f7a454773a0575f7d9bfcb8c8646ffbad451446daf3ea742c0fa6bbb2ca4db442e60492ac9e131037278fa5552c0ed00c84469cd11600d3365617f57af4178fc264500327c48ae67de27c62766f9d6848e57f2ce0eb75e1cf72bafb21541c0370f73fc77e0d8b0b11056362a3936e38271259377d40fbc257d8c72b3e583fc6b0e20420dbc99a7932cb305fa9e61bd0de0d9758d35fe0ee13d0eaa782a3059e10caa61df3903aa1061298aced4712d998181e7edd03a11041de4018fe56cae17e0dced027ab7a0a27a6415d8d", 0x1000}], 0x1}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={0x0}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) 12:49:37 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000002f00)={&(0x7f0000001d80)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001e00)=""/143, 0x8f}], 0x1, &(0x7f0000001f00)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000740)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x1000000000000001, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000280)=@in6={0xa, 0x0, 0x10000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}, 0x1}, 0x80, 0x0}, 0x20008844) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x17, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x18) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)=0x6, 0xec16413503e4f449) 12:49:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'hwsim0\x00'}) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000000), 0x70db2da734432a8e) setsockopt$sock_attach_bpf(r1, 0x29, 0x15, &(0x7f0000000080), 0xfcf3) 12:49:37 executing program 4: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000140)}, 0xfffffffffffffc5d) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) openat$cgroup_type(r0, 0x0, 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040), 0x12) socket$kcm(0xa, 0x0, 0x11) openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) socket$kcm(0x29, 0x7, 0x0) [ 635.054481][T23585] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 12:49:38 executing program 5: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r2, &(0x7f0000000140)}, 0xfffffffffffffc5d) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x7fffffff, 0x5, 0x0, 0x6, 0x0, 0x0, 0x80000, 0x3, 0x40, 0x1, 0x1, 0x3ff, 0x2, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x2, 0x3a1, 0x8899, 0xfffffffffffff192, 0x7, 0x8000, 0x100, 0x2, 0x5, 0x0, 0x8001, 0x4, 0x0, 0x3, 0x9, 0x3, 0x0, 0x1, 0x0, 0x10000, 0x3, @perf_bp={0x0, 0x1}, 0x0, 0xfffffffffffffffd, 0x0, 0x7, 0x400000000000, 0x0, 0x60}, r2, 0x1, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, r0, 0x0, 0x12, &(0x7f00000005c0)='cpuacct.usage_all\x00'}, 0x30) perf_event_open(&(0x7f0000000540)={0x7, 0x70, 0x5, 0x401, 0x8, 0x8, 0x0, 0x2, 0x80008, 0x7, 0x10000, 0x4, 0x0, 0x4, 0x1, 0x4, 0x800, 0xfffffffffffffffb, 0x1f, 0xffff, 0x10001, 0xfffffffffffffffe, 0xca4, 0xb13b, 0x9, 0x0, 0x3, 0x5, 0x4, 0x2734c79b, 0x9, 0x1, 0xffffffff, 0x7, 0x0, 0x0, 0x6, 0x2, 0x0, 0x9, 0x4, @perf_config_ext={0x7, 0x7}, 0x0, 0x8, 0x1, 0xf, 0x6, 0x6, 0x7}, r3, 0x10, 0xffffffffffffffff, 0x9) gettid() ioctl$TUNSETLINK(r2, 0x400454cd, 0x313) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(r1, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="046d656d6f72799a2ef96bed5247622e1db7a95c4201be5d20e96f314a03c154e0157aacf455718d80c2afbfb7a51b33b8f1fa00"/65], 0x41) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) openat$cgroup_type(r1, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000500)={r4, &(0x7f0000000440)="369cff807e1d5ac6310702158e1c521d8e215a38ae572f43b1946898ea339340fc4be0c2d9f93350a644edae7a190d0de36d42a214a38185509c911792a449fdad02978b6ae9a9e6cee3b7aab7f9ccf387691db4a0c6766fa429d7ab9db39be29e319163957c8d2fa48507690e5bb3650dd9fd640408ea2650289009cf2c5978a985f7c9c60ba397a26c2bbb34e653af74ed676cda4213cd6f83323a88d80a9c2c6042aec7a0d341d819dddb", 0x0}, 0x18) write$cgroup_int(r5, &(0x7f0000000040)=0x8, 0x12) socket$kcm(0xa, 0x0, 0x11) r6 = openat$cgroup_ro(r2, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$TUNSETSNDBUF(r6, 0x400454d4, &(0x7f0000000380)) write$cgroup_int(r2, &(0x7f00000000c0), 0x1802a140) openat$cgroup_int(r6, &(0x7f0000000300)='cpuset.cpus\x00', 0x2, 0x0) 12:49:38 executing program 1: socket$kcm(0x11, 0xa, 0x300) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 12:49:38 executing program 4: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000140)}, 0xfffffffffffffc5d) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) openat$cgroup_type(r0, 0x0, 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040), 0x12) socket$kcm(0xa, 0x0, 0x11) openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) socket$kcm(0x29, 0x7, 0x0) [ 635.475267][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 635.481177][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 635.503415][T23613] device nr0 entered promiscuous mode 12:49:38 executing program 0: socketpair(0xfffffffffffffffd, 0xf, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socket$kcm(0x10, 0x400800000000000, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000002200)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1e2}, 0x22) recvmsg(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2ce}, 0x70) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f0000000380)=@ax25={{0x3, @bcast, 0x4}, [@default, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000580)="d79d55a8679a5c68be41a2faea4a95cc", 0x10}], 0x1}, 0x40000) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x1a498851908be631) sendmsg(r1, &(0x7f0000000140)={&(0x7f0000000200)=@isdn={0x22, 0x1f, 0xffffffff, 0x400, 0x4}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000006c0)="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", 0x1000}], 0x1}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x1000000000000005, 0x209e1e, 0x408000000004, 0x1, 0xffffffffffffff9c}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={0x0}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) [ 636.004156][T23635] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 12:49:38 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x1) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x2d1) gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x7f, 0xffffffffffff7fff, 0x9, 0x0, 0x0, 0x200, 0x26, 0x1, 0xfffffffffffffff8, 0xd5b5, 0x46, 0xe66, 0x7, 0x8d4, 0x7ff, 0x0, 0x1000, 0x8, 0x0, 0x1, 0x9, 0x2, 0xfff, 0x100000000, 0x1, 0x6, 0x2, 0x5, 0x0, 0xff, 0x3, 0x8, 0x590, 0x8, 0x6, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x114, 0x9, 0x10000, 0x0, 0x9, 0x1, 0x8}, r3, 0x7, r0, 0x1) recvmsg(r1, &(0x7f0000000080)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0xdc, &(0x7f0000000300)=[{&(0x7f0000000480)=""/97, 0xfffffffffffffda8}], 0xfffffffffffffd2}, 0x10000) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x7fffffff) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000380)) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 12:49:38 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000002f00)={&(0x7f0000001d80)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001e00)=""/143, 0x8f}], 0x1, &(0x7f0000001f00)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000740)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x1000000000000001, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000280)=@in6={0xa, 0x0, 0x10000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}, 0x1}, 0x80, 0x0}, 0x20008844) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x17, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x18) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)=0x6, 0xec16413503e4f449) [ 636.355779][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 636.362360][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 636.366620][T23622] device nr0 entered promiscuous mode [ 636.369970][ C1] protocol 88fb is buggy, dev hsr_slave_0 12:49:39 executing program 5: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r2, &(0x7f0000000140)}, 0xfffffffffffffc5d) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x7fffffff, 0x5, 0x0, 0x6, 0x0, 0x0, 0x80000, 0x3, 0x40, 0x1, 0x1, 0x3ff, 0x2, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x2, 0x3a1, 0x8899, 0xfffffffffffff192, 0x7, 0x8000, 0x100, 0x2, 0x5, 0x0, 0x8001, 0x4, 0x0, 0x3, 0x9, 0x3, 0x0, 0x1, 0x0, 0x10000, 0x3, @perf_bp={0x0, 0x1}, 0x0, 0xfffffffffffffffd, 0x0, 0x7, 0x400000000000, 0x0, 0x60}, r2, 0x1, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, r0, 0x0, 0x12, &(0x7f00000005c0)='cpuacct.usage_all\x00'}, 0x30) perf_event_open(&(0x7f0000000540)={0x7, 0x70, 0x5, 0x401, 0x8, 0x8, 0x0, 0x2, 0x80008, 0x7, 0x10000, 0x4, 0x0, 0x4, 0x1, 0x4, 0x800, 0xfffffffffffffffb, 0x1f, 0xffff, 0x10001, 0xfffffffffffffffe, 0xca4, 0xb13b, 0x9, 0x0, 0x3, 0x5, 0x4, 0x2734c79b, 0x9, 0x1, 0xffffffff, 0x7, 0x0, 0x0, 0x6, 0x2, 0x0, 0x9, 0x4, @perf_config_ext={0x7, 0x7}, 0x0, 0x8, 0x1, 0xf, 0x6, 0x6, 0x7}, r3, 0x10, 0xffffffffffffffff, 0x9) gettid() ioctl$TUNSETLINK(r2, 0x400454cd, 0x313) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(r1, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="046d656d6f72799a2ef96bed5247622e1db7a95c4201be5d20e96f314a03c154e0157aacf455718d80c2afbfb7a51b33b8f1fa00"/65], 0x41) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) openat$cgroup_type(r1, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000500)={r4, &(0x7f0000000440)="369cff807e1d5ac6310702158e1c521d8e215a38ae572f43b1946898ea339340fc4be0c2d9f93350a644edae7a190d0de36d42a214a38185509c911792a449fdad02978b6ae9a9e6cee3b7aab7f9ccf387691db4a0c6766fa429d7ab9db39be29e319163957c8d2fa48507690e5bb3650dd9fd640408ea2650289009cf2c5978a985f7c9c60ba397a26c2bbb34e653af74ed676cda4213cd6f83323a88d80a9c2c6042aec7a0d341d819dddb", 0x0}, 0x18) write$cgroup_int(r5, &(0x7f0000000040)=0x8, 0x12) socket$kcm(0xa, 0x0, 0x11) r6 = openat$cgroup_ro(r2, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$TUNSETSNDBUF(r6, 0x400454d4, &(0x7f0000000380)) write$cgroup_int(r2, &(0x7f00000000c0), 0x1802a140) openat$cgroup_int(r6, &(0x7f0000000300)='cpuset.cpus\x00', 0x2, 0x0) 12:49:39 executing program 4: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000140)}, 0xfffffffffffffc5d) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) openat$cgroup_type(r0, 0x0, 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040), 0x12) socket$kcm(0xa, 0x0, 0x11) openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) socket$kcm(0x29, 0x7, 0x0) 12:49:39 executing program 4: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000140)}, 0xfffffffffffffc5d) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) openat$cgroup_type(r0, 0x0, 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040), 0x12) socket$kcm(0xa, 0x0, 0x11) openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) socket$kcm(0x29, 0x7, 0x0) 12:49:39 executing program 1: socket$kcm(0x11, 0xa, 0x300) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 12:49:39 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xe, 0x4, 0x4, 0x3}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x16, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x18) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000300)="a69b780baed0e7fb1ed80e5359e540ddf27b58cf47ddb933ca99e86382148c16b6b9866516e8e98ac6db38cf60d091fcb639f3848eef20f54316c0cd12d2584f66d0eaa6eb2dd7a0a11f2b788bd186d01543459e5fec7bf7d49fed05a312eb57b27f0298707909c277d0133cab5fa5136956c089e74765470c460c59b2f597c87fc6f41116cd8fd01186312af827c2507836f1125ffeaaaa93e4b10fd32ea13b5583ee301512b722799df7a6b3570c5fa54bdde4ebd2221cdda52df7247765cc018a667b9ea61eacaa2bb5c16e421605fbb7c14ec82b1c1fe90eff2fe872d254f92de617311a7612a9f84ea923ab97b392939f40d4c5b4c27325e9f95a5254e1bfffcda9f01a5ce2729fb9741b562b0df07a6c482fd065eba6a9442b408d9aa906580d2850819f0fe821fda453d5884e6d01efbcffeab0fb49caca3cee700df023c1bf22d59cc7ec49143643c6093cc826aa72c7032ba3b27519a88916969af8662292a12803a1ca66d0083f625339f217a6cd52ad1198cf6b268666ae7f8adee7b53b0cec9451035be1f7fc2e131eceee1a43fef8462f824682a2ae42c579af7a6592836aaa2ec2827a1a808023b5fe61c7c719862a7f1f3324c937316b8a2056285373483aa8674f3e51fd502399f5025f88743a0b4ce0ecbe681b0d26d2d045607c0a101c6ed9b4225058b5633adca5605aeef28f8a0e7033a8b8fec5f6a7798fcf9b4c7e685368eaf398472e090c121751f21588fa02d0dd0de0bf2b9b34de3d7ae5aec8f72c390f7f294b148b3d985d24a6bb63d45d8686a6edd163a4cef9c343f620987bd7c84dd8f3caf0a37ac601aad5d67148a7029febed99c932e2639eb52198ea27c28a836c016e56748d73bff1da7fe1366b644e348a53ee69f0ab9d0be33b979c5faaa3f5e736407b4118da3ac9fb0c8a94191caf09cf8663849fd9c02f2ccfe7d0a271fb2e80c9968ef2c003f26fe6a10362707fbd936c7b687e636038928fedf6f047617597d77ef47717b13bbbad81b5ae5b9804f3e7eb19bcf7709e41c9dc5d661de86043cf764a073772db09bac702be65322386579f905f94906f00aab204ab68da5b0f0b259bf35674ba6d6e9b45f895e11810acfb0a977993f0983335a42d859e7b23d53096eb9f8c4210cae8e03b383e679c1e69856a7e7556c031757d56d430ca9969163761980418bcd45aeefdb24633461fd2627a93ab9af03353ba47bb140644c4d6235dd0e6e5f1fdd6cd6bcfafac8f09007be580e7425b1ff11f8d61f3875fdc3dd7f19b5a0bceeb93e62a75dfe35844309e02d7fd0f66c3f9d3a8505f76130c4f892f12a0c45ad0815cea4afb11c51bc1fdb085612cf510b108d46aafe111cd5e920f4bb60e4a2a5e581d77ad10f421b566aab2239dcf0cb0dd97a558c61811b6da3300f568e4704c22e008cb2a25bd7ff1af99badd85387d497cd8e6b3473c55015827ad169a7fcae52875a00bc69a2c7bc447cabcf516d6ea834a93323ba9a2fe691fedcdfbe513216395a1aba1f5a576f668aa9c5f7ea49c038b90f4cad7fa0ee5c56d68e54b40e6b1fe8d2f8f90108fc7303350962427c3d8f14a8e624f2be57acb86c123ea352398559cd332dff8b561d8b595aee92a10dceaf8fbc11a4798d90927a3a52f7c77a5334fc4ea04aa369a35927aa349c35b340369aad4fbbef7a0acadd381ae6afc73933ef83f46eeb228e53339ae81920be0564c6a6839a835bca25fe00e2c7c155708f403d07bbd0a301b2ff1a5e78a09fc135fe4507063ce41e47c1faa5aa0caf946af274c7b9655b3f32f2237cc41ee94db364cf3bb4b71b2b38b29c3273bdfb9fc96791fc2a4d365b9603fa68876ba2d8aea37e3458fa3927682856a77cb84451c4f871a27c35ff5dabd2f96d843793e4bf6e57b183facad6943b3572680620235ae174b6a675aa276356d12984feb4e8b5a9d3ab42c03e63beba1bf32692059ba095b3a5d5ac25e0dbb1ff4588f62a937d0bfa86376e454ed1ac65f96ca65481a5195192aa0b2174e60e8d51aadd34cd6fee82d013c0ccf9e4d4e4ffd37c10e7a37afc9a75e398a4c479d06d469b2b8879a82bd15694c830fca2537854ffedb8f03db7368b58db6a4e4bbffff4b09774a9054df0e52afa68a26fddd38ceb47fdcf7b728810e65a63ff4e2e2a42e491a59bcc3339c05c66754b88af2b8282b388fecfc67b5b8fcf714e0813a7530104969dea7477e55b41f1bc7aa6a04e19332da9ade5999ac3956b61351911a54622a9de26798d101f65fea42a2a0e3fb238209761ca2fb0aef466746c9ebd470fd3be8e8f554a16bc0824f8ccfeddc7d7860ee972138672ff04ab0f8e1b7951ced6beced4505dd5bc4e24bdab7040879f3f84ae272