0x26fc2a12, 0x7, 0x698, 0x6, 0x0, 0x0, 0x8, 0x7ff, 0x0, 0x0, 0x7, 0x3, 0x0, 0x8666, 0xc8f, 0x200, 0x4, 0xdbf4, 0x7fffffff, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x2}, 0x10, 0x5064, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000400)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x4000) openat$cgroup(r1, 0x0, 0x200002, 0x0) 15:22:07 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000100)={&(0x7f0000000080), 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)=""/136, 0x88}], 0x1, &(0x7f00000002c0)=""/111, 0x6f}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000002c0)={0x0, 0x70, 0x7f, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x0, 0xffff, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4274, 0x0, 0x8001, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40}, 0x80, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x5}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x5, 0x0, 0x5, 0x3, 0x2, 0x3, 0x0, 0x1f, 0xff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x240b23dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3}, 0x20000, 0x0, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, r0, 0x1) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4b8, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x8, 0xf, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x6, 0x5, 0x5, 0x26fc2a12, 0x7, 0x698, 0x6, 0x0, 0x0, 0x8, 0x7ff, 0x0, 0x0, 0x7, 0x3, 0x0, 0x8666, 0xc8f, 0x200, 0x4, 0xdbf4, 0x7fffffff, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x2}, 0x10, 0x5064, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000400)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x4000) openat$cgroup(r1, 0x0, 0x200002, 0x0) 15:22:07 executing program 3: r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f00000015c0)={&(0x7f00000000c0)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x24}}, 0x80, 0x0}, 0x20048080) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @remote}, 0xf, 0x0}, 0x0) 15:22:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x541b, &(0x7f0000000000)) 15:22:07 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xfffffffffffffe7c, &(0x7f0000000000), 0x1139}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='nr0\x01\x00') 15:22:07 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018094263066e0002ab2bac75daafcf002cb8000000003400000e0034000000040000000200000009000000a06ad2661f11fa10be49a58800000c03000000020000000000000700000000000000000200000d000000000c0000000087"], 0x0, 0x60}, 0x20) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0xd8, 0x0}, 0x20) r6 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xe3) socket$kcm(0xa, 0x6, 0x0) close(r7) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_int(r6, 0x0, 0x3f8b7cdf8934ee9b) socketpair(0x1b, 0x800a, 0x3, &(0x7f00000003c0)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f00000018c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) 15:22:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000000)=[{0x18, 0x84}], 0x1f}, 0x0) 15:22:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x541b, &(0x7f0000000000)) 15:22:07 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000100)={&(0x7f0000000080), 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)=""/136, 0x88}], 0x1, &(0x7f00000002c0)=""/111, 0x6f}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000002c0)={0x0, 0x70, 0x7f, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x0, 0xffff, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4274, 0x0, 0x8001, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40}, 0x80, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x5}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x5, 0x0, 0x5, 0x3, 0x2, 0x3, 0x0, 0x1f, 0xff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x240b23dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3}, 0x20000, 0x0, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, r0, 0x1) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4b8, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x8, 0xf, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x6, 0x5, 0x5, 0x26fc2a12, 0x7, 0x698, 0x6, 0x0, 0x0, 0x8, 0x7ff, 0x0, 0x0, 0x7, 0x3, 0x0, 0x8666, 0xc8f, 0x200, 0x4, 0xdbf4, 0x7fffffff, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x2}, 0x10, 0x5064, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000400)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x4000) openat$cgroup(r1, 0x0, 0x200002, 0x0) 15:22:07 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000100)={&(0x7f0000000080), 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)=""/136, 0x88}], 0x1, &(0x7f00000002c0)=""/111, 0x6f}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000002c0)={0x0, 0x70, 0x7f, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x0, 0xffff, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4274, 0x0, 0x8001, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40}, 0x80, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x5}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x5, 0x0, 0x5, 0x3, 0x2, 0x3, 0x0, 0x1f, 0xff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x240b23dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3}, 0x20000, 0x0, 0x7, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, r0, 0x1) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4b8, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x8, 0xf, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x6, 0x5, 0x5, 0x26fc2a12, 0x7, 0x698, 0x6, 0x0, 0x0, 0x8, 0x7ff, 0x0, 0x0, 0x7, 0x3, 0x0, 0x8666, 0xc8f, 0x200, 0x4, 0xdbf4, 0x7fffffff, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x2}, 0x10, 0x5064, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000400)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x4000) openat$cgroup(r1, 0x0, 0x200002, 0x0) 15:22:07 executing program 5: r0 = socket$kcm(0x11, 0x2, 0x0) socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x11, 0x2, 0x300) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000100)=@llc={0x1a, 0x0, 0xa, 0x0, 0x0, 0x0, @random="16b29a3288a8"}, 0x80, 0x0}, 0x0) 15:22:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x541b, &(0x7f0000000000)) 15:22:07 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018094263066e0002ab2bac75daafcf002cb8000000003400000e0034000000040000000200000009000000a06ad2661f11fa10be49a58800000c03000000020000000000000700000000000000000200000d000000000c0000000087"], 0x0, 0x60}, 0x20) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0xd8, 0x0}, 0x20) r6 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xe3) socket$kcm(0xa, 0x6, 0x0) close(r7) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_int(r6, 0x0, 0x3f8b7cdf8934ee9b) socketpair(0x1b, 0x800a, 0x3, &(0x7f00000003c0)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f00000018c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) 15:22:08 executing program 2: r0 = socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000700)) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR]]], 0x8}, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffffffffffff3d, 0x0}, 0x200008c6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r5 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000380)='./file0/file0\x00', r4}, 0x10) close(r4) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) recvmsg(r5, &(0x7f0000004fc0)={0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4}, 0x10040) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) 15:22:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x541b, &(0x7f0000000000)) 15:22:08 executing program 0: getpid() r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r3, r4, 0xf, 0x1}, 0x10) perf_event_open$cgroup(0x0, r3, 0x5, r1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x28, &(0x7f00000003c0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) 15:22:08 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018094263066e0002ab2bac75daafcf002cb8000000003400000e0034000000040000000200000009000000a06ad2661f11fa10be49a58800000c03000000020000000000000700000000000000000200000d000000000c0000000087"], 0x0, 0x60}, 0x20) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0xd8, 0x0}, 0x20) r6 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xe3) socket$kcm(0xa, 0x6, 0x0) close(r7) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_int(r6, 0x0, 0x3f8b7cdf8934ee9b) socketpair(0x1b, 0x800a, 0x3, &(0x7f00000003c0)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f00000018c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) 15:22:08 executing program 5: r0 = socket$kcm(0x11, 0x2, 0x0) socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x11, 0x2, 0x300) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000100)=@llc={0x1a, 0x0, 0xa, 0x0, 0x0, 0x0, @random="16b29a3288a8"}, 0x80, 0x0}, 0x0) [ 391.243171][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 391.249137][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 391.323172][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 391.329003][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 391.426078][T15197] __nla_validate_parse: 1 callbacks suppressed [ 391.426089][T15197] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 15:22:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000000)=[{0x18, 0x84}], 0x1f}, 0x0) 15:22:08 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x0) socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x11, 0x2, 0x300) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000100)=@llc={0x1a, 0x0, 0xa, 0x0, 0x0, 0x0, @random="16b29a3288a8"}, 0x80, 0x0}, 0x0) 15:22:08 executing program 5: r0 = socket$kcm(0x11, 0x2, 0x0) socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x11, 0x2, 0x300) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000100)=@llc={0x1a, 0x0, 0xa, 0x0, 0x0, 0x0, @random="16b29a3288a8"}, 0x80, 0x0}, 0x0) 15:22:08 executing program 0: getpid() r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r3, r4, 0xf, 0x1}, 0x10) perf_event_open$cgroup(0x0, r3, 0x5, r1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x28, &(0x7f00000003c0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) 15:22:08 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018094263066e0002ab2bac75daafcf002cb8000000003400000e0034000000040000000200000009000000a06ad2661f11fa10be49a58800000c03000000020000000000000700000000000000000200000d000000000c0000000087"], 0x0, 0x60}, 0x20) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0xd8, 0x0}, 0x20) r6 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xe3) socket$kcm(0xa, 0x6, 0x0) close(r7) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_int(r6, 0x0, 0x3f8b7cdf8934ee9b) socketpair(0x1b, 0x800a, 0x3, &(0x7f00000003c0)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f00000018c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) 15:22:08 executing program 2: r0 = socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000700)) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR]]], 0x8}, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffffffffffff3d, 0x0}, 0x200008c6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r5 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000380)='./file0/file0\x00', r4}, 0x10) close(r4) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) recvmsg(r5, &(0x7f0000004fc0)={0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4}, 0x10040) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) [ 391.671300][T15228] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 15:22:08 executing program 3: r0 = socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000700)) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR]]], 0x8}, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffffffffffff3d, 0x0}, 0x200008c6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r5 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000380)='./file0/file0\x00', r4}, 0x10) close(r4) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) recvmsg(r5, &(0x7f0000004fc0)={0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4}, 0x10040) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) 15:22:08 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x0) socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x11, 0x2, 0x300) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000100)=@llc={0x1a, 0x0, 0xa, 0x0, 0x0, 0x0, @random="16b29a3288a8"}, 0x80, 0x0}, 0x0) 15:22:08 executing program 5: r0 = socket$kcm(0x11, 0x2, 0x0) socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x11, 0x2, 0x300) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000100)=@llc={0x1a, 0x0, 0xa, 0x0, 0x0, 0x0, @random="16b29a3288a8"}, 0x80, 0x0}, 0x0) 15:22:09 executing program 0: getpid() r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r3, r4, 0xf, 0x1}, 0x10) perf_event_open$cgroup(0x0, r3, 0x5, r1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x28, &(0x7f00000003c0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) [ 391.803601][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 391.809685][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 391.809778][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 391.821518][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:22:09 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x0) socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x11, 0x2, 0x300) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000100)=@llc={0x1a, 0x0, 0xa, 0x0, 0x0, 0x0, @random="16b29a3288a8"}, 0x80, 0x0}, 0x0) 15:22:09 executing program 5: r0 = socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000700)) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR]]], 0x8}, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffffffffffff3d, 0x0}, 0x200008c6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r5 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000380)='./file0/file0\x00', r4}, 0x10) close(r4) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) recvmsg(r5, &(0x7f0000004fc0)={0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4}, 0x10040) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) [ 392.128204][T15238] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 392.340517][T15253] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 392.363203][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 