b44eda6d4cfe897a450332cdf0d90e1c6c1438857784b6463415005ed2da068d793e90033d03efe47277c110b259099afef48cd804110d6a883bf70107545bcd62b6cbca2438a4790e61952be8d48ac5f6bb008e97dd4789ea7c77f13dc60f7b588a45ece43805c946a09402b8e886cbb3e778af12541275914da0a1dd5852fc09224e2dab9b8d660c85c4098284fa55360fea759e57f5efadb78b87193e6caf23048985cf4e0c6c92f40edda691bfea4fbc67ee1ed3d5beac32e54ea9d9c52ee32f26b5ea8f0d796ee1d18ffeb9556ad8ee6dbda3d2910af127b32afad16208b7f975d079e28e32586496ab034a257a66c80bc266cc356258821a6109ba73086cc83c519e9f7b718f4882b73eef305e8af4fb88d690b2e1a1c66634039ff15a86d46fdbfbacf2c8de84004fea2c774041a542763f29a4ae16dc981acbbcb443f859b7ebe6c03002c3189ea138d8130431d89a1fb73fff040fd9c6de453a69a4ef966d18dcf7c51ca3984fc3c73baf3d7c9597148a328655c77d61a27def974f73122003fb5af2194afaff582977db1012726ed23d76c0c4ec5b849f9885606ebeeb9da0198212f5eff9c002d1a9924cbd75b32f10f54be9a560a98db99e49e76c5d220d2d13b5b862da7cffa8669cf9cae8f58e09a2190032970c0a1febb5bd1f90ea64d18454cc7f2138fd93d979a9860dad94eb408df83739f7c9859d297f13130162787a1ec77dade544ffeb220cd96ebe9b3ce0421b548b6b04c1b40bd25995e442f01d599eb512c4a21deb9445fcf295f12a887ce0a45cfd613d824db0a871968d27370a5c4432c90306b901b920531d9936c078350a3c0b97eb1b4ac8520b46e71e41b9440842a6b7b85457d6b8281be59d933df931a4f7219dcec9297b0d98d5187a16f8cc888e14fb8689964300ea251408c47b5542fb06ac84453dc6dd3d920ae2efcf2681866c74234a5629bf79357d600bfc7166eafec9e024ebd70262976816bf918a396261753f6afdcfe40d356140884605027c5958fb62a61c1916a12997092686f6a08e8f1941ebcc090688bbc67301830ba8513b00899cad0f927ce2f8ad1fed46169e5b4588783b7b0120354e39cafa62fc8f1ec51a053c0023a82a495ab1fc261b69be171ee3c0c752881481274bc5693cbe7480f44c3f71c20ed4b8bbd4443b0700ac63fdb478b333fd5a5d9a63de5f94d3bd7ac16e815ca5bb39b132087d8cf34a861b7ad5bc4e941c77d0225b0a6e76a956a9afdeab280317928f5c1c7e32f3e14e150e0acebe84d8febc282dd564a259d0afca81effaebd0e6450a8893f4e334dec088761661fcf4d10ae6fea8ed60cca7dec73aec96d7562d437daf94c12ab23a791da1806e17edc9ef6b860fecdcdf500c8fdd0fefe7098f5359d241055ba6d1340b74188beb5417ea5bf5810a963914ef87ffd76aaa1f0bcdbc62fb430d7afacd4c4612613fa3722ee2528096d3d03ca42cf4d65e882f33eb069ba57762a4f5babfe5ee328e2d4a44498c4909303a5574d43e74aa2b230c684da76dfe66d098ed297a59ec05ad4f61b1f30e3b058d9dd5e211c77a15ac7879241710c4a394bfdf879bdc3ff8e19b7bcd8693e991b5ff91eed46aa190843ad16fd86dcf119495ebefabd040192da00e6f00787b9331649bc5b77c654bab0f09186d609e67a912d269ead50c9422915e7a15c49f8bce4f2988db825c481b368b4eee404fa41821feb48062087b74ea6b3dae548be3c88003a299ae18432f67e0e8370e9e00d765daa3d2defa15fc1254ceaf153c0c082b1771d152561df63606b9827708760a5c5f45b0be509f288016ca2ec9e642d75a1fb8244974f9a7b931c06c8ce2f74910a6a1fcd9e493ea6fbc310c9e22d0bb9f5860dbff05d3b8c4536acf82e998bf54965fa1477a33e7ea7f6ad0b2154fa2d0218ad789ec69e8a6fc819e3925da60d2254e1e8cc99a4afbb1431f790d54c159dae5c49b00e8232af62dc9adae5350cc1e75af9bbd29a506621c3542aa8d851489372e1c924fede65be3b33c7f7b409461503e6ab062a608a96cf7ccf4722524d440ea477ac8cdd4c367f8a2b8ea12eac9fe452a1779bfec59e6595db7f8fbc1d0dc60a866200d034687bbe1486d32dd8f0e715732f042ec900dbd9cb1f7d187305c92cdc9cafb421ddc62a3f870ebc8b38d88324e4aef001c05616fd7d41ee82499324795a7cd6bfdc65feff3987c5078c038926161c29624b7cf5968c248569f84b1ecc1ed233ec98f7211f9c8a2efaacd7966eb59eba22048ecd91923adafdc95360bf2993eb5a6e26514c08f496f1d689c39c990db17884f01340df51704ff1a257d15f8ce35014ce996dcb14a7c18c0d3f62a2d3267748276d3dee9a8c4a15ce95ac6e0350e54098933a97a26723e04911b22409f4f984ef2ef410c1816777218b87f5dda1f2dc17dbc70893105ac6f1d2a405b6349a14afae1346de9a4d99d69e6ba9bb3905b3254286e4b8ee6b17caca1c294c01c7347ff367579d1cea3468ad6a3de004b05fd6d5b035b0aa3f11b329f62eb5c5abd32a1022fc6c014518f10e57a6a817b4f0b46b013eff61c9da4fc3ac3099138a9ac1bebd3bb197ff2126f51d691c8a37e5cc66d59402822f97262ab01bdff780c79a4af1e01f3b9617c1fcf84e28ff15ca2bff45024800cf48d5387ab1a19557fd4ab4c5797ea692841b1103270490dd7f5dbe42c5606bea6fbf30a10ff688b670eeb0b679751a2ddf4bfd9cae3f286d24405606c9d3d3f2442a4638daecbb57825bc9f824b4b47fd158e7d840be69cd0368817caa1de3e6595fee153ca588c634c3a8a1031e20cea700b1d12638659766bf7a934843a0719883826105fa215ad9074feb6f360181ddf993ef0b07a1b0027847fb2b50d331ee1b13a3949e6aab7fdca62ce287fdfe4db62ac672fc020c1b5d559ec42b1891397b9275e3a56db62a868fda90eb1c7f9fd4c625ad10dd8c0658d63590598a98d646aa242187d58b03bf878652bc8587f8c402c76fdff1c546f1c9c2009caa747e9af6e1a74e3acf7bd1197c96e0ca4a527d4e92f7886171cdfc49ee5d3e7632a61d41371f4066ec5a74e43a674aca54357e7b4f7343d311bda20e4d30a86fc70575aab32b58512cfbe1d1e83194d19d45a4e96fdcc637298de3a7d2fccbb69af994e570e60226eebd26b950de2a6de588a1213d9220059d84ce3163b5aaefbccbe67354b45cbfadcec3ed592dd48db6403e2ff07456ef61f37c31e79dc669e1daefbbb7f90ff136af216c58bcbcb84a5369a31971469136b34b93aeb002e2c4e0106a308cb79616abc9709c7d5e68a277c7e74c312cbb10db6d1d64938f46243a59f0ff61aed811fbf9c03dc2bd43cf0173a0d804363", 0x0}, 0x18) r1 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffffffffffefa, &(0x7f0000001300)='joddv\xf6'}, 0x30) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x4, 0x6, 0x7, 0x3, 0x0, 0xb1b, 0x800, 0xa, 0x3, 0x100000001, 0xfffffffffffffffa, 0x9, 0x7, 0x1f, 0x0, 0x7fffffff, 0x1873cb50, 0x800, 0xad, 0xfffffffffffffff7, 0xce, 0x7fff, 0x40, 0x1ff, 0x3, 0x9, 0x0, 0x4, 0x1, 0x29c43411, 0x40, 0x1, 0xffff, 0x49, 0x3f, 0xfffffffffffffff8, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x200, 0x200, 0x5, 0x455d, 0x7}, r1, 0x6, r3, 0x9) perf_event_open(&(0x7f0000001340)={0x7, 0x70, 0x315e073a, 0x1, 0x3f, 0xfffffffffffffff8, 0x0, 0x89, 0x20100, 0x4, 0x9, 0x1, 0x1, 0x1ff, 0x5, 0x2675, 0x3f, 0x1, 0x1, 0x80000000, 0x96, 0x9, 0x400, 0x4, 0x5, 0x3, 0x3, 0x6, 0x4, 0xa6c, 0x1, 0x1ff, 0x5, 0x2, 0x2, 0x6f, 0xfffffffffffffffe, 0x4, 0x0, 0x8, 0x6, @perf_config_ext={0x7, 0xe000000000000000}, 0x20, 0x146880, 0x2, 0x0, 0xff, 0x8, 0x80}, r2, 0x6, r3, 0x8) 12:49:39 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x1) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x2d1) gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x7f, 0xffffffffffff7fff, 0x9, 0x0, 0x0, 0x200, 0x26, 0x1, 0xfffffffffffffff8, 0xd5b5, 0x46, 0xe66, 0x7, 0x8d4, 0x7ff, 0x0, 0x1000, 0x8, 0x0, 0x1, 0x9, 0x2, 0xfff, 0x100000000, 0x1, 0x6, 0x2, 0x5, 0x0, 0xff, 0x3, 0x8, 0x590, 0x8, 0x6, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x114, 0x9, 0x10000, 0x0, 0x9, 0x1, 0x8}, r3, 0x7, r0, 0x1) recvmsg(r1, &(0x7f0000000080)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0xdc, &(0x7f0000000300)=[{&(0x7f0000000480)=""/97, 0xfffffffffffffda8}], 0xfffffffffffffd2}, 0x10000) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x7fffffff) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000380)) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 12:49:39 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r4, 0x3) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 12:49:40 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000002f00)={&(0x7f0000001d80)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001e00)=""/143, 0x8f}], 0x1, &(0x7f0000001f00)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000740)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x1000000000000001, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000280)=@in6={0xa, 0x0, 0x10000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}, 0x1}, 0x80, 0x0}, 0x20008844) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x17, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x18) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)=0x6, 0xec16413503e4f449) [ 637.401136][T23674] device nr0 entered promiscuous mode 12:49:40 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r4, 0x3) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 12:49:40 executing program 5: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r2, &(0x7f0000000140)}, 0xfffffffffffffc5d) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x7fffffff, 0x5, 0x0, 0x6, 0x0, 0x0, 0x80000, 0x3, 0x40, 0x1, 0x1, 0x3ff, 0x2, 0x1, 0x3, 0x122d, 0x0, 0x0, 0x2, 0x3a1, 0x8899, 0xfffffffffffff192, 0x7, 0x8000, 0x100, 0x2, 0x5, 0x0, 0x8001, 0x4, 0x0, 0x3, 0x9, 0x3, 0x0, 0x1, 0x0, 0x10000, 0x3, @perf_bp={0x0, 0x1}, 0x0, 0xfffffffffffffffd, 0x0, 0x7, 0x400000000000, 0x0, 0x60}, r2, 0x1, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, r0, 0x0, 0x12, &(0x7f00000005c0)='cpuacct.usage_all\x00'}, 0x30) perf_event_open(&(0x7f0000000540)={0x7, 0x70, 0x5, 0x401, 0x8, 0x8, 0x0, 0x2, 0x80008, 0x7, 0x10000, 0x4, 0x0, 0x4, 0x1, 0x4, 0x800, 0xfffffffffffffffb, 0x1f, 0xffff, 0x10001, 0xfffffffffffffffe, 0xca4, 0xb13b, 0x9, 0x0, 0x3, 0x5, 0x4, 0x2734c79b, 0x9, 0x1, 0xffffffff, 0x7, 0x0, 0x0, 0x6, 0x2, 0x0, 0x9, 0x4, @perf_config_ext={0x7, 0x7}, 0x0, 0x8, 0x1, 0xf, 0x6, 0x6, 0x7}, r3, 0x10, 0xffffffffffffffff, 0x9) gettid() ioctl$TUNSETLINK(r2, 0x400454cd, 0x313) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(r1, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="046d656d6f72799a2ef96bed5247622e1db7a95c4201be5d20e96f314a03c154e0157aacf455718d80c2afbfb7a51b33b8f1fa00"/65], 0x41) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) openat$cgroup_type(r1, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000500)={r4, &(0x7f0000000440)="369cff807e1d5ac6310702158e1c521d8e215a38ae572f43b1946898ea339340fc4be0c2d9f93350a644edae7a190d0de36d42a214a38185509c911792a449fdad02978b6ae9a9e6cee3b7aab7f9ccf387691db4a0c6766fa429d7ab9db39be29e319163957c8d2fa48507690e5bb3650dd9fd640408ea2650289009cf2c5978a985f7c9c60ba397a26c2bbb34e653af74ed676cda4213cd6f83323a88d80a9c2c6042aec7a0d341d819dddb", 0x0}, 0x18) write$cgroup_int(r5, &(0x7f0000000040)=0x8, 0x12) socket$kcm(0xa, 0x0, 0x11) r6 = openat$cgroup_ro(r2, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) ioctl$TUNSETSNDBUF(r6, 0x400454d4, &(0x7f0000000380)) write$cgroup_int(r2, &(0x7f00000000c0), 0x1802a140) openat$cgroup_int(r6, &(0x7f0000000300)='cpuset.cpus\x00', 0x2, 0x0) 12:49:40 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r4, 0x3) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 12:49:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000006c80)) [ 638.050175][T23702] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 12:49:40 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000540)=r4, 0x3) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 12:49:40 executing program 1: socket$kcm(0x11, 0xa, 0x300) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 12:49:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000006c80)) 12:49:41 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x1) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000001740), 0x0}, 0xfffffffffffffe3b) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x2d1) gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x7f, 0xffffffffffff7fff, 0x9, 0x0, 0x0, 0x200, 0x26, 0x1, 0xfffffffffffffff8, 0xd5b5, 0x46, 0xe66, 0x7, 0x8d4, 0x7ff, 0x0, 0x1000, 0x8, 0x0, 0x1, 0x9, 0x2, 0xfff, 0x100000000, 0x1, 0x6, 0x2, 0x5, 0x0, 0xff, 0x3, 0x8, 0x590, 0x8, 0x6, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x114, 0x9, 0x10000, 0x0, 0x9, 0x1, 0x8}, r3, 0x7, r0, 0x1) recvmsg(r1, &(0x7f0000000080)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0xdc, &(0x7f0000000300)=[{&(0x7f0000000480)=""/97, 0xfffffffffffffda8}], 0xfffffffffffffd2}, 0x10000) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x7fffffff) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000380)) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 12:49:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f00000004c0)={0x7, 0x70, 0x0, 0x80, 0x1f, 0x5, 0x0, 0x1, 0xd40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0x4, 0x0, 0x7d1b, 0x0, 0x8, 0x8949, 0xffffffffffff8001, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x7}, 0x400, 0x400, 0x7, 0x0, 0xc505, 0x6}, 0x0, 0x5, 0xffffffffffffffff, 0x9) perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, 0x0, 0x0, 0x2, 0x3f, 0x5, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x100000001, 0x2, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8ab}, 0x24800, 0x5, 0x5, 0x0, 0xffffffffffffffc1, 0x64, 0x667a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xd) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000140)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'ifb0\x00', 0x1}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000001140)={&(0x7f0000000380)=@nl=@unspec, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000e00)}], 0x1}, 0x8800) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'tunl0\x00', @dev}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xa01, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x30f) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2400, 0x0) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f00000002c0)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r3, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x14b) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r0, &(0x7f0000006c40)={0x0, 0x0, &(0x7f0000006b80)=[{0x0}, {&(0x7f0000005b80)=""/4096, 0x1000}], 0x2}, 0x2) 12:49:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4020940d, &(0x7f0000000040)=0x4) [ 638.583221][T23719] device nr0 entered promiscuous mode 12:49:41 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x29, 0x9, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e00000036008182e45ae087185082cf0324b0eba06ef9075b3f00169148790700d90080e2300000000000000000", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) sendmsg$sock(r1, &(0x7f0000008480)={0x0, 0x0, 0x0}, 0x20000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000140), 0x4) write$cgroup_pid(0xffffffffffffffff, 0x0, 0xffffffffffffffe1) 12:49:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000006c80)) 12:49:41 executing program 3: r0 = socket$kcm(0x10, 0x480000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000050015000300812fa80016000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) [ 638.912200][T23738] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 639.030880][T23738] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. 12:49:41 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x29, 0x9, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e00000036008182e45ae087185082cf0324b0eba06ef9075b3f00169148790700d90080e2300000000000000000", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) sendmsg$sock(r1, &(0x7f0000008480)={0x0, 0x0, 0x0}, 0x20000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000140), 0x4) write$cgroup_pid(0xffffffffffffffff, 0x0, 0xffffffffffffffe1) [ 639.228712][T23751] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. 