392.369025][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:22:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000000)=[{0x18, 0x84}], 0x1f}, 0x0) 15:22:09 executing program 4: r0 = socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000700)) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR]]], 0x8}, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffffffffffff3d, 0x0}, 0x200008c6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r5 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000380)='./file0/file0\x00', r4}, 0x10) close(r4) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) recvmsg(r5, &(0x7f0000004fc0)={0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4}, 0x10040) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) 15:22:09 executing program 0: getpid() r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r3, r4, 0xf, 0x1}, 0x10) perf_event_open$cgroup(0x0, r3, 0x5, r1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x28, &(0x7f00000003c0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) 15:22:09 executing program 2: r0 = socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000700)) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR]]], 0x8}, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffffffffffff3d, 0x0}, 0x200008c6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r5 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000380)='./file0/file0\x00', r4}, 0x10) close(r4) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) recvmsg(r5, &(0x7f0000004fc0)={0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4}, 0x10040) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) 15:22:09 executing program 3: r0 = socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000700)) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR]]], 0x8}, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffffffffffff3d, 0x0}, 0x200008c6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r5 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000380)='./file0/file0\x00', r4}, 0x10) close(r4) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) recvmsg(r5, &(0x7f0000004fc0)={0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4}, 0x10040) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) 15:22:09 executing program 5: r0 = socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000700)) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR]]], 0x8}, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffffffffffff3d, 0x0}, 0x200008c6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r5 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000380)='./file0/file0\x00', r4}, 0x10) close(r4) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) recvmsg(r5, &(0x7f0000004fc0)={0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4}, 0x10040) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) [ 392.638429][T15263] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 15:22:09 executing program 0: getpid() r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r3, r4, 0xf, 0x1}, 0x10) perf_event_open$cgroup(0x0, r3, 0x5, r1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x28, &(0x7f00000003c0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) 15:22:10 executing program 0: getpid() r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r3, r4, 0xf, 0x1}, 0x10) perf_event_open$cgroup(0x0, r3, 0x5, r1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x28, &(0x7f00000003c0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) [ 392.895651][T15264] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 15:22:10 executing program 2: r0 = socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000700)) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR]]], 0x8}, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffffffffffff3d, 0x0}, 0x200008c6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r5 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000380)='./file0/file0\x00', r4}, 0x10) close(r4) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) recvmsg(r5, &(0x7f0000004fc0)={0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4}, 0x10040) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) [ 393.074598][T15259] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 15:22:10 executing program 0: getpid() r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r3, r4, 0xf, 0x1}, 0x10) perf_event_open$cgroup(0x0, r3, 0x5, r1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r2, 0x28, &(0x7f00000003c0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) 15:22:10 executing program 3: r0 = socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000700)) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR]]], 0x8}, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffffffffffff3d, 0x0}, 0x200008c6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r5 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000380)='./file0/file0\x00', r4}, 0x10) close(r4) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) recvmsg(r5, &(0x7f0000004fc0)={0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4}, 0x10040) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) [ 393.301959][T15273] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 15:22:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x12) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) close(r3) mkdir(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, 0xffffffffffffffff, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) close(r0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) 15:22:10 executing program 4: r0 = socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000700)) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR]]], 0x8}, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffffffffffff3d, 0x0}, 0x200008c6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r5 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000380)='./file0/file0\x00', r4}, 0x10) close(r4) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) recvmsg(r5, &(0x7f0000004fc0)={0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4}, 0x10040) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) 15:22:10 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0xaf30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22021, 0x0, 0x0, 0x0, 0x0, 0x364a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x7, 0xfc, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 393.536301][T15284] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 15:22:10 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0xaf30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22021, 0x0, 0x0, 0x0, 0x0, 0x364a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x7, 0xfc, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:22:10 executing program 5: r0 = socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000700)) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR]]], 0x8}, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffffffffffff3d, 0x0}, 0x200008c6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r5 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000380)='./file0/file0\x00', r4}, 0x10) close(r4) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) recvmsg(r5, &(0x7f0000004fc0)={0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4}, 0x10040) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) 15:22:10 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0xaf30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22021, 0x0, 0x0, 0x0, 0x0, 0x364a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x7, 0xfc, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:22:11 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0xaf30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22021, 0x0, 0x0, 0x0, 0x0, 0x364a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x7, 0xfc, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 393.809874][T15292] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 15:22:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000013380)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9040cc804a012000000080090fb120001000e10da1b40d819a90600150000f0", 0x2e}], 0x1}, 0x0) 15:22:11 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r0}) socket$kcm(0x11, 0x0, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={0x0, 0x0, 0x18}, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@pppoe={0x18, 0x0, {0x1, @random="b420d637fc52", 'bridge_slave_1\x00'}}, 0x80, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) 15:22:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x12) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) close(r3) mkdir(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, 0xffffffffffffffff, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) close(r0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) 15:22:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000013380)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9040cc804a012000000080090fb120001000e10da1b40d819a90600150000f0", 0x2e}], 0x1}, 0x0) 15:22:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x12) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) close(r3) mkdir(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, 0xffffffffffffffff, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) close(r0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) 15:22:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000013380)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9040cc804a012000000080090fb120001000e10da1b40d819a90600150000f0", 0x2e}], 0x1}, 0x0) 15:22:11 executing program 4: r0 = socket$kcm(0xa, 0x122000000003, 0x11) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000700)) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESDEC, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR]]], 0x8}, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffffffffffff3d, 0x0}, 0x200008c6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\a', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r4 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r5 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000380)='./file0/file0\x00', r4}, 0x10) close(r4) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) recvmsg(r5, &(0x7f0000004fc0)={0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4}, 0x10040) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) 15:22:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000013380)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9040cc804a012000000080090fb120001000e10da1b40d819a90600150000f0", 0x2e}], 0x1}, 0x0) 15:22:11 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xa}}, 0x0, 0xffffffffffffffff, r0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)}, 0x40000000) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x400000, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f", 0x2a}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) openat$cgroup_type(r2, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f00000002c0)) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 15:22:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x12) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) close(r3) mkdir(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, 0xffffffffffffffff, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) close(r0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) 15:22:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x15, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x50}]}, &(0x7f0000001300)='GPL\x00\xa4\xae_P\xbf\xf5\x06\x96\x8dq\xedz\xbfq\xe6\fN\x864g\x9c\x1au\xfc\vg\x00`|.\x90)z\xd80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 15:22:13 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r0}) socket$kcm(0x11, 0x0, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={0x0, 0x0, 0x18}, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@pppoe={0x18, 0x0, {0x1, @random="b420d637fc52", 'bridge_slave_1\x00'}}, 0x80, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) 15:22:13 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r0}) socket$kcm(0x11, 0x0, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={0x0, 0x0, 0x18}, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@pppoe={0x18, 0x0, {0x1, @random="b420d637fc52", 'bridge_slave_1\x00'}}, 0x80, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) 15:22:13 executing program 4: r0 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r0}) socket$kcm(0x11, 0x0, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={0x0, 0x0, 0x18}, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@pppoe={0x18, 0x0, {0x1, @random="b420d637fc52", 'bridge_slave_1\x00'}}, 0x80, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) 15:22:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x12) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x1b, &(0x7f0000000040)=r3, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) close(r3) mkdir(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, 0xffffffffffffffff, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) close(r0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) 15:22:14 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r0}) socket$kcm(0x11, 0x0, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={0x0, 0x0, 0x18}, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@pppoe={0x18, 0x0, {0x1, @random="b420d637fc52", 'bridge_slave_1\x00'}}, 0x80, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) 15:22:14 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xa}}, 0x0, 0xffffffffffffffff, r0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)}, 0x40000000) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x400000, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f", 0x2a}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) openat$cgroup_type(r2, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f00000002c0)) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 15:22:14 executing program 4: r0 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r0}) socket$kcm(0x11, 0x0, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={0x0, 0x0, 0x18}, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@pppoe={0x18, 0x0, {0x1, @random="b420d637fc52", 'bridge_slave_1\x00'}}, 0x80, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) 15:22:14 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xa}}, 0x0, 0xffffffffffffffff, r0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)}, 0x40000000) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x400000, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f", 0x2a}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) openat$cgroup_type(r2, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f00000002c0)) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 15:22:14 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xa}}, 0x0, 0xffffffffffffffff, r0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)}, 0x40000000) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x400000, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f", 0x2a}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) openat$cgroup_type(r2, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f00000002c0)) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') [ 397.716763][T15436] device lo entered promiscuous mode 15:22:15 executing program 1: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000080)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@int={0x5, 0x0, 0x0, 0x1, 0x0, 0x6e, 0x0, 0x14, 0x7}]}, {0x0, [0x7f, 0x3e]}}, &(0x7f0000000100)=""/3, 0x2c, 0x3, 0x1}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) [ 398.121698][T15447] device lo entered promiscuous mode 15:22:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0xa8}]}, &(0x7f0000000000)='GPL\x00'}, 0x48) 15:22:15 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xa}}, 0x0, 0xffffffffffffffff, r0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)}, 0x40000000) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x400000, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f", 0x2a}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) openat$cgroup_type(r2, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f00000002c0)) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 15:22:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0xa8}]}, &(0x7f0000000000)='GPL\x00'}, 0x48) 15:22:15 executing program 1: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000080)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@int={0x5, 0x0, 0x0, 0x1, 0x0, 0x6e, 0x0, 0x14, 0x7}]}, {0x0, [0x7f, 0x3e]}}, &(0x7f0000000100)=""/3, 0x2c, 0x3, 0x1}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 15:22:15 executing program 4: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000080)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@int={0x5, 0x0, 0x0, 0x1, 0x0, 0x6e, 0x0, 0x14, 0x7}]}, {0x0, [0x7f, 0x3e]}}, &(0x7f0000000100)=""/3, 0x2c, 0x3, 0x1}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 15:22:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0xa8}]}, &(0x7f0000000000)='GPL\x00'}, 0x48) 15:22:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0xa8}]}, &(0x7f0000000000)='GPL\x00'}, 0x48) 15:22:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x813ea39ef9f0763a, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x3, 0xffffffffffffff04) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$tipc(r1, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) 15:22:16 executing program 1: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000080)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@int={0x5, 0x0, 0x0, 0x1, 0x0, 0x6e, 0x0, 0x14, 0x7}]}, {0x0, [0x7f, 0x3e]}}, &(0x7f0000000100)=""/3, 0x2c, 0x3, 0x1}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 15:22:16 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xa}}, 0x0, 0xffffffffffffffff, r0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)}, 0x40000000) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x400000, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f", 0x2a}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) openat$cgroup_type(r2, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f00000002c0)) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 15:22:16 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xa}}, 0x0, 0xffffffffffffffff, r0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)}, 0x40000000) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x400000, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f", 0x2a}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) openat$cgroup_type(r2, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f00000002c0)) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 15:22:16 executing program 4: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000080)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@int={0x5, 0x0, 0x0, 0x1, 0x0, 0x6e, 0x0, 0x14, 0x7}]}, {0x0, [0x7f, 0x3e]}}, &(0x7f0000000100)=""/3, 0x2c, 0x3, 0x1}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 15:22:16 executing program 1: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000080)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@int={0x5, 0x0, 0x0, 0x1, 0x0, 0x6e, 0x0, 0x14, 0x7}]}, {0x0, [0x7f, 0x3e]}}, &(0x7f0000000100)=""/3, 0x2c, 0x3, 0x1}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 15:22:16 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xa}}, 0x0, 0xffffffffffffffff, r0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)}, 0x40000000) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x400000, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f", 0x2a}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) openat$cgroup_type(r2, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f00000002c0)) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 15:22:16 executing program 4: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000080)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@int={0x5, 0x0, 0x0, 0x1, 0x0, 0x6e, 0x0, 0x14, 0x7}]}, {0x0, [0x7f, 0x3e]}}, &(0x7f0000000100)=""/3, 0x2c, 0x3, 0x1}, 0x20) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 15:22:17 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x100, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000680)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="24000000140081ae08060804000f000010ff0100000060003f01546fabca1b4e7d06a6bd", 0x24}], 0x1}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) 15:22:17 executing program 4: socket$kcm(0xa, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1f4, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x73) sendmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000400)=@nfc={0x27, 0x0, 0x1}, 0x80, 0x0}, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r1, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x5, 0x0, 0xffffffffffff8001, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x4, 0x70, 0x0, 0x7fff, 0x9, 0x5, 0x0, 0x0, 0x20300, 0x0, 0x8001, 0x1000, 0x100000001, 0x0, 0x5, 0x8, 0xff, 0x2, 0x0, 0x7, 0x5efcfdbf, 0x100000000, 0x0, 0xfffffffffffffffb, 0x1ff, 0x1, 0x5, 0x1, 0x80000000, 0x0, 0x80000000, 0x401, 0x0, 0x9c, 0x8, 0x0, 0xfffffffffffffffb, 0x2, 0x0, 0x8, 0x4, @perf_bp={0x0, 0x4}, 0xa001, 0xc1d8, 0x2, 0x2, 0x9, 0x9, 0x9}) openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) [ 400.235892][T15514] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 15:22:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x813ea39ef9f0763a, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x3, 0xffffffffffffff04) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$tipc(r1, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) [ 400.280172][T15514] CPU: 1 PID: 15514 Comm: syz-executor.4 Not tainted 5.2.0+ #40 [ 400.287872][T15514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.287886][T15514] Call Trace: [ 400.301237][T15514] dump_stack+0x172/0x1f0 [ 400.305596][T15514] dump_header+0x10f/0xd33 [ 400.310027][T15514] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 400.315847][T15514] ? ___ratelimit+0x60/0x595 [ 400.320443][T15514] ? do_raw_spin_unlock+0x57/0x270 [ 400.325574][T15514] oom_kill_process.cold+0x10/0x15 15:22:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x27}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) [ 400.330712][T15514] out_of_memory+0x7f5/0x12e0 [ 400.335595][T15514] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 400.341414][T15514] ? oom_killer_disable+0x280/0x280 [ 400.346644][T15514] mem_cgroup_out_of_memory+0x1ca/0x230 [ 400.352198][T15514] ? memcg_event_wake+0x230/0x230 [ 400.357234][T15514] ? do_raw_spin_unlock+0x57/0x270 [ 400.357251][T15514] ? _raw_spin_unlock+0x2d/0x50 [ 400.357268][T15514] try_charge+0x1042/0x1410 [ 400.357286][T15514] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 400.357301][T15514] ? percpu_ref_tryget_live+0x111/0x290 [ 400.357318][T15514] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.357334][T15514] ? kasan_check_read+0x11/0x20 [ 400.357350][T15514] ? get_mem_cgroup_from_mm+0x156/0x320 [ 400.357366][T15514] mem_cgroup_try_charge+0x259/0x6b0 [ 400.357385][T15514] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 400.357401][T15514] __handle_mm_fault+0x1e1a/0x3eb0 [ 400.357417][T15514] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 400.357446][T15514] ? kasan_check_read+0x11/0x20 [ 400.357467][T15514] handle_mm_fault+0x1b5/0x6b0 [ 400.357488][T15514] __do_page_fault+0x5f4/0xdb0 [ 400.357510][T15514] do_page_fault+0x71/0x57d [ 400.357521][T15514] ? page_fault+0x8/0x30 [ 400.357537][T15514] page_fault+0x1e/0x30 [ 400.394233][T15514] RIP: 0033:0x41115f [ 400.394248][T15514] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 400.394256][T15514] RSP: 002b:00007ffce6dcbb10 EFLAGS: 00010206 15:22:17 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xa}}, 0x0, 0xffffffffffffffff, r0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)}, 0x40000000) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x400000, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f", 0x2a}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) openat$cgroup_type(r2, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f00000002c0)) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') [ 400.394267][T15514] RAX: 00007fc66c9ad000 RBX: 0000000000020000 RCX: 000000000045986a [ 400.394279][T15514] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 400.421553][T15514] RBP: 00007ffce6dcbbf0 R08: ffffffffffffffff R09: 0000000000000000 [ 400.421562][T15514] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffce6dcbce0 [ 400.421570][T15514] R13: 00007fc66c9cd700 R14: 0000000000000001 R15: 000000000075bfd4 [ 400.555020][T15514] memory: usage 6324kB, limit 0kB, failcnt 43 [ 400.569755][T15514] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 400.590436][T15514] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 15:22:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x27}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) [ 400.608550][T15514] Memory cgroup stats for /syz4: cache:4KB rss:2188KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:4KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2188KB inactive_file:4KB active_file:0KB unevictable:0KB 15:22:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x27}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) [ 400.664037][T15514] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=15514,uid=0 15:22:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x27}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) [ 400.712194][T15514] Memory cgroup out of memory: Killed process 15514 (syz-executor.4) total-vm:72704kB, anon-rss:2148kB, file-rss:34816kB, shmem-rss:0kB 15:22:17 executing program 4: socket$kcm(0xa, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1f4, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x73) sendmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000400)=@nfc={0x27, 0x0, 0x1}, 0x80, 0x0}, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r1, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x5, 0x0, 0xffffffffffff8001, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x4, 0x70, 0x0, 0x7fff, 0x9, 0x5, 0x0, 0x0, 0x20300, 0x0, 0x8001, 0x1000, 0x100000001, 0x0, 0x5, 0x8, 0xff, 0x2, 0x0, 0x7, 0x5efcfdbf, 0x100000000, 0x0, 0xfffffffffffffffb, 0x1ff, 0x1, 0x5, 0x1, 0x80000000, 0x0, 0x80000000, 0x401, 0x0, 0x9c, 0x8, 0x0, 0xfffffffffffffffb, 0x2, 0x0, 0x8, 0x4, @perf_bp={0x0, 0x4}, 0xa001, 0xc1d8, 0x2, 0x2, 0x9, 0x9, 0x9}) openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) 15:22:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x813ea39ef9f0763a, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x3, 0xffffffffffffff04) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$tipc(r1, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) [ 400.865617][T13881] syz-executor.4 invoked oom-killer: gfp_mask=0x40cd0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 400.884743][T13881] CPU: 0 PID: 13881 Comm: syz-executor.4 Not tainted 5.2.0+ #40 [ 400.892418][T13881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.902684][T13881] Call Trace: [ 400.905990][T13881] dump_stack+0x172/0x1f0 [ 400.910347][T13881] dump_header+0x10f/0xd33 [ 400.914783][T13881] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 400.920598][T13881] ? ___ratelimit+0x60/0x595 [ 400.925191][T13881] ? do_raw_spin_unlock+0x57/0x270 [ 400.930312][T13881] oom_kill_process.cold+0x10/0x15 [ 400.935431][T13881] out_of_memory+0x7f5/0x12e0 [ 400.940116][T13881] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 400.946014][T13881] ? oom_killer_disable+0x280/0x280 [ 400.951240][T13881] mem_cgroup_out_of_memory+0x1ca/0x230 [ 400.956794][T13881] ? memcg_event_wake+0x230/0x230 [ 400.961998][T13881] ? do_raw_spin_unlock+0x57/0x270 [ 400.967278][T13881] ? _raw_spin_unlock+0x2d/0x50 [ 400.972253][T13881] try_charge+0x1042/0x1410 [ 400.976764][T13881] ? should_fail+0x1de/0x852 [ 400.981530][T13881] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 400.987277][T13881] ? rcu_read_lock_sched_held+0x110/0x130 [ 400.993095][T13881] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 400.993109][T13881] ? ____cache_alloc_node+0x1be/0x1e0 [ 400.993130][T13881] __memcg_kmem_charge_memcg+0x7c/0x130 [ 400.993142][T13881] ? memcg_kmem_put_cache+0xb0/0xb0 [ 400.993154][T13881] ? cache_grow_begin+0x3d6/0x650 [ 400.993170][T13881] ? lockdep_hardirqs_on+0x418/0x5d0 [ 400.993184][T13881] ? trace_hardirqs_on+0x67/0x220 [ 