12:49:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000006c80)) 12:49:42 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x88, 0x67, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x7fffef55]}, 0x4}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close(r1) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x800, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000540)=""/152, 0x98}], 0x1, &(0x7f0000000640)=""/86, 0x56}, 0x1) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000700)) 12:49:42 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x29, 0x9, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e00000036008182e45ae087185082cf0324b0eba06ef9075b3f00169148790700d90080e2300000000000000000", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) sendmsg$sock(r1, &(0x7f0000008480)={0x0, 0x0, 0x0}, 0x20000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000140), 0x4) write$cgroup_pid(0xffffffffffffffff, 0x0, 0xffffffffffffffe1) [ 639.506232][T23759] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 639.594604][T23722] device nr0 entered promiscuous mode 12:49:42 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x29, 0x9, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="2e00000036008182e45ae087185082cf0324b0eba06ef9075b3f00169148790700d90080e2300000000000000000", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) sendmsg$sock(r1, &(0x7f0000008480)={0x0, 0x0, 0x0}, 0x20000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000140), 0x4) write$cgroup_pid(0xffffffffffffffff, 0x0, 0xffffffffffffffe1) 12:49:42 executing program 1: socket$kcm(0x11, 0xa, 0x300) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 12:49:42 executing program 3: socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x17, &(0x7f0000000040)=r0, 0x52d) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x0, @dev}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000200)="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", 0x5ad}], 0x1}, 0x0) [ 639.912473][T23770] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 640.032236][T23736] device nr0 entered promiscuous mode [ 640.097761][T23779] device nr0 entered promiscuous mode 12:49:42 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x88, 0x67, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x7fffef55]}, 0x4}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close(r1) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x800, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000540)=""/152, 0x98}], 0x1, &(0x7f0000000640)=""/86, 0x56}, 0x1) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000700)) 12:49:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f00000004c0)={0x7, 0x70, 0x0, 0x80, 0x1f, 0x5, 0x0, 0x1, 0xd40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0x4, 0x0, 0x7d1b, 0x0, 0x8, 0x8949, 0xffffffffffff8001, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x7}, 0x400, 0x400, 0x7, 0x0, 0xc505, 0x6}, 0x0, 0x5, 0xffffffffffffffff, 0x9) perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, 0x0, 0x0, 0x2, 0x3f, 0x5, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x100000001, 0x2, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8ab}, 0x24800, 0x5, 0x5, 0x0, 0xffffffffffffffc1, 0x64, 0x667a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xd) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000140)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'ifb0\x00', 0x1}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000001140)={&(0x7f0000000380)=@nl=@unspec, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000e00)}], 0x1}, 0x8800) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'tunl0\x00', @dev}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xa01, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x30f) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2400, 0x0) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f00000002c0)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r3, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x14b) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r0, &(0x7f0000006c40)={0x0, 0x0, &(0x7f0000006b80)=[{0x0}, {&(0x7f0000005b80)=""/4096, 0x1000}], 0x2}, 0x2) 12:49:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000504ed0080648c6394f20231d200100003405a00000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 12:49:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="17000000110081c5e43230ecdb4cb9040a485eb8be9294", 0x17}], 0x1}, 0x0) 12:49:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="230000002000ffae00060c00000f000a0a000000810000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) [ 640.351666][T23786] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. [ 640.388638][T23790] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 12:49:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f00000004c0)={0x7, 0x70, 0x0, 0x80, 0x1f, 0x5, 0x0, 0x1, 0xd40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0x4, 0x0, 0x7d1b, 0x0, 0x8, 0x8949, 0xffffffffffff8001, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x7}, 0x400, 0x400, 0x7, 0x0, 0xc505, 0x6}, 0x0, 0x5, 0xffffffffffffffff, 0x9) perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, 0x0, 0x0, 0x2, 0x3f, 0x5, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x100000001, 0x2, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8ab}, 0x24800, 0x5, 0x5, 0x0, 0xffffffffffffffc1, 0x64, 0x667a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xd) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000140)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'ifb0\x00', 0x1}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000001140)={&(0x7f0000000380)=@nl=@unspec, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000e00)}], 0x1}, 0x8800) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'tunl0\x00', @dev}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xa01, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x30f) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2400, 0x0) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f00000002c0)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r3, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x14b) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r0, &(0x7f0000006c40)={0x0, 0x0, &(0x7f0000006b80)=[{0x0}, {&(0x7f0000005b80)=""/4096, 0x1000}], 0x2}, 0x2) 12:49:43 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="4c000000130081ae08060c0f006b10007f03e3f700000000000000ca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e74703c48f93b8446b9bbc7a0db50dee495f2510a4", 0x4c}], 0x1}, 0x0) socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 640.471272][T23793] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. [ 640.495297][T23790] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.4'. 12:49:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="230000002000ffae00060c00000f000a0a000000810000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 12:49:43 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x88, 0x67, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x7fffef55]}, 0x4}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close(r1) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x800, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000540)=""/152, 0x98}], 0x1, &(0x7f0000000640)=""/86, 0x56}, 0x1) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000700)) 12:49:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000504ed0080648c6394f20231d200100003405a00000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 640.893511][T23823] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 640.908672][T23823] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.4'. [ 640.937665][T23815] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. 12:49:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="230000002000ffae00060c00000f000a0a000000810000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) [ 641.021120][T23820] device nr0 entered promiscuous mode 12:49:43 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="4c000000130081ae08060c0f006b10007f03e3f700000000000000ca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e74703c48f93b8446b9bbc7a0db50dee495f2510a4", 0x4c}], 0x1}, 0x0) socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 641.271700][T23799] device nr0 entered promiscuous mode [ 641.294345][T23828] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. 12:49:44 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x88, 0x67, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x7fffef55]}, 0x4}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) close(r1) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x800, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000540)=""/152, 0x98}], 0x1, &(0x7f0000000640)=""/86, 0x56}, 0x1) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000700)) 12:49:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000504ed0080648c6394f20231d200100003405a00000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 12:49:44 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="4c000000130081ae08060c0f006b10007f03e3f700000000000000ca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e74703c48f93b8446b9bbc7a0db50dee495f2510a4", 0x4c}], 0x1}, 0x0) socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:49:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="230000002000ffae00060c00000f000a0a000000810000018701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 12:49:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f00000004c0)={0x7, 0x70, 0x0, 0x80, 0x1f, 0x5, 0x0, 0x1, 0xd40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0x4, 0x0, 0x7d1b, 0x0, 0x8, 0x8949, 0xffffffffffff8001, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x7}, 0x400, 0x400, 0x7, 0x0, 0xc505, 0x6}, 0x0, 0x5, 0xffffffffffffffff, 0x9) perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, 0x0, 0x0, 0x2, 0x3f, 0x5, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x100000001, 0x2, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8ab}, 0x24800, 0x5, 0x5, 0x0, 0xffffffffffffffc1, 0x64, 0x667a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xd) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000140)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'ifb0\x00', 0x1}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000001140)={&(0x7f0000000380)=@nl=@unspec, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000e00)}], 0x1}, 0x8800) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'tunl0\x00', @dev}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xa01, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x30f) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2400, 0x0) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f00000002c0)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r3, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x14b) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r0, &(0x7f0000006c40)={0x0, 0x0, &(0x7f0000006b80)=[{0x0}, {&(0x7f0000005b80)=""/4096, 0x1000}], 0x2}, 0x2) 12:49:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f00000004c0)={0x7, 0x70, 0x0, 0x80, 0x1f, 0x5, 0x0, 0x1, 0xd40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0x4, 0x0, 0x7d1b, 0x0, 0x8, 0x8949, 0xffffffffffff8001, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x7}, 0x400, 0x400, 0x7, 0x0, 0xc505, 0x6}, 0x0, 0x5, 0xffffffffffffffff, 0x9) perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, 0x0, 0x0, 0x2, 0x3f, 0x5, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x100000001, 0x2, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8ab}, 0x24800, 0x5, 0x5, 0x0, 0xffffffffffffffc1, 0x64, 0x667a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xd) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000140)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'ifb0\x00', 0x1}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000001140)={&(0x7f0000000380)=@nl=@unspec, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000e00)}], 0x1}, 0x8800) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'tunl0\x00', @dev}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xa01, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x30f) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2400, 0x0) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f00000002c0)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') [ 641.696816][T23840] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.5'. [ 641.721428][T23843] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 641.731190][T23843] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.4'. write$cgroup_subtree(r3, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x14b) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r0, &(0x7f0000006c40)={0x0, 0x0, &(0x7f0000006b80)=[{0x0}, {&(0x7f0000005b80)=""/4096, 0x1000}], 0x2}, 0x2) 12:49:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e000504ed0080648c6394f20231d200100003405a00000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 12:49:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_int(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) write$cgroup_pid(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)}, 0xffffffffffffffda) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000300)='gre0\x00') bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 12:49:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8994, &(0x7f0000000080)={'bond0\x00', @empty=[0x0, 0x0, 0x74]}) 12:49:44 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="4c000000130081ae08060c0f006b10007f03e3f700000000000000ca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e74703c48f93b8446b9bbc7a0db50dee495f2510a4", 0x4c}], 0x1}, 0x0) socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 642.106734][T23865] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 12:49:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_int(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) write$cgroup_pid(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)}, 0xffffffffffffffda) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000300)='gre0\x00') bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 642.367576][T23877] device nr0 entered promiscuous mode 12:49:45 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @int={0x7}]}, {0x0, [0x5f, 0x61, 0x0]}}, &(0x7f00000002c0)=""/128, 0x39, 0x80}, 0x20) close(r2) socket$kcm(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a1e2410"}) r4 = socket$kcm(0xa, 0x4000000000000006, 0x0) setsockopt$sock_attach_bpf(r4, 0x10d, 0xf, &(0x7f0000000000)=r0, 0x1) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001a00)='cpu.