400.993201][T13881] cache_grow_begin+0x402/0x650 [ 401.004119][T13881] ? __cpuset_node_allowed+0x136/0x540 [ 401.004141][T13881] fallback_alloc+0x1fd/0x2d0 [ 401.004161][T13881] ____cache_alloc_node+0x1be/0x1e0 [ 401.004174][T13881] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 401.004191][T13881] kmem_cache_alloc+0x1e8/0x6f0 [ 401.004210][T13881] ? sock_free_inode+0x30/0x30 [ 401.004222][T13881] sock_alloc_inode+0x1c/0x1d0 [ 401.004234][T13881] alloc_inode+0x68/0x1e0 [ 401.004249][T13881] new_inode_pseudo+0x19/0xf0 [ 401.004262][T13881] sock_alloc+0x41/0x270 [ 401.004276][T13881] __sock_create+0xc2/0x730 [ 401.004291][T13881] ? _raw_spin_unlock_irq+0x28/0x90 [ 401.004308][T13881] __sys_socket+0x103/0x220 [ 401.100522][T13881] ? move_addr_to_kernel+0x80/0x80 [ 401.105784][T13881] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 401.111388][T13881] ? do_syscall_64+0x26/0x680 [ 401.116067][T13881] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.122186][T13881] ? do_syscall_64+0x26/0x680 [ 401.126952][T13881] __x64_sys_socket+0x73/0xb0 [ 401.131720][T13881] do_syscall_64+0xfd/0x680 [ 401.136268][T13881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.142349][T13881] RIP: 0033:0x45c367 [ 401.146258][T13881] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 401.166450][T13881] RSP: 002b:00007ffce6dcb618 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 401.174877][T13881] RAX: ffffffffffffffda RBX: 0000000000712cc0 RCX: 000000000045c367 [ 401.182967][T13881] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 401.191017][T13881] RBP: 00000000000000bc R08: 0000000000006000 R09: 0000000000004000 [ 401.198994][T13881] R10: 00007ffce6dcb760 R11: 0000000000000246 R12: 0000000000000000 [ 401.207196][T13881] R13: 00007ffce6dcbde0 R14: 0000000000000000 R15: 00007ffce6dcbdf0 15:22:18 executing program 5: socket$kcm(0xa, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1f4, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x73) sendmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000400)=@nfc={0x27, 0x0, 0x1}, 0x80, 0x0}, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r1, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x5, 0x0, 0xffffffffffff8001, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x4, 0x70, 0x0, 0x7fff, 0x9, 0x5, 0x0, 0x0, 0x20300, 0x0, 0x8001, 0x1000, 0x100000001, 0x0, 0x5, 0x8, 0xff, 0x2, 0x0, 0x7, 0x5efcfdbf, 0x100000000, 0x0, 0xfffffffffffffffb, 0x1ff, 0x1, 0x5, 0x1, 0x80000000, 0x0, 0x80000000, 0x401, 0x0, 0x9c, 0x8, 0x0, 0xfffffffffffffffb, 0x2, 0x0, 0x8, 0x4, @perf_bp={0x0, 0x4}, 0xa001, 0xc1d8, 0x2, 0x2, 0x9, 0x9, 0x9}) openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) 15:22:18 executing program 2: socket$kcm(0xa, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1f4, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x73) sendmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000400)=@nfc={0x27, 0x0, 0x1}, 0x80, 0x0}, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r1, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x5, 0x0, 0xffffffffffff8001, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x4, 0x70, 0x0, 0x7fff, 0x9, 0x5, 0x0, 0x0, 0x20300, 0x0, 0x8001, 0x1000, 0x100000001, 0x0, 0x5, 0x8, 0xff, 0x2, 0x0, 0x7, 0x5efcfdbf, 0x100000000, 0x0, 0xfffffffffffffffb, 0x1ff, 0x1, 0x5, 0x1, 0x80000000, 0x0, 0x80000000, 0x401, 0x0, 0x9c, 0x8, 0x0, 0xfffffffffffffffb, 0x2, 0x0, 0x8, 0x4, @perf_bp={0x0, 0x4}, 0xa001, 0xc1d8, 0x2, 0x2, 0x9, 0x9, 0x9}) openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) [ 401.231168][T13881] memory: usage 3984kB, limit 0kB, failcnt 56 [ 401.272867][T13881] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 401.303373][T13881] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 401.328784][T13881] Memory cgroup stats for /syz4: cache:4KB rss:52KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:4KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:52KB inactive_file:0KB active_file:4KB unevictable:0KB [ 401.416459][T13881] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13881,uid=0 [ 401.486986][T13881] Memory cgroup out of memory: Killed process 13881 (syz-executor.4) total-vm:72440kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB [ 401.516209][ T1048] oom_reaper: reaped process 13881 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 401.527500][T15543] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 401.538403][T15543] CPU: 0 PID: 15543 Comm: syz-executor.5 Not tainted 5.2.0+ #40 [ 401.546045][T15543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.556134][T15543] Call Trace: [ 401.559541][T15543] dump_stack+0x172/0x1f0 [ 401.563878][T15543] dump_header+0x10f/0xd33 [ 401.568302][T15543] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 401.574120][T15543] ? ___ratelimit+0x60/0x595 [ 401.578714][T15543] ? do_raw_spin_unlock+0x57/0x270 [ 401.583828][T15543] oom_kill_process.cold+0x10/0x15 [ 401.589081][T15543] out_of_memory+0x7f5/0x12e0 [ 401.593777][T15543] ? oom_killer_disable+0x280/0x280 [ 401.598997][T15543] mem_cgroup_out_of_memory+0x1ca/0x230 [ 401.604813][T15543] ? memcg_event_wake+0x230/0x230 [ 401.609853][T15543] ? do_raw_spin_unlock+0x57/0x270 [ 401.614970][T15543] ? _raw_spin_unlock+0x2d/0x50 [ 401.619832][T15543] try_charge+0x1042/0x1410 [ 401.624353][T15543] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 401.630047][T15543] ? percpu_ref_tryget_live+0x111/0x290 [ 401.635604][T15543] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.641856][T15543] ? kasan_check_read+0x11/0x20 [ 401.646724][T15543] ? get_mem_cgroup_from_mm+0x156/0x320 [ 401.652287][T15543] mem_cgroup_try_charge+0x259/0x6b0 [ 401.657570][T15543] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 401.657585][T15543] __handle_mm_fault+0x1e1a/0x3eb0 [ 401.657602][T15543] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 401.657628][T15543] ? kasan_check_read+0x11/0x20 [ 401.657647][T15543] handle_mm_fault+0x1b5/0x6b0 [ 401.657666][T15543] __do_page_fault+0x5f4/0xdb0 [ 401.657686][T15543] do_page_fault+0x71/0x57d [ 401.693143][T15543] ? page_fault+0x8/0x30 [ 401.697394][T15543] page_fault+0x1e/0x30 [ 401.701552][T15543] RIP: 0033:0x41115f [ 401.705447][T15543] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 401.725075][T15543] RSP: 002b:00007ffdf69b4cf0 EFLAGS: 00010206 [ 401.731326][T15543] RAX: 00007fc8aa6f6000 RBX: 0000000000020000 RCX: 000000000045986a [ 401.739299][T15543] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 401.747271][T15543] RBP: 00007ffdf69b4dd0 R08: ffffffffffffffff R09: 0000000000000000 [ 401.755250][T15543] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdf69b4ec0 [ 401.767857][T15543] R13: 00007fc8aa716700 R14: 0000000000000001 R15: 000000000075bfd4 [ 401.806523][T15543] memory: usage 6600kB, limit 0kB, failcnt 23 [ 401.812760][T15543] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 401.820416][T15543] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 401.827767][T15543] Memory cgroup stats for /syz5: cache:0KB rss:2200KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2200KB inactive_file:0KB active_file:0KB unevictable:0KB 15:22:19 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x100, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000680)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="24000000140081ae08060804000f000010ff0100000060003f01546fabca1b4e7d06a6bd", 0x24}], 0x1}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) 15:22:19 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001540)="2e000000110081aee405d10200000e00fa076b000100000000f3ff500befccd77f00000000081c5eda00b0eba06a", 0x2e}], 0x1}, 0x0) 15:22:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x813ea39ef9f0763a, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x3, 0xffffffffffffff04) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$tipc(r1, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) [ 401.849256][T15543] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15543,uid=0 [ 401.873441][T15543] Memory cgroup out of memory: Killed process 15543 (syz-executor.5) total-vm:72704kB, anon-rss:2152kB, file-rss:34816kB, shmem-rss:0kB [ 401.925645][ T1048] oom_reaper: reaped process 15543 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 401.937023][T15545] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 401.959225][T15545] CPU: 1 PID: 15545 Comm: syz-executor.2 Not tainted 5.2.0+ #40 [ 401.966898][T15545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.977050][T15545] Call Trace: [ 401.980355][T15545] dump_stack+0x172/0x1f0 [ 401.984708][T15545] dump_header+0x10f/0xd33 [ 401.989232][T15545] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 401.995136][T15545] ? ___ratelimit+0x60/0x595 [ 401.999735][T15545] ? do_raw_spin_unlock+0x57/0x270 [ 402.004997][T15545] oom_kill_process.cold+0x10/0x15 [ 402.010116][T15545] out_of_memory+0x7f5/0x12e0 [ 402.014807][T15545] ? oom_killer_disable+0x280/0x280 [ 402.020019][T15545] mem_cgroup_out_of_memory+0x1ca/0x230 [ 402.025575][T15545] ? memcg_event_wake+0x230/0x230 [ 402.030606][T15545] ? do_raw_spin_unlock+0x57/0x270 [ 402.035735][T15545] ? _raw_spin_unlock+0x2d/0x50 [ 402.040603][T15545] try_charge+0x1042/0x1410 [ 402.045144][T15545] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 402.050700][T15545] ? percpu_ref_tryget_live+0x111/0x290 [ 402.056278][T15545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.062555][T15545] ? kasan_check_read+0x11/0x20 [ 402.067594][T15545] ? get_mem_cgroup_from_mm+0x156/0x320 [ 402.073147][T15545] mem_cgroup_try_charge+0x259/0x6b0 [ 402.078444][T15545] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 402.084169][T15545] __handle_mm_fault+0x1e1a/0x3eb0 [ 402.089558][T15545] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 402.095173][T15545] ? kasan_check_read+0x11/0x20 [ 402.100135][T15545] handle_mm_fault+0x1b5/0x6b0 [ 402.104903][T15545] __do_page_fault+0x5f4/0xdb0 [ 402.109679][T15545] do_page_fault+0x71/0x57d [ 402.114190][T15545] ? page_fault+0x8/0x30 [ 402.118467][T15545] page_fault+0x1e/0x30 [ 402.122651][T15545] RIP: 0033:0x41115f [ 402.126551][T15545] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 402.146260][T15545] RSP: 002b:00007ffec12bda80 EFLAGS: 00010206 [ 402.152344][T15545] RAX: 00007fd1555e5000 RBX: 0000000000020000 RCX: 000000000045986a [ 402.160315][T15545] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 402.168290][T15545] RBP: 00007ffec12bdb60 R08: ffffffffffffffff R09: 0000000000000000 15:22:19 executing program 5: socket$kcm(0xa, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1f4, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x73) sendmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000400)=@nfc={0x27, 0x0, 0x1}, 0x80, 0x0}, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r1, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x5, 0x0, 0xffffffffffff8001, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x4, 0x70, 0x0, 0x7fff, 0x9, 0x5, 0x0, 0x0, 0x20300, 0x0, 0x8001, 0x1000, 0x100000001, 0x0, 0x5, 0x8, 0xff, 0x2, 0x0, 0x7, 0x5efcfdbf, 0x100000000, 0x0, 0xfffffffffffffffb, 0x1ff, 0x1, 0x5, 0x1, 0x80000000, 0x0, 0x80000000, 0x401, 0x0, 0x9c, 0x8, 0x0, 0xfffffffffffffffb, 0x2, 0x0, 0x8, 0x4, @perf_bp={0x0, 0x4}, 0xa001, 0xc1d8, 0x2, 0x2, 0x9, 0x9, 0x9}) openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) [ 402.176424][T15545] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffec12bdc50 [ 402.184558][T15545] R13: 00007fd155605700 R14: 0000000000000001 R15: 000000000075bfd4 [ 402.193290][T15545] memory: usage 6656kB, limit 0kB, failcnt 268855 [ 402.200601][T15545] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 402.209502][T15545] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 402.221496][T15545] Memory cgroup stats for /syz2: cache:8KB rss:2188KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:4KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2188KB inactive_file:4KB active_file:4KB unevictable:0KB [ 402.248221][T15545] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=15545,uid=0 [ 402.265845][T15545] Memory cgroup out of memory: Killed process 15545 (syz-executor.2) total-vm:72704kB, anon-rss:2148kB, file-rss:34816kB, shmem-rss:0kB [ 402.281312][T15554] __nla_validate_parse: 3 callbacks suppressed [ 402.281323][T15554] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 402.312798][ T1048] oom_reaper: reaped process 15545 (syz-executor.2), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB 15:22:19 executing program 4: socket$kcm(0xa, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1f4, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x73) sendmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000400)=@nfc={0x27, 0x0, 0x1}, 0x80, 0x0}, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r1, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x5, 0x0, 0xffffffffffff8001, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x4, 0x70, 0x0, 0x7fff, 0x9, 0x5, 0x0, 0x0, 0x20300, 0x0, 0x8001, 0x1000, 0x100000001, 0x0, 0x5, 0x8, 0xff, 0x2, 0x0, 0x7, 0x5efcfdbf, 0x100000000, 0x0, 0xfffffffffffffffb, 0x1ff, 0x1, 0x5, 0x1, 0x80000000, 0x0, 0x80000000, 0x401, 0x0, 0x9c, 0x8, 0x0, 0xfffffffffffffffb, 0x2, 0x0, 0x8, 0x4, @perf_bp={0x0, 0x4}, 0xa001, 0xc1d8, 0x2, 0x2, 0x9, 0x9, 0x9}) openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) 15:22:19 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001540)="2e000000110081aee405d10200000e00fa076b000100000000f3ff500befccd77f00000000081c5eda00b0eba06a", 0x2e}], 0x1}, 0x0) 15:22:19 executing program 3: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) socket$kcm(0x2, 0x3, 0x2) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000840)='/dev/net/tun\x00', 0x200280, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xa, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800180004000000000000005f000000c3f9ccfff8ffffbf069704"], 0x0, 0x6, 0x2b, &(0x7f0000000240)=""/43, 0x0, 0x3, [], 0x0, 0x11, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000800)=r4, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000007c0)={0x0, r5}, 0x14) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) 15:22:19 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x100, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000680)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="24000000140081ae08060804000f000010ff0100000060003f01546fabca1b4e7d06a6bd", 0x24}], 0x1}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) [ 402.329362][T13795] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 402.391794][T13795] CPU: 0 PID: 13795 Comm: syz-executor.5 Not tainted 5.2.0+ #40 [ 402.399470][T13795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.409796][T13795] Call Trace: [ 402.413195][T13795] dump_stack+0x172/0x1f0 [ 402.417540][T13795] dump_header+0x10f/0xd33 [ 402.421973][T13795] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 402.427812][T13795] ? ___ratelimit+0x60/0x595 [ 402.432500][T13795] ? do_raw_spin_unlock+0x57/0x270 [ 402.437754][T13795] oom_kill_process.cold+0x10/0x15 [ 402.442883][T13795] out_of_memory+0x7f5/0x12e0 [ 402.447578][T13795] ? oom_killer_disable+0x280/0x280 [ 402.452799][T13795] mem_cgroup_out_of_memory+0x1ca/0x230 [ 402.458361][T13795] ? memcg_event_wake+0x230/0x230 [ 402.463410][T13795] ? do_raw_spin_unlock+0x57/0x270 [ 402.468324][T15563] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 402.468538][T13795] ? _raw_spin_unlock+0x2d/0x50 [ 402.482689][T13795] try_charge+0x1042/0x1410 [ 402.487218][T13795] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 402.492778][T13795] ? find_held_lock+0x35/0x130 [ 402.497551][T13795] ? get_mem_cgroup_from_mm+0x139/0x320 [ 402.503363][T13795] ? lock_downgrade+0x920/0x920 [ 402.508228][T13795] ? percpu_ref_tryget_live+0x111/0x290 [ 402.513787][T13795] __memcg_kmem_charge_memcg+0x7c/0x130 [ 402.519341][T13795] ? memcg_kmem_put_cache+0xb0/0xb0 [ 402.524631][T13795] ? get_mem_cgroup_from_mm+0x156/0x320 [ 402.530189][T13795] __memcg_kmem_charge+0x136/0x370 [ 402.535295][T13795] __alloc_pages_nodemask+0x4bd/0x8d0 [ 402.535312][T13795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.535327][T13795] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 402.535342][T13795] ? copy_process+0x46d0/0x6b00 [ 402.535359][T13795] ? lockdep_hardirqs_on+0x418/0x5d0 [ 402.535373][T13795] ? trace_hardirqs_on+0x67/0x220 [ 402.535385][T13795] ? kasan_check_read+0x11/0x20 [ 402.535404][T13795] copy_process+0x3f9/0x6b00 [ 402.535421][T13795] ? __lock_acquire+0x537/0x4af0 [ 402.535435][T13795] ? _raw_spin_unlock+0x2d/0x50 [ 402.535454][T13795] ? __cleanup_sighand+0x60/0x60 [ 402.592399][T13795] ? find_held_lock+0x35/0x130 [ 402.597186][T13795] _do_fork+0x146/0xf70 [ 402.601357][T13795] ? copy_init_mm+0x20/0x20 [ 402.605874][T13795] ? kasan_check_read+0x11/0x20 [ 402.610739][T13795] ? _copy_to_user+0xc9/0x120 [ 402.615431][T13795] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 402.621695][T13795] ? put_timespec64+0xda/0x140 [ 402.626573][T13795] __x64_sys_clone+0x186/0x250 [ 402.631514][T13795] ? __ia32_sys_vfork+0xc0/0xc0 [ 402.636521][T13795] ? lockdep_hardirqs_on+0x418/0x5d0 [ 402.641823][T13795] ? trace_hardirqs_on+0x67/0x220 [ 402.646866][T13795] do_syscall_64+0xfd/0x680 [ 402.651370][T13795] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.657265][T13795] RIP: 0033:0x457dea [ 402.661176][T13795] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 402.680897][T13795] RSP: 002b:00007ffdf69b4f40 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 15:22:19 executing program 4: socket$kcm(0xa, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1f4, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x73) sendmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000400)=@nfc={0x27, 0x0, 0x1}, 0x80, 0x0}, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r1, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x5, 0x0, 0xffffffffffff8001, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x4, 0x70, 0x0, 0x7fff, 0x9, 0x5, 0x0, 0x0, 0x20300, 0x0, 0x8001, 0x1000, 0x100000001, 0x0, 0x5, 0x8, 0xff, 0x2, 0x0, 0x7, 0x5efcfdbf, 0x100000000, 0x0, 0xfffffffffffffffb, 0x1ff, 0x1, 0x5, 0x1, 0x80000000, 0x0, 0x80000000, 0x401, 0x0, 0x9c, 0x8, 0x0, 0xfffffffffffffffb, 0x2, 0x0, 0x8, 0x4, @perf_bp={0x0, 0x4}, 0xa001, 0xc1d8, 0x2, 0x2, 0x9, 0x9, 0x9}) openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) 15:22:19 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001540)="2e000000110081aee405d10200000e00fa076b000100000000f3ff500befccd77f00000000081c5eda00b0eba06a", 0x2e}], 0x1}, 0x0) 15:22:19 executing program 2: socket$kcm(0xa, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1f4, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x73) sendmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000400)=@nfc={0x27, 0x0, 0x1}, 0x80, 0x0}, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r1, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x5, 0x0, 0xffffffffffff8001, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x4, 0x70, 0x0, 0x7fff, 0x9, 0x5, 0x0, 0x0, 0x20300, 0x0, 0x8001, 0x1000, 0x100000001, 0x0, 0x5, 0x8, 0xff, 0x2, 0x0, 0x7, 0x5efcfdbf, 0x100000000, 0x0, 0xfffffffffffffffb, 0x1ff, 0x1, 0x5, 0x1, 0x80000000, 0x0, 0x80000000, 0x401, 0x0, 0x9c, 0x8, 0x0, 0xfffffffffffffffb, 0x2, 0x0, 0x8, 0x4, @perf_bp={0x0, 0x4}, 0xa001, 0xc1d8, 0x2, 0x2, 0x9, 0x9, 0x9}) openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) [ 402.689326][T13795] RAX: ffffffffffffffda RBX: 00007ffdf69b4f40 RCX: 0000000000457dea [ 402.697408][T13795] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 402.705647][T13795] RBP: 00007ffdf69b4f80 R08: 0000000000000001 R09: 0000555556e7d940 [ 402.710601][T15567] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 402.713616][T13795] R10: 0000555556e7dc10 R11: 0000000000000246 R12: 0000000000000001 [ 402.713625][T13795] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffdf69b4fd0 [ 402.808695][T13795] memory: usage 4260kB, limit 0kB, failcnt 40 [ 402.815256][T13795] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 402.823007][T13795] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 402.837483][T13795] Memory cgroup stats for /syz5: cache:4KB rss:60KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:60KB inactive_file:0KB active_file:4KB unevictable:0KB 15:22:20 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001540)="2e000000110081aee405d10200000e00fa076b000100000000f3ff500befccd77f00000000081c5eda00b0eba06a", 0x2e}], 0x1}, 0x0) [ 402.893290][T13795] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=13795,uid=0 [ 402.911589][T13795] Memory cgroup out of memory: Killed process 13795 (syz-executor.5) total-vm:72440kB, anon-rss:104kB, file-rss:35776kB, shmem-rss:0kB [ 402.956588][T14061] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 402.956816][ T1048] oom_reaper: reaped process 13795 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 402.972660][T14061] CPU: 0 PID: 14061 Comm: syz-executor.2 Not tainted 5.2.0+ #40 [ 402.987507][T14061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.997727][T14061] Call Trace: [ 403.001029][T14061] dump_stack+0x172/0x1f0 [ 403.005422][T14061] dump_header+0x10f/0xd33 [ 403.009840][T14061] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 403.015845][T14061] ? ___ratelimit+0x60/0x595 [ 403.020526][T14061] ? do_raw_spin_unlock+0x57/0x270 [ 403.025648][T14061] oom_kill_process.cold+0x10/0x15 [ 403.030787][T14061] out_of_memory+0x7f5/0x12e0 [ 403.035499][T14061] ? oom_killer_disable+0x280/0x280 [ 403.040718][T14061] mem_cgroup_out_of_memory+0x1ca/0x230 [ 403.046272][T14061] ? memcg_event_wake+0x230/0x230 [ 403.051301][T14061] ? do_raw_spin_unlock+0x57/0x270 [ 403.056423][T14061] ? _raw_spin_unlock+0x2d/0x50 [ 403.061367][T14061] try_charge+0x1042/0x1410 [ 403.065882][T14061] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 403.071431][T14061] ? find_held_lock+0x35/0x130 [ 403.076204][T14061] ? get_mem_cgroup_from_mm+0x139/0x320 [ 403.081886][T14061] ? lock_downgrade+0x920/0x920 [ 403.086871][T14061] ? percpu_ref_tryget_live+0x111/0x290 [ 403.092433][T14061] __memcg_kmem_charge_memcg+0x7c/0x130 [ 403.097988][T14061] ? memcg_kmem_put_cache+0xb0/0xb0 [ 403.103192][T14061] ? get_mem_cgroup_from_mm+0x156/0x320 [ 403.108736][T14061] __memcg_kmem_charge+0x136/0x370 [ 403.113861][T14061] __alloc_pages_nodemask+0x4bd/0x8d0 [ 403.119251][T14061] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.125503][T14061] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 403.131239][T14061] ? copy_process+0x46d0/0x6b00 [ 403.136102][T14061] ? lockdep_hardirqs_on+0x418/0x5d0 [ 403.141547][T14061] ? trace_hardirqs_on+0x67/0x220 [ 403.146585][T14061] ? kasan_check_read+0x11/0x20 [ 403.151451][T14061] copy_process+0x3f9/0x6b00 [ 403.156169][T14061] ? __lock_acquire+0x537/0x4af0 [ 403.161117][T14061] ? _raw_spin_unlock+0x2d/0x50 [ 403.166083][T14061] ? __cleanup_sighand+0x60/0x60 [ 403.171090][T14061] ? find_held_lock+0x35/0x130 [ 403.175878][T14061] _do_fork+0x146/0xf70 [ 403.180065][T14061] ? copy_init_mm+0x20/0x20 [ 403.184594][T14061] ? kasan_check_read+0x11/0x20 [ 403.189440][T14061] ? _copy_to_user+0xc9/0x120 [ 403.194123][T14061] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 403.200580][T14061] ? put_timespec64+0xda/0x140 [ 403.205378][T14061] __x64_sys_clone+0x186/0x250 [ 403.210151][T14061] ? __ia32_sys_vfork+0xc0/0xc0 [ 403.215006][T14061] ? lockdep_hardirqs_on+0x418/0x5d0 [ 403.220294][T14061] ? trace_hardirqs_on+0x67/0x220 [ 403.225346][T14061] do_syscall_64+0xfd/0x680 [ 403.229857][T14061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.235753][T14061] RIP: 0033:0x457dea [ 403.239635][T14061] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 403.259489][T14061] RSP: 002b:00007ffec12bdcd0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 403.267885][T14061] RAX: ffffffffffffffda RBX: 00007ffec12bdcd0 RCX: 0000000000457dea [ 403.275994][T14061] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 403.283956][T14061] RBP: 00007ffec12bdd10 R08: 0000000000000001 R09: 0000555555583940 [ 403.292037][T14061] R10: 0000555555583c10 R11: 0000000000000246 R12: 0000000000000001 [ 403.300189][T14061] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffec12bdd60 15:22:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x100, 0x209e20, 0x8000000001, 0x11}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 403.309205][T14061] memory: usage 4316kB, limit 0kB, failcnt 268864 [ 403.330837][T14061] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 403.341950][T14061] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 15:22:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x100, 0x209e20, 0x8000000001, 0x11}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 403.364037][T14061] Memory cgroup stats for /syz2: cache:8KB rss:52KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:4KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:52KB inactive_file:4KB active_file:4KB unevictable:0KB [ 403.389802][T14061] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=14061,uid=0 15:22:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x100, 0x209e20, 0x8000000001, 0x11}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 403.415973][T14061] Memory cgroup out of memory: Killed process 14061 (syz-executor.2) total-vm:72440kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB [ 403.435055][ T1048] oom_reaper: reaped process 14061 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 403.551612][T15573] device nr0 entered promiscuous mode 15:22:21 executing program 5: socket$kcm(0xa, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1f4, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x73) sendmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000400)=@nfc={0x27, 0x0, 0x1}, 0x80, 0x0}, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r1, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x5, 0x0, 0xffffffffffff8001, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x4, 0x70, 0x0, 0x7fff, 0x9, 0x5, 0x0, 0x0, 0x20300, 0x0, 0x8001, 0x1000, 0x100000001, 0x0, 0x5, 0x8, 0xff, 0x2, 0x0, 0x7, 0x5efcfdbf, 0x100000000, 0x0, 0xfffffffffffffffb, 0x1ff, 0x1, 0x5, 0x1, 0x80000000, 0x0, 0x80000000, 0x401, 0x0, 0x9c, 0x8, 0x0, 0xfffffffffffffffb, 0x2, 0x0, 0x8, 0x4, @perf_bp={0x0, 0x4}, 0xa001, 0xc1d8, 0x2, 0x2, 0x9, 0x9, 0x9}) openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) 15:22:21 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x100, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000680)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="24000000140081ae08060804000f000010ff0100000060003f01546fabca1b4e7d06a6bd", 0x24}], 0x1}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) 15:22:21 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x100, 0x209e20, 0x8000000001, 0x11}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) [ 404.187191][T15593] IPVS: ftp: loaded support on port[0] = 21 [ 404.282054][T15572] device nr0 entered promiscuous mode 15:22:21 executing program 3: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) socket$kcm(0x2, 0x3, 0x2) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000840)='/dev/net/tun\x00', 0x200280, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xa, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800180004000000000000005f000000c3f9ccfff8ffffbf069704"], 0x0, 0x6, 0x2b, &(0x7f0000000240)=""/43, 0x0, 0x3, [], 0x0, 0x11, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000800)=r4, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000007c0)={0x0, r5}, 0x14) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) 15:22:21 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, 0x0, 0x300) [ 404.725654][T15606] device nr0 entered promiscuous mode [ 405.014710][T15593] chnl_net:caif_netlink_parms(): no params data found [ 405.121545][T15593] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.129655][T15593] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.137787][T15593] device bridge_slave_0 entered promiscuous mode [ 405.146060][T15593] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.153575][T15593] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.161247][T15593] device bridge_slave_1 entered promiscuous mode [ 405.237960][T15593] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 405.249063][T15593] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 405.268676][T15593] team0: Port device team_slave_0 added [ 405.275554][T15593] team0: Port device team_slave_1 added [ 405.326392][T15593] device hsr_slave_0 entered promiscuous mode [ 405.363750][T15593] device hsr_slave_1 entered promiscuous mode [ 