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001ac0)={0x1d, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="0d6b8000ffffffff85000000610000001b300c00ffffffff6dea000011000000"], 0x0, 0x400, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x9, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001a80)={0x100, 0x2, 0x7097, 0x52d000000000}, 0x10}, 0x70) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r3, &(0x7f0000000340)="3171c242961fc6a80de5f0820d6c897ac6c9a3b508b2b22826604492706dde72fc21d92d5796de50daf706299d5fe9c6d4a3fdd050f125d25916a13583927816f6b681ba61f8a25e359f0c119216198c34785980fca682984ca9ac74bcc11bab33", 0x0, 0x1}, 0x20) [ 642.861493][T23864] device nr0 entered promiscuous mode 12:49:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f00000004c0)={0x7, 0x70, 0x0, 0x80, 0x1f, 0x5, 0x0, 0x1, 0xd40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0x4, 0x0, 0x7d1b, 0x0, 0x8, 0x8949, 0xffffffffffff8001, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x7}, 0x400, 0x400, 0x7, 0x0, 0xc505, 0x6}, 0x0, 0x5, 0xffffffffffffffff, 0x9) perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, 0x0, 0x0, 0x2, 0x3f, 0x5, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x100000001, 0x2, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8ab}, 0x24800, 0x5, 0x5, 0x0, 0xffffffffffffffc1, 0x64, 0x667a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xd) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000140)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'ifb0\x00', 0x1}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000001140)={&(0x7f0000000380)=@nl=@unspec, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000e00)}], 0x1}, 0x8800) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'tunl0\x00', @dev}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xa01, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x30f) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2400, 0x0) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f00000002c0)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r3, &(0x7f0000000980)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df006100260600009e00e2272c4e5e4cec61a50b87a796420000cfab170e16ae833ecfe73b7b3aaedcdcdf2f1700800000fdb8575d209858ec8c3df08d445bc28100468568f0b62a989224f97702be4425c1acb100000000000000000000004000f0ad0000000008000089529e69617fd3c9b5b2c243d012670010449ee917594a4c133e25581c507baed3f079d6e97569493254cf8ce0efe540e58fc43c78c2a97ade5047416894a361f2b14379dba55d00bb5ddfa58bb531980200000000000000b7980ef3b7486155f4a239d118c35a8f90d12378a9edb80b910bd39114e629260807759903da00ea8d1ba9c2b3695580f836ec3f29890f314b80812ed31aefabd91304ac0df9a4f93c8a744c9989112a13cc678b1c6bc5dc897712a82e1ffa8cf8d1bc9d356b94efbc14274e06a0caa3d833b60d3c6a0a6641de"], 0x14b) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r0, &(0x7f0000006c40)={0x0, 0x0, &(0x7f0000006b80)=[{0x0}, {&(0x7f0000005b80)=""/4096, 0x1000}], 0x2}, 0x2) 12:49:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000013001707ed12806cd20010e517e6a5dd80009d00010800f60000000300f87f0000640000000000000000", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 12:49:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_int(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) write$cgroup_pid(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)}, 0xffffffffffffffda) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000300)='gre0\x00') bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 12:49:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8994, &(0x7f0000000080)={'bond0\x00', @empty=[0x0, 0x0, 0x74]}) 12:49:45 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @int={0x7}]}, {0x0, [0x5f, 0x61, 0x0]}}, &(0x7f00000002c0)=""/128, 0x39, 0x80}, 0x20) close(r2) socket$kcm(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a1e2410"}) r4 = socket$kcm(0xa, 0x4000000000000006, 0x0) setsockopt$sock_attach_bpf(r4, 0x10d, 0xf, &(0x7f0000000000)=r0, 0x1) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001a00)='cpu.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001ac0)={0x1d, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="0d6b8000ffffffff85000000610000001b300c00ffffffff6dea000011000000"], 0x0, 0x400, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x9, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001a80)={0x100, 0x2, 0x7097, 0x52d000000000}, 0x10}, 0x70) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r3, &(0x7f0000000340)="3171c242961fc6a80de5f0820d6c897ac6c9a3b508b2b22826604492706dde72fc21d92d5796de50daf706299d5fe9c6d4a3fdd050f125d25916a13583927816f6b681ba61f8a25e359f0c119216198c34785980fca682984ca9ac74bcc11bab33", 0x0, 0x1}, 0x20) 12:49:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f00000004c0)={0x7, 0x70, 0x0, 0x80, 0x1f, 0x5, 0x0, 0x1, 0xd40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0x4, 0x0, 0x7d1b, 0x0, 0x8, 0x8949, 0xffffffffffff8001, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x7}, 0x400, 0x400, 0x7, 0x0, 0xc505, 0x6}, 0x0, 0x5, 0xffffffffffffffff, 0x9) perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, 0x0, 0x0, 0x2, 0x3f, 0x5, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x100000001, 0x2, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8ab}, 0x24800, 0x5, 0x5, 0x0, 0xffffffffffffffc1, 0x64, 0x667a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xd) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000140)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'ifb0\x00', 0x1}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000001140)={&(0x7f0000000380)=@nl=@unspec, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000e00)}], 0x1}, 0x8800) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'tunl0\x00', @dev}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xa01, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x30f) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2400, 0x0) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f00000002c0)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r3, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x14b) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg(r0, &(0x7f0000006c40)={0x0, 0x0, &(0x7f0000006b80)=[{0x0}, {&(0x7f0000005b80)=""/4096, 0x1000}], 0x2}, 0x2) 12:49:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_int(r0, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) write$cgroup_pid(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)}, 0xffffffffffffffda) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000300)='gre0\x00') bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 12:49:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8994, &(0x7f0000000080)={'bond0\x00', @empty=[0x0, 0x0, 0x74]}) [ 643.602940][T23904] device nr0 entered promiscuous mode 12:49:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000013001707ed12806cd20010e517e6a5dd80009d00010800f60000000300f87f0000640000000000000000", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 12:49:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e180a000000e8bd6efb120009000e000400dc050700050005001204", 0x2e}], 0x1}, 0x0) 12:49:46 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @int={0x7}]}, {0x0, [0x5f, 0x61, 0x0]}}, &(0x7f00000002c0)=""/128, 0x39, 0x80}, 0x20) close(r2) socket$kcm(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a1e2410"}) r4 = socket$kcm(0xa, 0x4000000000000006, 0x0) setsockopt$sock_attach_bpf(r4, 0x10d, 0xf, &(0x7f0000000000)=r0, 0x1) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001a00)='cpu.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001ac0)={0x1d, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="0d6b8000ffffffff85000000610000001b300c00ffffffff6dea000011000000"], 0x0, 0x400, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x9, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001a80)={0x100, 0x2, 0x7097, 0x52d000000000}, 0x10}, 0x70) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r3, &(0x7f0000000340)="3171c242961fc6a80de5f0820d6c897ac6c9a3b508b2b22826604492706dde72fc21d92d5796de50daf706299d5fe9c6d4a3fdd050f125d25916a13583927816f6b681ba61f8a25e359f0c119216198c34785980fca682984ca9ac74bcc11bab33", 0x0, 0x1}, 0x20) 12:49:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000013001707ed12806cd20010e517e6a5dd80009d00010800f60000000300f87f0000640000000000000000", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 644.083779][T23936] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 12:49:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8994, &(0x7f0000000080)={'bond0\x00', @empty=[0x0, 0x0, 0x74]}) 12:49:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000013001707ed12806cd20010e517e6a5dd80009d00010800f60000000300f87f0000640000000000000000", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 644.448765][T23919] device nr0 entered promiscuous mode 12:49:47 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 12:49:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) 12:49:47 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@restrict={0x0, 0x0, 0x0, 0xb, 0x1}, @int={0x7}]}, {0x0, [0x5f, 0x61, 0x0]}}, &(0x7f00000002c0)=""/128, 0x39, 0x80}, 0x20) close(r2) socket$kcm(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a1e2410"}) r4 = socket$kcm(0xa, 0x4000000000000006, 0x0) setsockopt$sock_attach_bpf(r4, 0x10d, 0xf, &(0x7f0000000000)=r0, 0x1) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001a00)='cpu.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001ac0)={0x1d, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="0d6b8000ffffffff85000000610000001b300c00ffffffff6dea000011000000"], 0x0, 0x400, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x9, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001a80)={0x100, 0x2, 0x7097, 0x52d000000000}, 0x10}, 0x70) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r3, &(0x7f0000000340)="3171c242961fc6a80de5f0820d6c897ac6c9a3b508b2b22826604492706dde72fc21d92d5796de50daf706299d5fe9c6d4a3fdd050f125d25916a13583927816f6b681ba61f8a25e359f0c119216198c34785980fca682984ca9ac74bcc11bab33", 0x0, 0x1}, 0x20) 12:49:47 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x13, &(0x7f0000000180), 0x4) 12:49:47 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 12:49:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0, 0x2}, 0x2c) 12:49:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) 12:49:47 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 12:49:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="39000000140081ac00002c0005000187013b6f080000000000000000000001c0c54c1960dbb7d553b4a400000000000000a3dd24e3231ec0a0", 0x39}], 0x1}, 0x0) 12:49:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="2e0000001d00810ee00f80ecdb4cb9f207c804a00d00000009003ffb0a0002000e0ada1b40d805000600c50083b8", 0x2e}], 0x1}, 0x0) 12:49:47 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x78, &(0x7f0000000140)=r0, 0x4) 12:49:47 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 12:49:48 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x802, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000004c0)=r1, 0xfffffed5) sendmsg(r2, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r3, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001540)=[{0x0}], 0x1}, 0x0) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="000700000000000000ff0100007a00000001"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc020660b, 0x20000001) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 12:49:48 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x444, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x3e, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500243209880bd320d98a", 0x0}, 0x28) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x401, 0xe4, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa, 0x0, 0x2, 0xfffffffffffffffc, 0x8, 0x5, 0x0, 0xa501, 0x7, 0x6, 0x665, 0xe1, 0x2, 0xf0d, 0x7, 0x7ff, 0xf8, 0xb00, 0x7, 0x9, 0x9, 0x400, 0xa1e9, 0x415b1b81, 0x6d, 0xffffffffffff0000, 0x0, 0x6, 0x0, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x1}, 0xc00, 0x2, 0x4, 0x3, 0x20, 0x9, 0x9}, 0x0, 0x10, r2, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r1, 0x2, r0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cxu/syz1\x00\xfe:\x1eD\xd93Y\x13\xb1\xe4g\x1e\xd2\x1d\xf2<\xa4\x7f\xac\xa1|\x19xgt7\xbd\xc7\xd5\xec[\xad{\xb6\rc[J\xbb\x1b\xe6I\x8e\xa8\xfe\xc8\ar\x00\xdfFb#\xb8\x8ew\x11\xbamj[\xf9\xa0d\x98', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r7 = openat$cgroup_ro(r5, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000380)={r5, r7}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d00)='./cgroup.net/syz1\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r7, &(0x7f0000000400)="4e6e6befe7d0f19589459e08a6f32e91e327ca985c6e4a72a17879e0874dc2662e113364ac2da6f19fb09fff86b8c19e44a0c9c1ac286b4317a7d47b52135087adb9e8f4068f00d002aecbba6bcfcdb8e787eb62fd7865ec798c55164296a1b0d94ad5ee3594204395fcf965f3c3baeb55fce2f71d2fdb15e4c9fba33523bd04fdf5f86d9751d6fafc344b61315a0b5e54e7acff96ba993a642d8082752c52f7952a02e89db8f835cc4e5b5a8f098d6b78bb5e98aaf3997a5e64e7fab9de84a9861df21e3d36"}, 0x10) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(r8, 0x0, 0x2, 0x0) r9 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r9, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x672) openat$cgroup_procs(r8, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r10, 0x800454d3, &(0x7f00000003c0)) 12:49:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) 12:49:48 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x200004000000001, 0x0) socket$kcm(0x10, 0x200000000003, 0x4) write$cgroup_pid(r1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @broadcast}) 12:49:48 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 12:49:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@datasec={0x1, 0x2, 0x0, 0xf, 0x5, [{0x1, 0x0, 0x6}], 'N'}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "61e6cb"}]}, {0x0, [0x5f]}}, &(0x7f0000000100)=""/213, 0x43, 0xd5, 0x1}, 0x20) [ 645.859508][T24015] device team0 entered promiscuous mode [ 