405.503695][T15593] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.510952][T15593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 405.547136][T15593] 8021q: adding VLAN 0 to HW filter on device bond0 [ 405.562411][ T3007] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.571283][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 405.581122][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 405.588969][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 405.656934][T15593] 8021q: adding VLAN 0 to HW filter on device team0 [ 405.667047][T13828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 405.676449][T13828] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 405.686565][T13828] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.694209][T13828] bridge0: port 1(bridge_slave_0) entered forwarding state [ 405.748489][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 405.757420][ T3007] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.764554][ T3007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 405.783985][T13828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 405.792475][T13828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 405.876253][T13828] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 405.884423][T13828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 405.892619][T13828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 405.902936][T15593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 405.927968][T15593] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 406.129713][T15615] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 406.142319][T15615] CPU: 1 PID: 15615 Comm: syz-executor.4 Not tainted 5.2.0+ #40 [ 406.150093][T15615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.160628][T15615] Call Trace: [ 406.163923][T15615] dump_stack+0x172/0x1f0 [ 406.168249][T15615] dump_header+0x10f/0xd33 [ 406.172776][T15615] ? ___ratelimit+0x5b/0x595 [ 406.177447][T15615] ? ___ratelimit+0x60/0x595 [ 406.182023][T15615] ? do_raw_spin_unlock+0x57/0x270 [ 406.187152][T15615] oom_kill_process.cold+0x10/0x15 [ 406.192282][T15615] out_of_memory+0x7f5/0x12e0 [ 406.196981][T15615] ? __sched_text_start+0x8/0x8 [ 406.201827][T15615] ? oom_killer_disable+0x280/0x280 [ 406.207032][T15615] mem_cgroup_out_of_memory+0x1ca/0x230 [ 406.212720][T15615] ? memcg_event_wake+0x230/0x230 [ 406.217878][T15615] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 406.223819][T15615] ? cgroup_file_notify+0x140/0x1b0 [ 406.229020][T15615] memory_max_write+0x22f/0x390 [ 406.233981][T15615] ? find_held_lock+0x35/0x130 [ 406.238754][T15615] ? mem_cgroup_write+0x360/0x360 [ 406.243772][T15615] ? lock_acquire+0x16f/0x3f0 [ 406.248430][T15615] ? kernfs_fop_write+0x227/0x480 [ 406.253440][T15615] cgroup_file_write+0x241/0x790 [ 406.258508][T15615] ? mem_cgroup_write+0x360/0x360 [ 406.263625][T15615] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 406.269252][T15615] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 406.275428][T15615] kernfs_fop_write+0x2b8/0x480 [ 406.280289][T15615] __vfs_write+0x8a/0x110 [ 406.284701][T15615] ? kernfs_fop_open+0xd80/0xd80 [ 406.289754][T15615] vfs_write+0x20c/0x580 [ 406.294002][T15615] ksys_write+0x14f/0x290 [ 406.298385][T15615] ? __ia32_sys_read+0xb0/0xb0 [ 406.303254][T15615] ? do_syscall_64+0x26/0x680 [ 406.307936][T15615] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.314001][T15615] ? do_syscall_64+0x26/0x680 [ 406.318775][T15615] __x64_sys_write+0x73/0xb0 [ 406.323366][T15615] do_syscall_64+0xfd/0x680 [ 406.328143][T15615] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.334163][T15615] RIP: 0033:0x459819 [ 406.338073][T15615] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 406.357760][T15615] RSP: 002b:00007f78f7a59c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 406.366406][T15615] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 406.374582][T15615] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 406.382562][T15615] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 406.390743][T15615] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f78f7a5a6d4 [ 406.398877][T15615] R13: 00000000004c9746 R14: 00000000004e0b00 R15: 00000000ffffffff [ 406.411520][T15615] memory: usage 6108kB, limit 0kB, failcnt 65 [ 406.417975][T15615] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 406.426541][T15615] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 406.433774][T15615] Memory cgroup stats for /syz4: cache:0KB rss:2168KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2168KB inactive_file:0KB active_file:0KB unevictable:0KB [ 406.465600][T15615] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=15614,uid=0 [ 406.482255][T15615] Memory cgroup out of memory: Killed process 15614 (syz-executor.4) total-vm:72708kB, anon-rss:2136kB, file-rss:34816kB, shmem-rss:0kB [ 406.499993][ T1048] oom_reaper: reaped process 15614 (syz-executor.4), now anon-rss:0kB, file-rss:34884kB, shmem-rss:0kB 15:22:23 executing program 3: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) socket$kcm(0x2, 0x3, 0x2) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000840)='/dev/net/tun\x00', 0x200280, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xa, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800180004000000000000005f000000c3f9ccfff8ffffbf069704"], 0x0, 0x6, 0x2b, &(0x7f0000000240)=""/43, 0x0, 0x3, [], 0x0, 0x11, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000800)=r4, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000007c0)={0x0, r5}, 0x14) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) 15:22:23 executing program 2: socket$kcm(0xa, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) gettid() r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac14140ceb", 0x11}], 0x1}, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x1ff) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1f4, 0x1}, 0x20) r4 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x73) sendmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000400)=@nfc={0x27, 0x0, 0x1}, 0x80, 0x0}, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(r1, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x5, 0x0, 0xffffffffffff8001, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x4, 0x70, 0x0, 0x7fff, 0x9, 0x5, 0x0, 0x0, 0x20300, 0x0, 0x8001, 0x1000, 0x100000001, 0x0, 0x5, 0x8, 0xff, 0x2, 0x0, 0x7, 0x5efcfdbf, 0x100000000, 0x0, 0xfffffffffffffffb, 0x1ff, 0x1, 0x5, 0x1, 0x80000000, 0x0, 0x80000000, 0x401, 0x0, 0x9c, 0x8, 0x0, 0xfffffffffffffffb, 0x2, 0x0, 0x8, 0x4, @perf_bp={0x0, 0x4}, 0xa001, 0xc1d8, 0x2, 0x2, 0x9, 0x9, 0x9}) openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) 15:22:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x6, &(0x7f0000000080), 0x3) close(r1) 15:22:23 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0xfffffffffffffe77) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x541b, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TUNSETFILTEREBPF(r1, 0x5450, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='\x00') 15:22:23 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, 0x0, 0x300) 15:22:23 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$kcm(r3, &(0x7f0000000300)={&(0x7f0000000080)=@tipc=@name={0x1e, 0x2, 0x0, {{0x0, 0x2}}}, 0x80, 0x0}, 0x0) [ 406.723864][T15593] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 406.765175][T15593] CPU: 0 PID: 15593 Comm: syz-executor.4 Not tainted 5.2.0+ #40 [ 406.772871][T15593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.782941][T15593] Call Trace: [ 406.786254][T15593] dump_stack+0x172/0x1f0 [ 406.790636][T15593] dump_header+0x10f/0xd33 [ 406.795163][T15593] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 406.800987][T15593] ? ___ratelimit+0x60/0x595 [ 406.805675][T15593] ? do_raw_spin_unlock+0x57/0x270 [ 406.810811][T15593] oom_kill_process.cold+0x10/0x15 [ 406.816128][T15593] out_of_memory+0x7f5/0x12e0 [ 406.820854][T15593] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 406.820876][T15593] ? oom_killer_disable+0x280/0x280 [ 406.832342][T15593] mem_cgroup_out_of_memory+0x1ca/0x230 [ 406.837901][T15593] ? memcg_event_wake+0x230/0x230 [ 406.843037][T15593] ? do_raw_spin_unlock+0x57/0x270 [ 406.848283][T15593] ? _raw_spin_unlock+0x2d/0x50 [ 406.853242][T15593] try_charge+0x1042/0x1410 [ 406.857758][T15593] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 406.863321][T15593] ? percpu_ref_tryget_live+0x111/0x290 [ 406.868878][T15593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 406.868901][T15593] ? kasan_check_read+0x11/0x20 [ 406.880130][T15593] ? get_mem_cgroup_from_mm+0x156/0x320 [ 406.885691][T15593] mem_cgroup_try_charge+0x259/0x6b0 [ 406.890993][T15593] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 406.896646][T15593] wp_page_copy+0x416/0x1770 [ 406.901250][T15593] ? find_held_lock+0x35/0x130 [ 406.906021][T15593] ? pmd_pfn+0x1d0/0x1d0 [ 406.906040][T15593] ? lock_downgrade+0x920/0x920 [ 406.906057][T15593] ? swp_swapcount+0x540/0x540 [ 406.906077][T15593] ? kasan_check_read+0x11/0x20 [ 406.924841][T15593] ? do_raw_spin_unlock+0x57/0x270 [ 406.924860][T15593] do_wp_page+0x5d8/0x16c0 [ 406.924879][T15593] ? finish_mkwrite_fault+0x540/0x540 [ 406.924911][T15593] __handle_mm_fault+0x22e3/0x3eb0 [ 406.945103][T15593] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 406.945132][T15593] ? kasan_check_read+0x11/0x20 [ 406.955600][T15593] handle_mm_fault+0x1b5/0x6b0 [ 406.955618][T15593] __do_page_fault+0x5f4/0xdb0 15:22:24 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, 0x0, 0x300) [ 406.955638][T15593] do_page_fault+0x71/0x57d [ 406.955652][T15593] ? page_fault+0x8/0x30 [ 406.955665][T15593] page_fault+0x1e/0x30 [ 406.955677][T15593] RIP: 0033:0x4308f6 [ 406.955689][T15593] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 6c 46 64 00 85 c0 0f 84 [ 406.955696][T15593] RSP: 002b:00007ffcda2040e0 EFLAGS: 00010206 [ 406.955706][T15593] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 406.955714][T15593] RDX: 0000555556fb0930 RSI: 0000555556fb8970 RDI: 0000000000000003 [ 406.955721][T15593] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556faf940 [ 406.955729][T15593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 406.955736][T15593] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 407.084975][T15593] memory: usage 3768kB, limit 0kB, failcnt 74 [ 407.093232][T15593] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 407.125028][T15593] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 15:22:24 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, 0x0, 0x300) 15:22:24 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x6, &(0x7f0000000080), 0x3) close(r1) [ 407.131928][T15593] Memory cgroup stats for /syz4: cache:0KB rss:40KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB [ 407.226343][T15593] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=15593,uid=0 [ 407.248376][T15593] Memory cgroup out of memory: Killed process 15593 (syz-executor.4) total-vm:72444kB, anon-rss:68kB, file-rss:34832kB, shmem-rss:0kB [ 407.270684][ T1048] oom_reaper: reaped process 15593 (syz-executor.4), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 407.401570][T15623] device nr0 entered promiscuous mode 15:22:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, &(0x7f0000003280), 0x379) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @loopback}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0}, 0x40012160) 15:22:24 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x6, &(0x7f0000000080), 0x3) close(r1) 15:22:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, &(0x7f0000003280), 0x379) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @loopback}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0}, 0x40012160) 15:22:25 executing program 3: openat$cgroup(0xffffffffffffff9c, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df8061000511f17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f260400200008fab973"], 0x3e) socket$kcm(0x2, 0x3, 0x2) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000840)='/dev/net/tun\x00', 0x200280, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfff, 0x18}, 0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xa, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800180004000000000000005f000000c3f9ccfff8ffffbf069704"], 0x0, 0x6, 0x2b, &(0x7f0000000240)=""/43, 0x0, 0x3, [], 0x0, 0x11, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000800)=r4, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000007c0)={0x0, r5}, 0x14) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./file0\x00', 0x0, 0xa}, 0x16d) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) [ 407.956939][ T8638] device hsr_slave_0 left promiscuous mode [ 408.047304][ T8638] device hsr_slave_1 left promiscuous mode [ 408.153524][ T8638] device bridge_slave_1 left promiscuous mode [ 408.159904][ T8638] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.214343][ T8638] device bridge_slave_0 left promiscuous mode [ 408.220688][ T8638] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.896467][ T8638] team0 (unregistering): Port device team_slave_1 removed [ 409.910132][ T8638] team0 (unregistering): Port device team_slave_0 removed [ 409.922814][ T8638] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 409.969167][ T8638] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 410.062487][ T8638] bond0 (unregistering): Released all slaves [ 410.198002][T15657] device nr0 entered promiscuous mode [ 410.211037][T15660] IPVS: ftp: loaded support on port[0] = 21 [ 410.316461][T15654] IPVS: ftp: loaded support on port[0] = 21 [ 410.612124][T15654] chnl_net:caif_netlink_parms(): no params data found [ 410.625532][T15660] chnl_net:caif_netlink_parms(): no params data found [ 410.699623][T15654] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.707198][T15654] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.715079][T15654] device bridge_slave_0 entered promiscuous mode [ 410.737253][T15660] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.745350][T15660] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.753854][T15660] device bridge_slave_0 entered promiscuous mode [ 410.761755][T15654] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.776520][T15654] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.788371][T15654] device bridge_slave_1 entered promiscuous mode [ 410.799231][T15660] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.807542][T15660] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.815854][T15660] device bridge_slave_1 entered promiscuous mode [ 410.863027][T15660] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 410.875126][T15660] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 410.887600][T15654] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 410.912707][T15654] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 410.942012][T15654] team0: Port device team_slave_0 added [ 410.949060][T15660] team0: Port device team_slave_0 added [ 410.956940][T15660] team0: Port device team_slave_1 added [ 410.965313][T15654] team0: Port device team_slave_1 added [ 411.026067][T15660] device hsr_slave_0 entered promiscuous mode [ 411.063665][T15660] device hsr_slave_1 entered promiscuous mode [ 411.275217][T15654] device hsr_slave_0 entered promiscuous mode [ 411.343790][T15654] device hsr_slave_1 entered promiscuous mode [ 411.404974][T15660] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.412138][T15660] bridge0: port 2(bridge_slave_1) entered forwarding state [ 411.419588][T15660] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.426847][T15660] bridge0: port 1(bridge_slave_0) entered forwarding state [ 411.437708][ T8593] bridge0: port 1(bridge_slave_0) entered disabled state [ 411.445585][ T8593] bridge0: port 2(bridge_slave_1) entered disabled state [ 411.543470][T15660] 8021q: adding VLAN 0 to HW filter on device bond0 [ 411.557553][T15654] 8021q: adding VLAN 0 to HW filter on device bond0 [ 411.582688][T15654] 8021q: adding VLAN 0 to HW filter on device team0 [ 411.590621][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 411.599218][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 411.631100][T15660] 8021q: adding VLAN 0 to HW filter on device team0 [ 411.651243][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 411.661835][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 411.678466][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 411.690699][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 411.707364][ T8593] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.714487][ T8593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 411.733678][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 411.741571][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 411.750331][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 411.759170][ T8593] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.767141][ T8593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 411.784287][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 411.793826][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 411.802636][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 411.811796][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 411.820689][ T8593] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.827821][ T8593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 411.854837][T15654] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 411.865464][T15654] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 411.880452][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 411.894030][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 411.902616][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 411.913400][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 411.921955][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.929073][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 411.937290][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 411.946267][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 411.954977][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 411.964684][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 411.973738][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 411.982247][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 411.991543][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 412.000663][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 412.008694][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 412.035118][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 412.044462][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 412.053741][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 412.062383][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 412.071329][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 412.080132][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 412.091848][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 412.100832][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 412.118016][T15654] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 412.126025][T13828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 412.135717][T13828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 412.150931][T15660] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 412.187763][T15660] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 412.455263][T15674] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 412.507967][T15674] CPU: 1 PID: 15674 Comm: syz-executor.2 Not tainted 5.2.0+ #40 [ 412.515643][T15674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.525694][T15674] Call Trace: [ 412.528993][T15674] dump_stack+0x172/0x1f0 [ 412.533419][T15674] dump_header+0x10f/0xd33 [ 412.537837][T15674] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 412.543730][T15674] ? ___ratelimit+0x60/0x595 [ 412.548317][T15674] ? do_raw_spin_unlock+0x57/0x270 [ 412.553428][T15674] oom_kill_process.cold+0x10/0x15 [ 412.558548][T15674] out_of_memory+0x7f5/0x12e0 [ 412.563230][T15674] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 412.569039][T15674] ? oom_killer_disable+0x280/0x280 [ 412.574254][T15674] mem_cgroup_out_of_memory+0x1ca/0x230 [ 412.579811][T15674] ? memcg_event_wake+0x230/0x230 [ 412.584946][T15674] ? do_raw_spin_unlock+0x57/0x270 [ 412.590085][T15674] ? _raw_spin_unlock+0x2d/0x50 [ 412.595125][T15674] try_charge+0x1042/0x1410 [ 412.599637][T15674] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 412.605177][T15674] ? percpu_ref_tryget_live+0x111/0x290 [ 412.610728][T15674] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.616969][T15674] ? kasan_check_read+0x11/0x20 [ 412.621837][T15674] ? get_mem_cgroup_from_mm+0x156/0x320 [ 412.627383][T15674] mem_cgroup_try_charge+0x259/0x6b0 [ 412.632668][T15674] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 412.638304][T15674] __handle_mm_fault+0x1e1a/0x3eb0 [ 412.643419][T15674] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 412.649064][T15674] ? kasan_check_read+0x11/0x20 [ 412.654012][T15674] handle_mm_fault+0x1b5/0x6b0 [ 412.658970][T15674] __do_page_fault+0x5f4/0xdb0 [ 412.663746][T15674] do_page_fault+0x71/0x57d [ 412.668270][T15674] ? page_fault+0x8/0x30 [ 412.672512][T15674] page_fault+0x1e/0x30 [ 412.676749][T15674] RIP: 0033:0x41115f [ 412.680671][T15674] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 412.700270][T15674] RSP: 002b:00007fff151a53d0 EFLAGS: 00010206 [ 412.706332][T15674] RAX: 00007fec1bff9000 RBX: 0000000000020000 RCX: 000000000045986a [ 412.714306][T15674] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 412.722400][T15674] RBP: 00007fff151a54b0 R08: ffffffffffffffff R09: 0000000000000000 [ 412.730373][T15674] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff151a55a0 [ 412.738360][T15674] R13: 00007fec1c019700 R14: 0000000000000001 R15: 000000000075bfd4 [ 412.754198][T15674] memory: usage 6324kB, limit 0kB, failcnt 268876 [ 412.760652][T15674] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 412.768602][T15674] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 412.775994][T15674] Memory cgroup stats for /syz2: cache:0KB rss:2172KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2172KB inactive_file:0KB active_file:0KB unevictable:0KB [ 412.797147][T15674] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=15674,uid=0 [ 412.813141][T15674] Memory cgroup out of memory: Killed process 15674 (syz-executor.2) total-vm:72708kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 412.837087][ T1048] oom_reaper: reaped process 15674 (syz-executor.2), now anon-rss:0kB, file-rss:34884kB, shmem-rss:0kB 15:22:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, &(0x7f0000003280), 0x379) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @loopback}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0}, 0x40012160) 15:22:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, &(0x7f0000003280), 0x379) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @loopback}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0}, 0x40012160) [ 412.887221][T15654] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 412.901020][T15654] CPU: 0 PID: 15654 Comm: syz-executor.2 Not tainted 5.2.0+ #40 [ 412.908752][T15654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.918822][T15654] Call Trace: [ 412.922216][T15654] dump_stack+0x172/0x1f0 [ 412.926744][T15654] dump_header+0x10f/0xd33 [ 412.931304][T15654] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 15:22:30 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0xfffffffffffffe77) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x541b, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TUNSETFILTEREBPF(r1, 0x5450, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='\x00') 15:22:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x6, &(0x7f0000000080), 0x3) close(r1) 15:22:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, &(0x7f0000003280), 0x379) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @loopback}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0}, 0x40012160) [ 412.937159][T15654] ? ___ratelimit+0x60/0x595 [ 412.941767][T15654] ? do_raw_spin_unlock+0x57/0x270 [ 412.946899][T15654] oom_kill_process.cold+0x10/0x15 [ 412.952028][T15654] out_of_memory+0x7f5/0x12e0 [ 412.956730][T15654] ? oom_killer_disable+0x280/0x280 [ 412.961957][T15654] mem_cgroup_out_of_memory+0x1ca/0x230 [ 412.967610][T15654] ? memcg_event_wake+0x230/0x230 [ 412.972658][T15654] ? _raw_spin_unlock+0x41/0x50 [ 412.977680][T15654] try_charge+0x1042/0x1410 [ 412.982296][T15654] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 412.987860][T15654] ? percpu_ref_tryget_live+0x111/0x290 [ 412.993556][T15654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.999824][T15654] ? kasan_check_read+0x11/0x20 [ 413.004691][T15654] ? get_mem_cgroup_from_mm+0x156/0x320 [ 413.010257][T15654] mem_cgroup_try_charge+0x259/0x6b0 [ 413.015561][T15654] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 413.021215][T15654] wp_page_copy+0x416/0x1770 [ 413.025820][T15654] ? find_held_lock+0x35/0x130 [ 413.030607][T15654] ? pmd_pfn+0x1d0/0x1d0 [ 413.034866][T15654] ? lock_downgrade+0x920/0x920 [ 413.039721][T15654] ? swp_swapcount+0x540/0x540 [ 413.044497][T15654] ? kasan_check_read+0x11/0x20 [ 413.049527][T15654] ? do_raw_spin_unlock+0x57/0x270 [ 413.054652][T15654] do_wp_page+0x5d8/0x16c0 [ 413.059304][T15654] ? finish_mkwrite_fault+0x540/0x540 [ 413.064698][T15654] __handle_mm_fault+0x22e3/0x3eb0 [ 413.069858][T15654] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 413.075436][T15654] ? kasan_check_read+0x11/0x20 [ 413.080312][T15654] handle_mm_fault+0x1b5/0x6b0 15:22:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, &(0x7f0000003280), 0x379) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @loopback}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0}, 0x40012160) [ 413.085092][T15654] __do_page_fault+0x5f4/0xdb0 [ 413.089991][T15654] do_page_fault+0x71/0x57d [ 413.094592][T15654] ? page_fault+0x8/0x30 [ 413.098865][T15654] page_fault+0x1e/0x30 [ 413.103021][T15654] RIP: 0033:0x4308f6 [ 413.107005][T15654] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 6c 46 64 00 85 c0 0f 84 [ 413.127034][T15654] RSP: 002b:00007fff151a43e0 EFLAGS: 00010206 [ 413.133197][T15654] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 413.141196][T15654] RDX: 0000555556d42930 RSI: 0000555556d4a970 RDI: 0000000000000003 [ 413.149337][T15654] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556d41940 [ 413.149345][T15654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 413.149351][T15654] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 413.175106][T15654] memory: usage 3796kB, limit 0kB, failcnt 268885 15:22:30 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0xfffffffffffffe77) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x541b, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TUNSETFILTEREBPF(r1, 0x5450, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='\x00') [ 413.181538][T15654] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 15:22:30 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0xfffffffffffffe77) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x541b, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TUNSETFILTEREBPF(r1, 0x5450, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='\x00') 15:22:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, &(0x7f0000003280), 0x379) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @loopback}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0}, 0x40012160) [ 413.215241][T15654] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 413.260972][T15654] Memory cgroup stats for /syz2: cache:0KB rss:40KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB 15:22:30 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0xfffffffffffffe77) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x541b, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TUNSETFILTEREBPF(r1, 0x5450, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='\x00') 15:22:30 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0xfffffffffffffe77) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x541b, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TUNSETFILTEREBPF(r1, 0x5450, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='\x00') 15:22:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, &(0x7f0000003280), 0x379) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @loopback}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0}, 0x40012160) [ 413.623254][T15654] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=15654,uid=0 [ 413.746864][T15654] Memory cgroup out