645.867226][T24015] device team_slave_0 entered promiscuous mode [ 645.876685][T24015] device team_slave_1 entered promiscuous mode 12:49:48 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x18, 0x4, 0x2, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x1, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x716, 0x0, 0xffffffffffffff81, 0x6, 0x7, 0x0, 0x3f, 0x40, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0x8e07, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x14102, 0x80000000, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:49:48 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x2, 0x0, 0x0) 12:49:48 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x200004000000001, 0x0) socket$kcm(0x10, 0x200000000003, 0x4) write$cgroup_pid(r1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @broadcast}) 12:49:48 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x444, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x3e, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500243209880bd320d98a", 0x0}, 0x28) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x401, 0xe4, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa, 0x0, 0x2, 0xfffffffffffffffc, 0x8, 0x5, 0x0, 0xa501, 0x7, 0x6, 0x665, 0xe1, 0x2, 0xf0d, 0x7, 0x7ff, 0xf8, 0xb00, 0x7, 0x9, 0x9, 0x400, 0xa1e9, 0x415b1b81, 0x6d, 0xffffffffffff0000, 0x0, 0x6, 0x0, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x1}, 0xc00, 0x2, 0x4, 0x3, 0x20, 0x9, 0x9}, 0x0, 0x10, r2, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r1, 0x2, r0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cxu/syz1\x00\xfe:\x1eD\xd93Y\x13\xb1\xe4g\x1e\xd2\x1d\xf2<\xa4\x7f\xac\xa1|\x19xgt7\xbd\xc7\xd5\xec[\xad{\xb6\rc[J\xbb\x1b\xe6I\x8e\xa8\xfe\xc8\ar\x00\xdfFb#\xb8\x8ew\x11\xbamj[\xf9\xa0d\x98', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r7 = openat$cgroup_ro(r5, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000380)={r5, r7}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d00)='./cgroup.net/syz1\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r7, &(0x7f0000000400)="4e6e6befe7d0f19589459e08a6f32e91e327ca985c6e4a72a17879e0874dc2662e113364ac2da6f19fb09fff86b8c19e44a0c9c1ac286b4317a7d47b52135087adb9e8f4068f00d002aecbba6bcfcdb8e787eb62fd7865ec798c55164296a1b0d94ad5ee3594204395fcf965f3c3baeb55fce2f71d2fdb15e4c9fba33523bd04fdf5f86d9751d6fafc344b61315a0b5e54e7acff96ba993a642d8082752c52f7952a02e89db8f835cc4e5b5a8f098d6b78bb5e98aaf3997a5e64e7fab9de84a9861df21e3d36"}, 0x10) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(r8, 0x0, 0x2, 0x0) r9 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r9, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x672) openat$cgroup_procs(r8, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r10, 0x800454d3, &(0x7f00000003c0)) 12:49:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) 12:49:48 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x18, 0x4, 0x2, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x1, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x716, 0x0, 0xffffffffffffff81, 0x6, 0x7, 0x0, 0x3f, 0x40, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0x8e07, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x14102, 0x80000000, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:49:49 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x444, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x3e, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500243209880bd320d98a", 0x0}, 0x28) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x401, 0xe4, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa, 0x0, 0x2, 0xfffffffffffffffc, 0x8, 0x5, 0x0, 0xa501, 0x7, 0x6, 0x665, 0xe1, 0x2, 0xf0d, 0x7, 0x7ff, 0xf8, 0xb00, 0x7, 0x9, 0x9, 0x400, 0xa1e9, 0x415b1b81, 0x6d, 0xffffffffffff0000, 0x0, 0x6, 0x0, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x1}, 0xc00, 0x2, 0x4, 0x3, 0x20, 0x9, 0x9}, 0x0, 0x10, r2, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r1, 0x2, r0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cxu/syz1\x00\xfe:\x1eD\xd93Y\x13\xb1\xe4g\x1e\xd2\x1d\xf2<\xa4\x7f\xac\xa1|\x19xgt7\xbd\xc7\xd5\xec[\xad{\xb6\rc[J\xbb\x1b\xe6I\x8e\xa8\xfe\xc8\ar\x00\xdfFb#\xb8\x8ew\x11\xbamj[\xf9\xa0d\x98', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r7 = openat$cgroup_ro(r5, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000380)={r5, r7}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d00)='./cgroup.net/syz1\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r7, &(0x7f0000000400)="4e6e6befe7d0f19589459e08a6f32e91e327ca985c6e4a72a17879e0874dc2662e113364ac2da6f19fb09fff86b8c19e44a0c9c1ac286b4317a7d47b52135087adb9e8f4068f00d002aecbba6bcfcdb8e787eb62fd7865ec798c55164296a1b0d94ad5ee3594204395fcf965f3c3baeb55fce2f71d2fdb15e4c9fba33523bd04fdf5f86d9751d6fafc344b61315a0b5e54e7acff96ba993a642d8082752c52f7952a02e89db8f835cc4e5b5a8f098d6b78bb5e98aaf3997a5e64e7fab9de84a9861df21e3d36"}, 0x10) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(r8, 0x0, 0x2, 0x0) r9 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r9, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x672) openat$cgroup_procs(r8, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r10, 0x800454d3, &(0x7f00000003c0)) 12:49:49 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x2, 0x0, 0x0) 12:49:49 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x200004000000001, 0x0) socket$kcm(0x10, 0x200000000003, 0x4) write$cgroup_pid(r1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @broadcast}) 12:49:49 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x18, 0x4, 0x2, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x1, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x716, 0x0, 0xffffffffffffff81, 0x6, 0x7, 0x0, 0x3f, 0x40, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0x8e07, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x14102, 0x80000000, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:49:49 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x444, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x3e, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500243209880bd320d98a", 0x0}, 0x28) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x401, 0xe4, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa, 0x0, 0x2, 0xfffffffffffffffc, 0x8, 0x5, 0x0, 0xa501, 0x7, 0x6, 0x665, 0xe1, 0x2, 0xf0d, 0x7, 0x7ff, 0xf8, 0xb00, 0x7, 0x9, 0x9, 0x400, 0xa1e9, 0x415b1b81, 0x6d, 0xffffffffffff0000, 0x0, 0x6, 0x0, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x1}, 0xc00, 0x2, 0x4, 0x3, 0x20, 0x9, 0x9}, 0x0, 0x10, r2, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r1, 0x2, r0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cxu/syz1\x00\xfe:\x1eD\xd93Y\x13\xb1\xe4g\x1e\xd2\x1d\xf2<\xa4\x7f\xac\xa1|\x19xgt7\xbd\xc7\xd5\xec[\xad{\xb6\rc[J\xbb\x1b\xe6I\x8e\xa8\xfe\xc8\ar\x00\xdfFb#\xb8\x8ew\x11\xbamj[\xf9\xa0d\x98', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r7 = openat$cgroup_ro(r5, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000380)={r5, r7}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d00)='./cgroup.net/syz1\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r7, &(0x7f0000000400)="4e6e6befe7d0f19589459e08a6f32e91e327ca985c6e4a72a17879e0874dc2662e113364ac2da6f19fb09fff86b8c19e44a0c9c1ac286b4317a7d47b52135087adb9e8f4068f00d002aecbba6bcfcdb8e787eb62fd7865ec798c55164296a1b0d94ad5ee3594204395fcf965f3c3baeb55fce2f71d2fdb15e4c9fba33523bd04fdf5f86d9751d6fafc344b61315a0b5e54e7acff96ba993a642d8082752c52f7952a02e89db8f835cc4e5b5a8f098d6b78bb5e98aaf3997a5e64e7fab9de84a9861df21e3d36"}, 0x10) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(r8, 0x0, 0x2, 0x0) r9 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r9, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x672) openat$cgroup_procs(r8, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r10, 0x800454d3, &(0x7f00000003c0)) 12:49:49 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x200004000000001, 0x0) socket$kcm(0x10, 0x200000000003, 0x4) write$cgroup_pid(r1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @broadcast}) 12:49:49 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x18, 0x4, 0x2, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x1, 0x1f}, 0x3c) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x716, 0x0, 0xffffffffffffff81, 0x6, 0x7, 0x0, 0x3f, 0x40, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0x8e07, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x14102, 0x80000000, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:49:49 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x2, 0x0, 0x0) 12:49:49 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x2, 0x0, 0x0) 12:49:49 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x444, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x3e, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500243209880bd320d98a", 0x0}, 0x28) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x401, 0xe4, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa, 0x0, 0x2, 0xfffffffffffffffc, 0x8, 0x5, 0x0, 0xa501, 0x7, 0x6, 0x665, 0xe1, 0x2, 0xf0d, 0x7, 0x7ff, 0xf8, 0xb00, 0x7, 0x9, 0x9, 0x400, 0xa1e9, 0x415b1b81, 0x6d, 0xffffffffffff0000, 0x0, 0x6, 0x0, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x1}, 0xc00, 0x2, 0x4, 0x3, 0x20, 0x9, 0x9}, 0x0, 0x10, r2, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r1, 0x2, r0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cxu/syz1\x00\xfe:\x1eD\xd93Y\x13\xb1\xe4g\x1e\xd2\x1d\xf2<\xa4\x7f\xac\xa1|\x19xgt7\xbd\xc7\xd5\xec[\xad{\xb6\rc[J\xbb\x1b\xe6I\x8e\xa8\xfe\xc8\ar\x00\xdfFb#\xb8\x8ew\x11\xbamj[\xf9\xa0d\x98', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r7 = openat$cgroup_ro(r5, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000380)={r5, r7}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d00)='./cgroup.net/syz1\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r7, &(0x7f0000000400)="4e6e6befe7d0f19589459e08a6f32e91e327ca985c6e4a72a17879e0874dc2662e113364ac2da6f19fb09fff86b8c19e44a0c9c1ac286b4317a7d47b52135087adb9e8f4068f00d002aecbba6bcfcdb8e787eb62fd7865ec798c55164296a1b0d94ad5ee3594204395fcf965f3c3baeb55fce2f71d2fdb15e4c9fba33523bd04fdf5f86d9751d6fafc344b61315a0b5e54e7acff96ba993a642d8082752c52f7952a02e89db8f835cc4e5b5a8f098d6b78bb5e98aaf3997a5e64e7fab9de84a9861df21e3d36"}, 0x10) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(r8, 0x0, 0x2, 0x0) r9 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r9, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x672) openat$cgroup_procs(r8, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r10, 0x800454d3, &(0x7f00000003c0)) 12:49:49 executing program 0: r0 = getpid() perf_event_open(&(0x7f0000000380)={0x7, 0x70, 0xfffffffffffffffe, 0x7, 0x0, 0x7926, 0x0, 0x4, 0x44, 0x0, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0x0, 0x7, 0x0, 0x8, 0x0, 0x5, 0x6, 0x0, 0x1, 0x39, 0x6, 0x8f9, 0xe6, 0xffffffff, 0x0, 0x0, 0x7ff, 0xffff, 0x8, 0x2e, 0xff, 0x1, 0x0, 0x3ff, 0x4, @perf_config_ext={0xffffffffffffffe0, 0x2}, 0x0, 0x400, 0x8, 0x0, 0x6b, 0x20, 0x78}, r0, 0xe, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) r3 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=r3, 0x12) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x7}, 0x0, 0x0, 0x3, 0xb, 0x4, 0x4}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) 12:49:49 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="1b000000190081ae08060c04000f00000a007f03fe020001870154", 0x1b}], 0x1}, 0x0) 12:49:49 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x444, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x3e, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500243209880bd320d98a", 0x0}, 0x28) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x401, 0xe4, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa, 0x0, 0x2, 0xfffffffffffffffc, 0x8, 0x5, 0x0, 0xa501, 0x7, 0x6, 0x665, 0xe1, 0x2, 0xf0d, 0x7, 0x7ff, 0xf8, 0xb00, 0x7, 0x9, 0x9, 0x400, 0xa1e9, 0x415b1b81, 0x6d, 0xffffffffffff0000, 0x0, 0x6, 0x0, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x1}, 0xc00, 0x2, 0x4, 0x3, 0x20, 0x9, 0x9}, 0x0, 0x10, r2, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r1, 0x2, r0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cxu/syz1\x00\xfe:\x1eD\xd93Y\x13\xb1\xe4g\x1e\xd2\x1d\xf2<\xa4\x7f\xac\xa1|\x19xgt7\xbd\xc7\xd5\xec[\xad{\xb6\rc[J\xbb\x1b\xe6I\x8e\xa8\xfe\xc8\ar\x00\xdfFb#\xb8\x8ew\x11\xbamj[\xf9\xa0d\x98', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r7 = openat$cgroup_ro(r5, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000380)={r5, r7}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d00)='./cgroup.net/syz1\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r7, &(0x7f0000000400)="4e6e6befe7d0f19589459e08a6f32e91e327ca985c6e4a72a17879e0874dc2662e113364ac2da6f19fb09fff86b8c19e44a0c9c1ac286b4317a7d47b52135087adb9e8f4068f00d002aecbba6bcfcdb8e787eb62fd7865ec798c55164296a1b0d94ad5ee3594204395fcf965f3c3baeb55fce2f71d2fdb15e4c9fba33523bd04fdf5f86d9751d6fafc344b61315a0b5e54e7acff96ba993a642d8082752c52f7952a02e89db8f835cc4e5b5a8f098d6b78bb5e98aaf3997a5e64e7fab9de84a9861df21e3d36"}, 0x10) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(r8, 0x0, 0x2, 0x0) r9 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r9, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x672) openat$cgroup_procs(r8, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r10, 0x800454d3, &(0x7f00000003c0)) 12:49:50 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x444, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x3e, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500243209880bd320d98a", 0x0}, 0x28) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x401, 0xe4, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa, 0x0, 0x2, 0xfffffffffffffffc, 0x8, 0x5, 0x0, 0xa501, 0x7, 0x6, 0x665, 0xe1, 0x2, 0xf0d, 0x7, 0x7ff, 0xf8, 0xb00, 0x7, 0x9, 0x9, 0x400, 0xa1e9, 0x415b1b81, 0x6d, 0xffffffffffff0000, 0x0, 0x6, 0x0, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x1}, 0xc00, 0x2, 0x4, 0x3, 0x20, 0x9, 0x9}, 0x0, 0x10, r2, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r1, 0x2, r0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cxu/syz1\x00\xfe:\x1eD\xd93Y\x13\xb1\xe4g\x1e\xd2\x1d\xf2<\xa4\x7f\xac\xa1|\x19xgt7\xbd\xc7\xd5\xec[\xad{\xb6\rc[J\xbb\x1b\xe6I\x8e\xa8\xfe\xc8\ar\x00\xdfFb#\xb8\x8ew\x11\xbamj[\xf9\xa0d\x98', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r7 = openat$cgroup_ro(r5, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000380)={r5, r7}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d00)='./cgroup.net/syz1\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r7, &(0x7f0000000400)="4e6e6befe7d0f19589459e08a6f32e91e327ca985c6e4a72a17879e0874dc2662e113364ac2da6f19fb09fff86b8c19e44a0c9c1ac286b4317a7d47b52135087adb9e8f4068f00d002aecbba6bcfcdb8e787eb62fd7865ec798c55164296a1b0d94ad5ee3594204395fcf965f3c3baeb55fce2f71d2fdb15e4c9fba33523bd04fdf5f86d9751d6fafc344b61315a0b5e54e7acff96ba993a642d8082752c52f7952a02e89db8f835cc4e5b5a8f098d6b78bb5e98aaf3997a5e64e7fab9de84a9861df21e3d36"}, 0x10) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(r8, 0x0, 0x2, 0x0) r9 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r9, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x672) openat$cgroup_procs(r8, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r10, 0x800454d3, &(0x7f00000003c0)) 12:49:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000110081aee405dc09000f00fe0701015b1e00000063dac37b7403242189c609", 0x23}], 0x1}, 0x0) 12:49:50 executing program 3: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x7fffffff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r2, 0x50}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0)=r0, 0x4) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1c, r0, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) [ 647.393873][ T24] audit: type=1804 audit(1563194990.027:139): pid=24085 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir348209096/syzkaller.5GtB4Q/196/memory.events" dev="sda1" ino=16548 res=1 [ 647.510789][ T24] audit: type=1804 audit(1563194990.137:140): pid=24077 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir348209096/syzkaller.5GtB4Q/196/memory.events" dev="sda1" ino=16548 res=1 12:49:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg(r0, &(0x7f0000003d40)={&(0x7f0000000300)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x3}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000003e00)}], 0x1}, 0x2bb5287811c468de) openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000001400)=ANY=[@ANYBLOB="860fe738fc669e0640a45883ed4379bdb502ff5792d75410b052454ff0904879488f8a80363c59eb10070925d8111c0411da01937438fd1714169ea3a1a96cad5f1c8f8f7646d88fe63a5cbfb6d5b963a242dbefa6e857f224c6253d831b714a07ed5edd15a1089289cf154ff9509eee65210dfa6e1b00e21ead17ed9aaed7fdbfa43a0c3e52b690cdde21753d0bf09fb44a75b7aae4aadf66c4180b30cb3a391d6087768283ff10b0eb186e7d1dd1b2efbfbe94b55cbd41f3078546aff3cc9a88d910189ceec2fb8661012f2d7374c327c9da8bb09ddb0fbc229ca7479528f23d87d787e30c09c51b391f2656"], 0xed) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='/cpu /cpu /|o -rdma \x00pids '], 0x1a) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x0, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x0, 0x0, 0x0, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) sendmsg(r4, &(0x7f0000003d00)={0x0, 0x0, &(0x7f0000002a00)=[{&(0x7f00000029c0)="5170e30e7c", 0x5}], 0x1}, 0x8010) 12:49:50 executing program 0: r0 = getpid() perf_event_open(&(0x7f0000000380)={0x7, 0x70, 0xfffffffffffffffe, 0x7, 0x0, 0x7926, 0x0, 0x4, 0x44, 0x0, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0x0, 0x7, 0x0, 0x8, 0x0, 0x5, 0x6, 0x0, 0x1, 0x39, 0x6, 0x8f9, 0xe6, 0xffffffff, 0x0, 0x0, 0x7ff, 0xffff, 0x8, 0x2e, 0xff, 0x1, 0x0, 0x3ff, 0x4, @perf_config_ext={0xffffffffffffffe0, 0x2}, 0x0, 0x400, 0x8, 0x0, 0x6b, 0x20, 0x78}, r0, 0xe, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) r3 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=r3, 0x12) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x7}, 0x0, 0x0, 0x3, 0xb, 0x4, 0x4}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) [ 647.706521][ T24] audit: type=1804 audit(1563194990.267:141): pid=24096 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir348209096/syzkaller.5GtB4Q/196/memory.events" dev="sda1" ino=16548 res=1 12:49:50 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x444, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x3e, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500243209880bd320d98a", 0x0}, 0x28) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x401, 0xe4, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa, 0x0, 0x2, 0xfffffffffffffffc, 0x8, 0x5, 0x0, 0xa501, 0x7, 0x6, 0x665, 0xe1, 0x2, 0xf0d, 0x7, 0x7ff, 0xf8, 0xb00, 0x7, 0x9, 0x9, 0x400, 0xa1e9, 0x415b1b81, 0x6d, 0xffffffffffff0000, 0x0, 0x6, 0x0, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x1}, 0xc00, 0x2, 0x4, 0x3, 0x20, 0x9, 0x9}, 0x0, 0x10, r2, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r1, 0x2, r0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cxu/syz1\x00\xfe:\x1eD\xd93Y\x13\xb1\xe4g\x1e\xd2\x1d\xf2<\xa4\x7f\xac\xa1|\x19xgt7\xbd\xc7\xd5\xec[\xad{\xb6\rc[J\xbb\x1b\xe6I\x8e\xa8\xfe\xc8\ar\x00\xdfFb#\xb8\x8ew\x11\xbamj[\xf9\xa0d\x98', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r7 = openat$cgroup_ro(r5, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000380)={r5, r7}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d00)='./cgroup.net/syz1\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r7, &(0x7f0000000400)="4e6e6befe7d0f19589459e08a6f32e91e327ca985c6e4a72a17879e0874dc2662e113364ac2da6f19fb09fff86b8c19e44a0c9c1ac286b4317a7d47b52135087adb9e8f4068f00d002aecbba6bcfcdb8e787eb62fd7865ec798c55164296a1b0d94ad5ee3594204395fcf965f3c3baeb55fce2f71d2fdb15e4c9fba33523bd04fdf5f86d9751d6fafc344b61315a0b5e54e7acff96ba993a642d8082752c52f7952a02e89db8f835cc4e5b5a8f098d6b78bb5e98aaf3997a5e64e7fab9de84a9861df21e3d36"}, 0x10) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(r8, 0x0, 0x2, 0x0) r9 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r9, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x672) openat$cgroup_procs(r8, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r10, 0x800454d3, &(0x7f00000003c0)) [ 648.009774][ T24] audit: type=1804 audit(1563194990.647:142): pid=24110 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir217795719/syzkaller.cOOXm9/199/memory.events" dev="sda1" ino=16537 res=1 [ 648.124652][ T24] audit: type=1804 audit(1563194990.757:143): pid=24118 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir217795719/syzkaller.cOOXm9/199/memory.events" dev="sda1" ino=16537 res=1 12:49:50 executing program 3: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x7fffffff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r2, 0x50}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0)=r0, 0x4) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1c, r0, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) 12:49:50 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x444, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x3e, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500243209880bd320d98a", 0x0}, 0x28) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x401, 0xe4, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa, 0x0, 0x2, 0xfffffffffffffffc, 0x8, 0x5, 0x0, 0xa501, 0x7, 0x6, 0x665, 0xe1, 0x2, 0xf0d, 0x7, 0x7ff, 0xf8, 0xb00, 0x7, 0x9, 0x9, 0x400, 0xa1e9, 0x415b1b81, 0x6d, 0xffffffffffff0000, 0x0, 0x6, 0x0, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x1}, 0xc00, 0x2, 0x4, 0x3, 0x20, 0x9, 0x9}, 0x0, 0x10, r2, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r1, 0x2, r0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cxu/syz1\x00\xfe:\x1eD\xd93Y\x13\xb1\xe4g\x1e\xd2\x1d\xf2<\xa4\x7f\xac\xa1|\x19xgt7\xbd\xc7\xd5\xec[\xad{\xb6\rc[J\xbb\x1b\xe6I\x8e\xa8\xfe\xc8\ar\x00\xdfFb#\xb8\x8ew\x11\xbamj[\xf9\xa0d\x98', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r7 = openat$cgroup_ro(r5, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000380)={r5, r7}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d00)='./cgroup.net/syz1\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r7, &(0x7f0000000400)="4e6e6befe7d0f19589459e08a6f32e91e327ca985c6e4a72a17879e0874dc2662e113364ac2da6f19fb09fff86b8c19e44a0c9c1ac286b4317a7d47b52135087adb9e8f4068f00d002aecbba6bcfcdb8e787eb62fd7865ec798c55164296a1b0d94ad5ee3594204395fcf965f3c3baeb55fce2f71d2fdb15e4c9fba33523bd04fdf5f86d9751d6fafc344b61315a0b5e54e7acff96ba993a642d8082752c52f7952a02e89db8f835cc4e5b5a8f098d6b78bb5e98aaf3997a5e64e7fab9de84a9861df21e3d36"}, 0x10) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(r8, 0x0, 0x2, 0x0) r9 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r9, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x672) openat$cgroup_procs(r8, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r10, 0x800454d3, &(0x7f00000003c0)) [ 648.217973][ T24] audit: type=1804 audit(1563194990.857:144): pid=24115 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir348209096/syzkaller.5GtB4Q/197/memory.events" dev="sda1" ino=16533 res=1 12:49:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg(r0, &(0x7f0000003d40)={&(0x7f0000000300)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x3}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000003e00)}], 0x1}, 0x2bb5287811c468de) openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000001400)=ANY=[@ANYBLOB="860fe738fc669e0640a45883ed4379bdb502ff5792d75410b052454ff0904879488f8a80363c59eb10070925d8111c0411da01937438fd1714169ea3a1a96cad5f1c8f8f7646d88fe63a5cbfb6d5b963a242dbefa6e857f224c6253d831b714a07ed5edd15a1089289cf154ff9509eee65210dfa6e1b00e21ead17ed9aaed7fdbfa43a0c3e52b690cdde21753d0bf09fb44a75b7aae4aadf66c4180b30cb3a391d6087768283ff10b0eb186e7d1dd1b2efbfbe94b55cbd41f3078546aff3cc9a88d910189ceec2fb8661012f2d7374c327c9da8bb09ddb0fbc229ca7479528f23d87d787e30c09c51b391f2656"], 0xed) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='/cpu /cpu /|o -rdma \x00pids '], 0x1a) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x0, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x0, 0x0, 0x0, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) sendmsg(r4, &(0x7f0000003d00)={0x0, 0x0, &(0x7f0000002a00)=[{&(0x7f00000029c0)="5170e30e7c", 0x5}], 0x1}, 0x8010) 12:49:50 executing program 0: r0 = getpid() perf_event_open(&(0x7f0000000380)={0x7, 0x70, 0xfffffffffffffffe, 0x7, 0x0, 0x7926, 0x0, 0x4, 0x44, 0x0, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0x0, 0x7, 0x0, 0x8, 0x0, 0x5, 0x6, 0x0, 0x1, 0x39, 0x6, 0x8f9, 0xe6, 0xffffffff, 0x0, 0x0, 0x7ff, 0xffff, 0x8, 0x2e, 0xff, 0x1, 0x0, 0x3ff, 0x4, @perf_config_ext={0xffffffffffffffe0, 0x2}, 0x0, 0x400, 0x8, 0x0, 0x6b, 0x20, 0x78}, r0, 0xe, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) r3 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=r3, 0x12) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x7}, 0x0, 0x0, 0x3, 0xb, 0x4, 0x4}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) 12:49:51 executing program 1: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x7fffffff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r2, 0x50}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0)=r0, 0x4) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1c, r0, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) 12:49:51 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x444, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x3e, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500243209880bd320d98a", 0x0}, 0x28) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x401, 0xe4, 0x9, 0xffffffff, 0x0, 0x0, 0x0, 0xa, 0x0, 0x2, 0xfffffffffffffffc, 0x8, 0x5, 0x0, 0xa501, 0x7, 0x6, 0x665, 0xe1, 0x2, 0xf0d, 0x7, 0x7ff, 0xf8, 0xb00, 0x7, 0x9, 0x9, 0x400, 0xa1e9, 0x415b1b81, 0x6d, 0xffffffffffff0000, 0x0, 0x6, 0x0, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x1}, 0xc00, 0x2, 0x4, 0x3, 0x20, 0x9, 0x9}, 0x0, 0x10, r2, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r1, 0x2, r0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cxu/syz1\x00\xfe:\x1eD\xd93Y\x13\xb1\xe4g\x1e\xd2\x1d\xf2<\xa4\x7f\xac\xa1|\x19xgt7\xbd\xc7\xd5\xec[\xad{\xb6\rc[J\xbb\x1b\xe6I\x8e\xa8\xfe\xc8\ar\x00\xdfFb#\xb8\x8ew\x11\xbamj[\xf9\xa0d\x98', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r7 = openat$cgroup_ro(r5, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000380)={r5, r7}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d00)='./cgroup.net/syz1\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r7, &(0x7f0000000400)="4e6e6befe7d0f19589459e08a6f32e91e327ca985c6e4a72a17879e0874dc2662e113364ac2da6f19fb09fff86b8c19e44a0c9c1ac286b4317a7d47b52135087adb9e8f4068f00d002aecbba6bcfcdb8e787eb62fd7865ec798c55164296a1b0d94ad5ee3594204395fcf965f3c3baeb55fce2f71d2fdb15e4c9fba33523bd04fdf5f86d9751d6fafc344b61315a0b5e54e7acff96ba993a642d8082752c52f7952a02e89db8f835cc4e5b5a8f098d6b78bb5e98aaf3997a5e64e7fab9de84a9861df21e3d36"}, 0x10) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(r8, 0x0, 0x2, 0x0) r9 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r9, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x672) openat$cgroup_procs(r8, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r10, 0x800454d3, &(0x7f00000003c0)) [ 648.642050][ T24] audit: type=1804 audit(1563194991.277:145): pid=24135 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir217795719/syzkaller.cOOXm9/200/memory.events" dev="sda1" ino=16748 res=1 12:49:51 executing program 3: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x7fffffff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r2, 0x50}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0)=r0, 0x4) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1c, r0, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) [ 648.835527][ T24] audit: type=1804 audit(1563194991.467:146): pid=24137 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir348209096/syzkaller.5GtB4Q/198/memory.events" dev="sda1" ino=16749 res=1 12:49:51 executing program 0: r0 = getpid() perf_event_open(&(0x7f0000000380)={0x7, 0x70, 0xfffffffffffffffe, 0x7, 0x0, 0x7926, 0x0, 0x4, 0x44, 0x0, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0x0, 0x7, 0x0, 0x8, 0x0, 0x5, 0x6, 0x0, 0x1, 0x39, 0x6, 0x8f9, 0xe6, 0xffffffff, 0x0, 0x0, 0x7ff, 0xffff, 0x8, 0x2e, 0xff, 0x1, 0x0, 0x3ff, 0x4, @perf_config_ext={0xffffffffffffffe0, 0x2}, 0x0, 0x400, 0x8, 0x0, 0x6b, 0x20, 0x78}, r0, 0xe, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) r3 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=r3, 0x12) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x7}, 0x0, 0x0, 0x3, 0xb, 0x4, 0x4}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) 