of memory: Killed process 15654 (syz-executor.2) total-vm:72444kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 413.768688][ T1048] oom_reaper: reaped process 15654 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 414.242313][T15717] IPVS: ftp: loaded support on port[0] = 21 [ 414.695859][T15717] chnl_net:caif_netlink_parms(): no params data found [ 414.909721][T15717] bridge0: port 1(bridge_slave_0) entered blocking state [ 414.917249][T15717] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.926941][T15717] device bridge_slave_0 entered promiscuous mode [ 415.115287][T15717] bridge0: port 2(bridge_slave_1) entered blocking state [ 415.122587][T15717] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.131359][T15717] device bridge_slave_1 entered promiscuous mode [ 415.151512][T15717] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 415.353589][T15717] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 415.373536][T15717] team0: Port device team_slave_0 added [ 415.380326][T15717] team0: Port device team_slave_1 added [ 415.456342][T15717] device hsr_slave_0 entered promiscuous mode [ 415.498452][T15717] device hsr_slave_1 entered promiscuous mode [ 415.771698][T15717] 8021q: adding VLAN 0 to HW filter on device bond0 [ 415.785509][T13829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 415.794293][T13829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 415.805578][T15717] 8021q: adding VLAN 0 to HW filter on device team0 [ 415.819011][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 415.827923][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 415.837149][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 415.844274][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 415.907674][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 415.923861][T13829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 415.932591][T13829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 415.941171][T13829] bridge0: port 2(bridge_slave_1) entered blocking state [ 415.948642][T13829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 415.956713][T13829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 415.965644][T13829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 415.980705][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 415.990054][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 415.999071][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 416.008537][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 416.017205][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 416.081511][T15717] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 416.092489][T15717] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 416.106492][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 416.115461][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 416.124279][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 416.132615][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 416.141668][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 416.209036][T15717] 8021q: adding VLAN 0 to HW filter on device batadv0 15:22:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, &(0x7f0000003280), 0x379) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @loopback}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0}, 0x40012160) 15:22:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='/cpu /cpu /io -rdma \x00pjds '], 0x1a) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x0, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x0, 0x0, 0x0, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r4, 0xf, 0x1, 0xfffffffffffffffc, 0x0}, 0xfffffd89) openat$cgroup_ro(r4, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) 15:22:33 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0xfffffffffffffe77) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x541b, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TUNSETFILTEREBPF(r1, 0x5450, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='\x00') 15:22:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001e000504ed0080648c63b8ee204494f20531d200050011404b48000001000080000000000300f88000f0", 0x2e}], 0x1}, 0x0) 15:22:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0, 0x8}, 0x2c) 15:22:33 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0xfffffffffffffe77) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x541b, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TUNSETFILTEREBPF(r1, 0x5450, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='\x00') 15:22:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001e000504ed0080648c63b8ee204494f20531d200050011404b48000001000080000000000300f88000f0", 0x2e}], 0x1}, 0x0) [ 416.440923][ T27] audit: type=1804 audit(1563117753.594:64): pid=15727 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir011275257/syzkaller.PABN8Q/81/memory.events" dev="sda1" ino=16850 res=1 15:22:33 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0xfffffffffffffe77) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x541b, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$TUNSETFILTEREBPF(r1, 0x5450, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='\x00') 15:22:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0, 0x8}, 0x2c) 15:22:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, &(0x7f0000003280), 0x379) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @loopback}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0}, 0x40012160) 15:22:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001e000504ed0080648c63b8ee204494f20531d200050011404b48000001000080000000000300f88000f0", 0x2e}], 0x1}, 0x0) 15:22:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x55, 0xa}, [@ldst={0x3, 0x0, 0x6, 0x1c10a1}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 15:22:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0, 0x8}, 0x2c) [ 417.164862][ T27] audit: type=1804 audit(1563117754.324:65): pid=15736 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir011275257/syzkaller.PABN8Q/81/memory.events" dev="sda1" ino=16850 res=1 15:22:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='/cpu /cpu /io -rdma \x00pjds '], 0x1a) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x0, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x0, 0x0, 0x0, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r4, 0xf, 0x1, 0xfffffffffffffffc, 0x0}, 0xfffffd89) openat$cgroup_ro(r4, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) 15:22:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000740)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1000000000000001, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000280)=@in6={0xa, 0x0, 0x10000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}, 0x1}, 0x80, 0x0}, 0x20008844) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x17, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, [], 0x0, 0xffffffffffffff9c, 0x8, 0x1}, 0x3c) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x18) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)=0x6, 0xec16413503e4f449) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) write$cgroup_int(r3, &(0x7f0000000000), 0xfdef) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fff8, 0x0, 0x820004, 0x0, 0x600}, 0x2c) 15:22:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001e000504ed0080648c63b8ee204494f20531d200050011404b48000001000080000000000300f88000f0", 0x2e}], 0x1}, 0x0) 15:22:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x55, 0xa}, [@ldst={0x3, 0x0, 0x6, 0x1c10a1}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 417.651190][ T27] audit: type=1804 audit(1563117754.804:66): pid=15777 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir011275257/syzkaller.PABN8Q/82/memory.events" dev="sda1" ino=16754 res=1 [ 417.988171][T15776] device nr0 entered promiscuous mode [ 418.199716][T15783] IPVS: ftp: loaded support on port[0] = 21 [ 418.365247][T15783] chnl_net:caif_netlink_parms(): no params data found [ 418.405875][T15783] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.413895][T15783] bridge0: port 1(bridge_slave_0) entered disabled state [ 418.421700][T15783] device bridge_slave_0 entered promiscuous mode [ 418.474185][T15783] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.481379][T15783] bridge0: port 2(bridge_slave_1) entered disabled state [ 418.490973][T15783] device bridge_slave_1 entered promiscuous mode [ 418.512127][T15783] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 418.524616][T15783] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 418.584514][T15783] team0: Port device team_slave_0 added [ 418.592062][T15783] team0: Port device team_slave_1 added [ 418.669847][T15783] device hsr_slave_0 entered promiscuous mode [ 418.723599][T15783] device hsr_slave_1 entered promiscuous mode [ 418.804572][T15783] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.811673][T15783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 418.819154][T15783] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.826340][T15783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 418.923374][ C1] kasan: CONFIG_KASAN_INLINE enabled [ 418.929056][ C1] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 418.937349][ C1] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 418.944471][ C1] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.2.0+ #40 [ 418.951449][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.961515][ C1] RIP: 0010:send_hsr_supervision_frame+0x38/0xf20 [ 418.967938][ C1] Code: 89 fd 41 54 53 48 83 ec 50 89 75 bc e8 11 07 54 fa 49 8d 45 10 48 89 c2 48 89 45 d0 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 dc 0c 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 418.987615][ C1] RSP: 0018:ffff8880ae909c58 EFLAGS: 00010202 [ 418.993662][ C1] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff871d8677 [ 419.001616][ C1] RDX: 0000000000000002 RSI: ffffffff871d732f RDI: 0000000000000000 [ 419.009579][ C1] RBP: ffff8880ae909cd0 R08: ffff8880a98d8340 R09: ffffed1015d26c84 [ 419.017550][ C1] R10: ffffed1015d26c83 R11: ffff8880ae93641b R12: ffff88808e3bcec0 [ 419.025507][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000 [ 419.033469][ C1] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 419.042402][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 419.048985][ C1] CR2: 00007ffdbd2b2f88 CR3: 00000000a0634000 CR4: 00000000001406e0 [ 419.057037][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 419.065223][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 419.073299][ C1] Call Trace: [ 419.076686][ C1] [ 419.079527][ C1] ? lock_acquire+0x16f/0x3f0 [ 419.084211][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.090451][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 419.096160][ C1] hsr_announce+0x12f/0x3b0 [ 419.100642][ C1] call_timer_fn+0x193/0x720 [ 419.105327][ C1] ? hsr_dev_open+0x380/0x380 [ 419.109982][ C1] ? process_timeout+0x40/0x40 [ 419.114913][ C1] ? run_timer_softirq+0x65d/0x1740 [ 419.120116][ C1] ? trace_hardirqs_on+0x67/0x220 [ 419.125123][ C1] ? kasan_check_read+0x11/0x20 [ 419.129957][ C1] ? hsr_dev_open+0x380/0x380 [ 419.134618][ C1] run_timer_softirq+0x66f/0x1740 [ 419.139717][ C1] ? add_timer+0x930/0x930 [ 419.144203][ C1] ? kvm_clock_read+0x18/0x30 [ 419.148956][ C1] ? kvm_sched_clock_read+0x9/0x20 [ 419.154059][ C1] ? sched_clock+0x2e/0x50 [ 419.158462][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.164716][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.170947][ C1] __do_softirq+0x25e/0x913 [ 419.175601][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 419.180450][ C1] irq_exit+0x180/0x1d0 [ 419.184593][ C1] smp_apic_timer_interrupt+0x171/0x5a0 [ 419.190122][ C1] apic_timer_interrupt+0xf/0x20 [ 419.195120][ C1] [ 419.198134][ C1] RIP: 0010:native_safe_halt+0xe/0x10 [ 419.203494][ C1] Code: ff ff 48 89 df e8 e2 61 83 fa eb 82 e9 07 00 00 00 0f 00 2d 44 46 60 00 f4 c3 66 90 e9 07 00 00 00 0f 00 2d 34 46 60 00 fb f4 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 e8 be b0 37 fa e8 99 [ 419.223350][ C1] RSP: 0018:ffff8880a98e7d78 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 419.231776][ C1] RAX: 1ffffffff11a5a9d RBX: ffff8880a98d8340 RCX: 0000000000000000 [ 419.239759][ C1] RDX: dffffc0000000000 RSI: 0000000000000006 RDI: ffff8880a98d8bcc [ 419.247724][ C1] RBP: ffff8880a98e7da8 R08: ffff8880a98d8340 R09: 0000000000000000 [ 419.255677][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 419.263649][ C1] R13: ffffffff88d2d4d8 R14: 0000000000000001 R15: 0000000000000000 [ 419.271814][ C1] ? default_idle+0x4e/0x320 [ 419.276498][ C1] arch_cpu_idle+0xa/0x10 [ 419.280818][ C1] default_idle_call+0x36/0x90 [ 419.285567][ C1] do_idle+0x377/0x560 [ 419.289626][ C1] ? arch_cpu_idle_exit+0x80/0x80 [ 419.294643][ C1] cpu_startup_entry+0x1b/0x20 [ 419.299385][ C1] start_secondary+0x3ba/0x540 [ 419.304255][ C1] ? set_cpu_sibling_map+0x2010/0x2010 [ 419.309960][ C1] secondary_startup_64+0xa4/0xb0 [ 419.314971][ C1] Modules linked in: [ 419.318936][ C1] ---[ end trace 234a6297891cefd2 ]--- [ 419.324646][ C1] RIP: 0010:send_hsr_supervision_frame+0x38/0xf20 [ 419.331308][ C1] Code: 89 fd 41 54 53 48 83 ec 50 89 75 bc e8 11 07 54 fa 49 8d 45 10 48 89 c2 48 89 45 d0 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 dc 0c 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 419.351104][ C1] RSP: 0018:ffff8880ae909c58 EFLAGS: 00010202 [ 419.357198][ C1] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff871d8677 [ 419.365343][ C1] RDX: 0000000000000002 RSI: ffffffff871d732f RDI: 0000000000000000 [ 419.373425][ C1] RBP: ffff8880ae909cd0 R08: ffff8880a98d8340 R09: ffffed1015d26c84 [ 419.381393][ C1] R10: ffffed1015d26c83 R11: ffff8880ae93641b R12: ffff88808e3bcec0 [ 419.389427][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000 [ 419.397430][ C1] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 419.406501][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 419.413105][ C1] CR2: 00007ffdbd2b2f88 CR3: 00000000a0634000 CR4: 00000000001406e0 [ 419.421164][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 419.429282][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 419.437283][ C1] Kernel panic - not syncing: Fatal exception in interrupt [ 419.446426][ C1] Kernel Offset: disabled [ 419.450850][ C1] Rebooting in 86400 seconds..