12:49:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg(r0, &(0x7f0000003d40)={&(0x7f0000000300)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x3}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000003e00)}], 0x1}, 0x2bb5287811c468de) openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000001400)=ANY=[@ANYBLOB="860fe738fc669e0640a45883ed4379bdb502ff5792d75410b052454ff0904879488f8a80363c59eb10070925d8111c0411da01937438fd1714169ea3a1a96cad5f1c8f8f7646d88fe63a5cbfb6d5b963a242dbefa6e857f224c6253d831b714a07ed5edd15a1089289cf154ff9509eee65210dfa6e1b00e21ead17ed9aaed7fdbfa43a0c3e52b690cdde21753d0bf09fb44a75b7aae4aadf66c4180b30cb3a391d6087768283ff10b0eb186e7d1dd1b2efbfbe94b55cbd41f3078546aff3cc9a88d910189ceec2fb8661012f2d7374c327c9da8bb09ddb0fbc229ca7479528f23d87d787e30c09c51b391f2656"], 0xed) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='/cpu /cpu /|o -rdma \x00pids '], 0x1a) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x0, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x0, 0x0, 0x0, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) sendmsg(r4, &(0x7f0000003d00)={0x0, 0x0, &(0x7f0000002a00)=[{&(0x7f00000029c0)="5170e30e7c", 0x5}], 0x1}, 0x8010) 12:49:51 executing program 1: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x7fffffff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r2, 0x50}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0)=r0, 0x4) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1c, r0, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) 12:49:51 executing program 3: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x7fffffff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r2, 0x50}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0)=r0, 0x4) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1c, r0, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) 12:49:52 executing program 2: r0 = getpid() perf_event_open(&(0x7f0000000380)={0x7, 0x70, 0xfffffffffffffffe, 0x7, 0x0, 0x7926, 0x0, 0x4, 0x44, 0x0, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0x0, 0x7, 0x0, 0x8, 0x0, 0x5, 0x6, 0x0, 0x1, 0x39, 0x6, 0x8f9, 0xe6, 0xffffffff, 0x0, 0x0, 0x7ff, 0xffff, 0x8, 0x2e, 0xff, 0x1, 0x0, 0x3ff, 0x4, @perf_config_ext={0xffffffffffffffe0, 0x2}, 0x0, 0x400, 0x8, 0x0, 0x6b, 0x20, 0x78}, r0, 0xe, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) r3 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=r3, 0x12) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x7}, 0x0, 0x0, 0x3, 0xb, 0x4, 0x4}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) [ 649.365838][ T24] audit: type=1804 audit(1563194991.997:147): pid=24157 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir217795719/syzkaller.cOOXm9/201/memory.events" dev="sda1" ino=16580 res=1 12:49:52 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000380)={0x7, 0x70, 0xfffffffffffffffe, 0x7, 0x0, 0x7926, 0x0, 0x4, 0x44, 0x0, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0x0, 0x7, 0x0, 0x8, 0x0, 0x5, 0x6, 0x0, 0x1, 0x39, 0x6, 0x8f9, 0xe6, 0xffffffff, 0x0, 0x0, 0x7ff, 0xffff, 0x8, 0x2e, 0xff, 0x1, 0x0, 0x3ff, 0x4, @perf_config_ext={0xffffffffffffffe0, 0x2}, 0x0, 0x400, 0x8, 0x0, 0x6b, 0x20, 0x78}, r0, 0xe, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) r3 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=r3, 0x12) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x7}, 0x0, 0x0, 0x3, 0xb, 0x4, 0x4}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) [ 649.544964][ T24] audit: type=1804 audit(1563194992.177:148): pid=24149 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir348209096/syzkaller.5GtB4Q/199/memory.events" dev="sda1" ino=16562 res=1 12:49:52 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b80)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000a00)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000a40)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, 0x0}, 0x40000000) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) socketpair(0x0, 0x0, 0x7, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff, 0x100, 0x18}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037, 0x0, 0x0, 0x0, 0x0, r3, 0x0, [], 0x0, r2}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r4, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r5, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r4, 0x0, 0x10) socketpair(0x0, 0x0, 0x100000000000, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x20000000000000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b00)='/Pyz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2cR&!\x85-\x9at\xe0\x93%0!NX\xecK\xbf\xdf\xdc\xf5\xa0\xd7\x12W\x0eY\xe9lK1\xc2\x96\xfb\xbfg\x85\xb7:\xa7\xb5\xf0\xcb\x96\xc0\x0f<\x1ctl\xb7\x1fg\xc3\x06\x8d\xf2\a\x12\xb4K\xf7\x8b\xfa\xb0\xdc\x86\xcc\x7f\x8bD\x0e\x8b\x80\xec\xe88', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000580)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_procs(r7, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x41) 12:49:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) sendmsg(r0, &(0x7f0000003d40)={&(0x7f0000000300)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x3}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000003e00)}], 0x1}, 0x2bb5287811c468de) openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000001400)=ANY=[@ANYBLOB="860fe738fc669e0640a45883ed4379bdb502ff5792d75410b052454ff0904879488f8a80363c59eb10070925d8111c0411da01937438fd1714169ea3a1a96cad5f1c8f8f7646d88fe63a5cbfb6d5b963a242dbefa6e857f224c6253d831b714a07ed5edd15a1089289cf154ff9509eee65210dfa6e1b00e21ead17ed9aaed7fdbfa43a0c3e52b690cdde21753d0bf09fb44a75b7aae4aadf66c4180b30cb3a391d6087768283ff10b0eb186e7d1dd1b2efbfbe94b55cbd41f3078546aff3cc9a88d910189ceec2fb8661012f2d7374c327c9da8bb09ddb0fbc229ca7479528f23d87d787e30c09c51b391f2656"], 0xed) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='/cpu /cpu /|o -rdma \x00pids '], 0x1a) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x0, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x0, 0x0, 0x0, 0x938, 0x10000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) sendmsg(r4, &(0x7f0000003d00)={0x0, 0x0, &(0x7f0000002a00)=[{&(0x7f00000029c0)="5170e30e7c", 0x5}], 0x1}, 0x8010) 12:49:52 executing program 1: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x7fffffff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r2, 0x50}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0)=r0, 0x4) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1c, r0, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8916, &(0x7f0000000000)={r3}) 12:49:52 executing program 2: r0 = getpid() perf_event_open(&(0x7f0000000380)={0x7, 0x70, 0xfffffffffffffffe, 0x7, 0x0, 0x7926, 0x0, 0x4, 0x44, 0x0, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0x0, 0x7, 0x0, 0x8, 0x0, 0x5, 0x6, 0x0, 0x1, 0x39, 0x6, 0x8f9, 0xe6, 0xffffffff, 0x0, 0x0, 0x7ff, 0xffff, 0x8, 0x2e, 0xff, 0x1, 0x0, 0x3ff, 0x4, @perf_config_ext={0xffffffffffffffe0, 0x2}, 0x0, 0x400, 0x8, 0x0, 0x6b, 0x20, 0x78}, r0, 0xe, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) r3 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=r3, 0x12) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x7}, 0x0, 0x0, 0x3, 0xb, 0x4, 0x4}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) 12:49:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x40) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a, 0x1a, 0x6, [@datasec={0x9, 0x1, 0x0, 0xf, 0x2, [{0x1, 0xee38, 0x3}], "0c80"}]}, {0x0, [0x61, 0x0, 0x5f, 0x30]}}, &(0x7f00000008c0)=""/118, 0x3a, 0x76}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x5, &(0x7f0000000100)=@raw=[@ldst={0x2, 0x0, 0x3, 0x0, 0xb, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0xffffffffffffff81}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x29}], 0x0, 0x2, 0xe8, &(0x7f0000000300)=""/232, 0x41000, 0x2, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000980)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x3, 0x1, 0x0, 0x7ff}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r3, r0, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, 0x0) close(r4) 12:49:52 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000380)={0x7, 0x70, 0xfffffffffffffffe, 0x7, 0x0, 0x7926, 0x0, 0x4, 0x44, 0x0, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0x0, 0x7, 0x0, 0x8, 0x0, 0x5, 0x6, 0x0, 0x1, 0x39, 0x6, 0x8f9, 0xe6, 0xffffffff, 0x0, 0x0, 0x7ff, 0xffff, 0x8, 0x2e, 0xff, 0x1, 0x0, 0x3ff, 0x4, @perf_config_ext={0xffffffffffffffe0, 0x2}, 0x0, 0x400, 0x8, 0x0, 0x6b, 0x20, 0x78}, r0, 0xe, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) r3 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=r3, 0x12) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x7}, 0x0, 0x0, 0x3, 0xb, 0x4, 0x4}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) 12:49:52 executing program 2: r0 = getpid() perf_event_open(&(0x7f0000000380)={0x7, 0x70, 0xfffffffffffffffe, 0x7, 0x0, 0x7926, 0x0, 0x4, 0x44, 0x0, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0x0, 0x7, 0x0, 0x8, 0x0, 0x5, 0x6, 0x0, 0x1, 0x39, 0x6, 0x8f9, 0xe6, 0xffffffff, 0x0, 0x0, 0x7ff, 0xffff, 0x8, 0x2e, 0xff, 0x1, 0x0, 0x3ff, 0x4, @perf_config_ext={0xffffffffffffffe0, 0x2}, 0x0, 0x400, 0x8, 0x0, 0x6b, 0x20, 0x78}, r0, 0xe, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) r3 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=r3, 0x12) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x7}, 0x0, 0x0, 0x3, 0xb, 0x4, 0x4}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) 12:49:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x40) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a, 0x1a, 0x6, [@datasec={0x9, 0x1, 0x0, 0xf, 0x2, [{0x1, 0xee38, 0x3}], "0c80"}]}, {0x0, [0x61, 0x0, 0x5f, 0x30]}}, &(0x7f00000008c0)=""/118, 0x3a, 0x76}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x5, &(0x7f0000000100)=@raw=[@ldst={0x2, 0x0, 0x3, 0x0, 0xb, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0xffffffffffffff81}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x29}], 0x0, 0x2, 0xe8, &(0x7f0000000300)=""/232, 0x41000, 0x2, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000980)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x3, 0x1, 0x0, 0x7ff}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r3, r0, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, 0x0) close(r4) 12:49:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x40) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a, 0x1a, 0x6, [@datasec={0x9, 0x1, 0x0, 0xf, 0x2, [{0x1, 0xee38, 0x3}], "0c80"}]}, {0x0, [0x61, 0x0, 0x5f, 0x30]}}, &(0x7f00000008c0)=""/118, 0x3a, 0x76}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x5, &(0x7f0000000100)=@raw=[@ldst={0x2, 0x0, 0x3, 0x0, 0xb, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0xffffffffffffff81}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x29}], 0x0, 0x2, 0xe8, &(0x7f0000000300)=""/232, 0x41000, 0x2, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000980)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x3, 0x1, 0x0, 0x7ff}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r3, r0, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, 0x0) close(r4) 12:49:53 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000380)={0x7, 0x70, 0xfffffffffffffffe, 0x7, 0x0, 0x7926, 0x0, 0x4, 0x44, 0x0, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0x0, 0x7, 0x0, 0x8, 0x0, 0x5, 0x6, 0x0, 0x1, 0x39, 0x6, 0x8f9, 0xe6, 0xffffffff, 0x0, 0x0, 0x7ff, 0xffff, 0x8, 0x2e, 0xff, 0x1, 0x0, 0x3ff, 0x4, @perf_config_ext={0xffffffffffffffe0, 0x2}, 0x0, 0x400, 0x8, 0x0, 0x6b, 0x20, 0x78}, r0, 0xe, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) r3 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000100)=r3, 0x12) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x401, 0x8001, 0x0, 0x5, 0x938, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x7}, 0x0, 0x0, 0x3, 0xb, 0x4, 0x4}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) 12:49:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x40) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a, 0x1a, 0x6, [@datasec={0x9, 0x1, 0x0, 0xf, 0x2, [{0x1, 0xee38, 0x3}], "0c80"}]}, {0x0, [0x61, 0x0, 0x5f, 0x30]}}, &(0x7f00000008c0)=""/118, 0x3a, 0x76}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x5, &(0x7f0000000100)=@raw=[@ldst={0x2, 0x0, 0x3, 0x0, 0xb, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0xffffffffffffff81}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x29}], 0x0, 0x2, 0xe8, &(0x7f0000000300)=""/232, 0x41000, 0x2, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000980)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x3, 0x1, 0x0, 0x7ff}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r3, r0, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, 0x0) close(r4) 12:49:53 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'\\r0\x01\x00', 0x1132}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) 12:49:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x40) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a, 0x1a, 0x6, [@datasec={0x9, 0x1, 0x0, 0xf, 0x2, [{0x1, 0xee38, 0x3}], "0c80"}]}, {0x0, [0x61, 0x0, 0x5f, 0x30]}}, &(0x7f00000008c0)=""/118, 0x3a, 0x76}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x5, &(0x7f0000000100)=@raw=[@ldst={0x2, 0x0, 0x3, 0x0, 0xb, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0xffffffffffffff81}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x29}], 0x0, 0x2, 0xe8, &(0x7f0000000300)=""/232, 0x41000, 0x2, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000980)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x3, 0x1, 0x0, 0x7ff}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r3, r0, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, 0x0) close(r4) 12:49:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x40) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a, 0x1a, 0x6, [@datasec={0x9, 0x1, 0x0, 0xf, 0x2, [{0x1, 0xee38, 0x3}], "0c80"}]}, {0x0, [0x61, 0x0, 0x5f, 0x30]}}, &(0x7f00000008c0)=""/118, 0x3a, 0x76}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x5, &(0x7f0000000100)=@raw=[@ldst={0x2, 0x0, 0x3, 0x0, 0xb, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0xffffffffffffff81}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x29}], 0x0, 0x2, 0xe8, &(0x7f0000000300)=""/232, 0x41000, 0x2, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000980)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x3, 0x1, 0x0, 0x7ff}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r3, r0, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, 0x0) close(r4) 12:49:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x3, 0x7, 0x61, 0x0, 0x98}]}, &(0x7f0000000000)='Q\xa2\xa2\x11\xbbo-\x95\xd3\xc0I\x960(U\x06\t.\xc3\t\xa4\xd5\x99\x02_2\x01\r\xf8\xedxR\xc2\a\xc0\x17\x15k3\xfc\xe7\x9d\xea\xe7\x19M#\"N\xe4\xe4\xc5\xe3!\xfd\x80\xb7', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080), 0x1c6}, 0x34) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:49:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x40) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a, 0x1a, 0x6, [@datasec={0x9, 0x1, 0x0, 0xf, 0x2, [{0x1, 0xee38, 0x3}], "0c80"}]}, {0x0, [0x61, 0x0, 0x5f, 0x30]}}, &(0x7f00000008c0)=""/118, 0x3a, 0x76}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x5, &(0x7f0000000100)=@raw=[@ldst={0x2, 0x0, 0x3, 0x0, 0xb, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0xffffffffffffff81}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x29}], 0x0, 0x2, 0xe8, &(0x7f0000000300)=""/232, 0x41000, 0x2, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000980)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x3, 0x1, 0x0, 0x7ff}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r3, r0, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, 0x0) close(r4) 12:49:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="006312ce1cac5a5bcc17ab"], 0xb) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1c6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)={[{0x0, 'rdma'}, {0x2f, 'cpu'}, {0x2f, 'cpu'}, {0x2f, 'cpu'}, {0x2d, 'rdma'}, {0x2d, 'pids'}, {0x2f, 'pids'}]}, 0x27) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x40, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x0, 0x0, 0x5, 0x938, 0x0, 0xfff, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x3, 0xb, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 12:49:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x3, 0x7, 0x61, 0x0, 0x98}]}, &(0x7f0000000000)='Q\xa2\xa2\x11\xbbo-\x95\xd3\xc0I\x960(U\x06\t.\xc3\t\xa4\xd5\x99\x02_2\x01\r\xf8\xedxR\xc2\a\xc0\x17\x15k3\xfc\xe7\x9d\xea\xe7\x19M#\"N\xe4\xe4\xc5\xe3!\xfd\x80\xb7', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080), 0x1c6}, 0x34) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:49:53 executing program 5: openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x1, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socketpair(0x21, 0x2, 0x2, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000004ec0)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:49:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x40) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a, 0x1a, 0x6, [@datasec={0x9, 0x1, 0x0, 0xf, 0x2, [{0x1, 0xee38, 0x3}], "0c80"}]}, {0x0, [0x61, 0x0, 0x5f, 0x30]}}, &(0x7f00000008c0)=""/118, 0x3a, 0x76}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x5, &(0x7f0000000100)=@raw=[@ldst={0x2, 0x0, 0x3, 0x0, 0xb, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0xffffffffffffff81}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x29}], 0x0, 0x2, 0xe8, &(0x7f0000000300)=""/232, 0x41000, 0x2, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000980)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x3, 0x1, 0x0, 0x7ff}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r3, r0, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, 0x0) close(r4) 12:49:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x40) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a, 0x1a, 0x6, [@datasec={0x9, 0x1, 0x0, 0xf, 0x2, [{0x1, 0xee38, 0x3}], "0c80"}]}, {0x0, [0x61, 0x0, 0x5f, 0x30]}}, &(0x7f00000008c0)=""/118, 0x3a, 0x76}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x5, &(0x7f0000000100)=@raw=[@ldst={0x2, 0x0, 0x3, 0x0, 0xb, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0xffffffffffffff81}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x29}], 0x0, 0x2, 0xe8, &(0x7f0000000300)=""/232, 0x41000, 0x2, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000980)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x3, 0x1, 0x0, 0x7ff}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r3, r0, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, 0x0) close(r4) 12:49:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x40) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a, 0x1a, 0x6, [@datasec={0x9, 0x1, 0x0, 0xf, 0x2, [{0x1, 0xee38, 0x3}], "0c80"}]}, {0x0, [0x61, 0x0, 0x5f, 0x30]}}, &(0x7f00000008c0)=""/118, 0x3a, 0x76}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x5, &(0x7f0000000100)=@raw=[@ldst={0x2, 0x0, 0x3, 0x0, 0xb, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0xffffffffffffff81}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x29}], 0x0, 0x2, 0xe8, &(0x7f0000000300)=""/232, 0x41000, 0x2, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000980)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x3, 0x1, 0x0, 0x7ff}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r3, r0, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, 0x0) close(r4) 12:49:54 executing program 5: openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x1, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socketpair(0x21, 0x2, 0x2, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000004ec0)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:49:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x3, 0x7, 0x61, 0x0, 0x98}]}, &(0x7f0000000000)='Q\xa2\xa2\x11\xbbo-\x95\xd3\xc0I\x960(U\x06\t.\xc3\t\xa4\xd5\x99\x02_2\x01\r\xf8\xedxR\xc2\a\xc0\x17\x15k3\xfc\xe7\x9d\xea\xe7\x19M#\"N\xe4\xe4\xc5\xe3!\xfd\x80\xb7', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080), 0x1c6}, 0x34) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:49:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="006312ce1cac5a5bcc17ab"], 0xb) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1c6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)={[{0x0, 'rdma'}, {0x2f, 'cpu'}, {0x2f, 'cpu'}, {0x2f, 'cpu'}, {0x2d, 'rdma'}, {0x2d, 'pids'}, {0x2f, 'pids'}]}, 0x27) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x40, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x0, 0x0, 0x5, 0x938, 0x0, 0xfff, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x3, 0xb, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 12:49:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="006312ce1cac5a5bcc17ab"], 0xb) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1c6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)={[{0x0, 'rdma'}, {0x2f, 'cpu'}, {0x2f, 'cpu'}, {0x2f, 'cpu'}, {0x2d, 'rdma'}, {0x2d, 'pids'}, {0x2f, 'pids'}]}, 0x27) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x40, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x0, 0x0, 0x5, 0x938, 0x0, 0xfff, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x3, 0xb, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 12:49:54 executing program 5: openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x1, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socketpair(0x21, 0x2, 0x2, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000004ec0)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:49:54 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, 0x0, 0x300) 12:49:54 executing program 3: perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x100000000, 0x2, 0xb, 0x0, 0x84, 0x80000001, 0xfff, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x6, 0x3ac9, 0x0, 0x101, 0xb32, 0x0, 0x3, 0x0, 0x0, 0xff, 0x1f, 0x6, 0x101, 0x18f7, 0x0, 0x0, 0x0, 0xa3e3, 0x2, @perf_bp={0x0, 0x6}, 0x0, 0x20, 0x9, 0x4c623d5b576c199a, 0x101, 0x8, 0x7}, 0xffffffffffffff9c, 0xd, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f00000005c0)={0x7, 0x70, 0x7, 0x5fa, 0xffffffffffff26d8, 0x7, 0x0, 0x68d, 0x0, 0x3, 0x3, 0x401, 0x6, 0x4, 0x5, 0x5, 0x200, 0x3, 0x0, 0x4, 0x7fff, 0x11dcf08c, 0x4, 0x0, 0x80000001, 0x2, 0x8001, 0x1, 0x5, 0x1f, 0x1f, 0x2, 0x3, 0x0, 0xfffffffffffffffe, 0x1800, 0x6, 0x4, 0x0, 0x3, 0x2, @perf_bp={0x0, 0xb}, 0x42, 0x1ff, 0x81, 0x7, 0x401, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000000340)='%+\'(eth0[trusted\\\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x1d, &(0x7f0000000440)='.&vboxnet1posix_acl_access,\\\x00'}, 0x30) r2 = perf_event_open(0x0, r1, 0xffffffdffffffffa, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000940)=ANY=[@ANYBLOB], 0x0}, 0x20) recvmsg$kcm(r3, &(0x7f000000fe40)={&(0x7f000000fc00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000fd00)=[{&(0x7f000000fc80)=""/86, 0x56}], 0x1, &(0x7f000000fd40)=""/255, 0xff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000ff00)={0xd, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@ldst={0x3, 0x2, 0x1, 0xb, 0x0, 0xffffffffffffffff}, @ldst={0x3, 0x1, 0x0, 0x0, 0x7, 0xfffffffffffffffc, 0xfffffffffffffffc}, @ldst={0x2, 0x2, 0x3, 0xb, 0x1, 0xffffffffffffffff, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x4}]}, 0x0, 0xe3, 0x0, 0x0, 0x41100, 0x3, [], r4, 0xa, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f000000fec0)={0x3, 0x4, 0x1000, 0x585}, 0x10}, 0x70) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r5, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={0x0}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(r7, 0x400454cd, 0x1b) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)=r6, 0x4) 12:49:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x3, 0x7, 0x61, 0x0, 0x98}]}, &(0x7f0000000000)='Q\xa2\xa2\x11\xbbo-\x95\xd3\xc0I\x960(U\x06\t.\xc3\t\xa4\xd5\x99\x02_2\x01\r\xf8\xedxR\xc2\a\xc0\x17\x15k3\xfc\xe7\x9d\xea\xe7\x19M#\"N\xe4\xe4\xc5\xe3!\xfd\x80\xb7', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080), 0x1c6}, 0x34) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:49:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000580)='ip6_vti0\x00') 12:49:54 executing program 5: openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x1, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socketpair(0x21, 0x2, 0x2, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000004ec0)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:49:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="006312ce1cac5a5bcc17ab"], 0xb) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1c6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)={[{0x0, 'rdma'}, {0x2f, 'cpu'}, {0x2f, 'cpu'}, {0x2f, 'cpu'}, {0x2d, 'rdma'}, {0x2d, 'pids'}, {0x2f, 'pids'}]}, 0x27) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x40, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x0, 0x0, 0x5, 0x938, 0x0, 0xfff, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x3, 0xb, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 12:49:54 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000002}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) 12:49:54 executing program 3: perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x100000000, 0x2, 0xb, 0x0, 0x84, 0x80000001, 0xfff, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x6, 0x3ac9, 0x0, 0x101, 0xb32, 0x0, 0x3, 0x0, 0x0, 0xff, 0x1f, 0x6, 0x101, 0x18f7, 0x0, 0x0, 0x0, 0xa3e3, 0x2, @perf_bp={0x0, 0x6}, 0x0, 0x20, 0x9, 0x4c623d5b576c199a, 0x101, 0x8, 0x7}, 0xffffffffffffff9c, 0xd, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f00000005c0)={0x7, 0x70, 0x7, 0x5fa, 0xffffffffffff26d8, 0x7, 0x0, 0x68d, 0x0, 0x3, 0x3, 0x401, 0x6, 0x4, 0x5, 0x5, 0x200, 0x3, 0x0, 0x4, 0x7fff, 0x11dcf08c, 0x4, 0x0, 0x80000001, 0x2, 0x8001, 0x1, 0x5, 0x1f, 0x1f, 0x2, 0x3, 0x0, 0xfffffffffffffffe, 0x1800, 0x6, 0x4, 0x0, 0x3, 0x2, @perf_bp={0x0, 0xb}, 0x42, 0x1ff, 0x81, 0x7, 0x401, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000000340)='%+\'(eth0[trusted\\\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x1d, &(0x7f0000000440)='.&vboxnet1posix_acl_access,\\\x00'}, 0x30) r2 = perf_event_open(0x0, r1, 0xffffffdffffffffa, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000940)=ANY=[@ANYBLOB], 0x0}, 0x20) recvmsg$kcm(r3, &(0x7f000000fe40)={&(0x7f000000fc00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000fd00)=[{&(0x7f000000fc80)=""/86, 0x56}], 0x1, &(0x7f000000fd40)=""/255, 0xff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000ff00)={0xd, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@ldst={0x3, 0x2, 0x1, 0xb, 0x0, 0xffffffffffffffff}, @ldst={0x3, 0x1, 0x0, 0x0, 0x7, 0xfffffffffffffffc, 0xfffffffffffffffc}, @ldst={0x2, 0x2, 0x3, 0xb, 0x1, 0xffffffffffffffff, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x4}]}, 0x0, 0xe3, 0x0, 0x0, 0x41100, 0x3, [], r4, 0xa, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f000000fec0)={0x3, 0x4, 0x1000, 0x585}, 0x10}, 0x70) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r5, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={0x0}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(r7, 0x400454cd, 0x1b) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)=r6, 0x4) 12:49:55 executing program 0: perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x100000000, 0x2, 0xb, 0x0, 0x84, 0x80000001, 0xfff, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x6, 0x3ac9, 0x0, 0x101, 0xb32, 0x0, 0x3, 0x0, 0x0, 0xff, 0x1f, 0x6, 0x101, 0x18f7, 0x0, 0x0, 0x0, 0xa3e3, 0x2, @perf_bp={0x0, 0x6}, 0x0, 0x20, 0x9, 0x4c623d5b576c199a, 0x101, 0x8, 0x7}, 0xffffffffffffff9c, 0xd, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f00000005c0)={0x7, 0x70, 0x7, 0x5fa, 0xffffffffffff26d8, 0x7, 0x0, 0x68d, 0x0, 0x3, 0x3, 0x401, 0x6, 0x4, 0x5, 0x5, 0x200, 0x3, 0x0, 0x4, 0x7fff, 0x11dcf08c, 0x4, 0x0, 0x80000001, 0x2, 0x8001, 0x1, 0x5, 0x1f, 0x1f, 0x2, 0x3, 0x0, 0xfffffffffffffffe, 0x1800, 0x6, 0x4, 0x0, 0x3, 0x2, @perf_bp={0x0, 0xb}, 0x42, 0x1ff, 0x81, 0x7, 0x401, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000000340)='%+\'(eth0[trusted\\\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x1d, &(0x7f0000000440)='.&vboxnet1posix_acl_access,\\\x00'}, 0x30) r2 = perf_event_open(0x0, r1, 0xffffffdffffffffa, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000940)=ANY=[@ANYBLOB], 0x0}, 0x20) recvmsg$kcm(r3, &(0x7f000000fe40)={&(0x7f000000fc00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000fd00)=[{&(0x7f000000fc80)=""/86, 0x56}], 0x1, &(0x7f000000fd40)=""/255, 0xff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000ff00)={0xd, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@ldst={0x3, 0x2, 0x1, 0xb, 0x0, 0xffffffffffffffff}, @ldst={0x3, 0x1, 0x0, 0x0, 0x7, 0xfffffffffffffffc, 0xfffffffffffffffc}, @ldst={0x2, 0x2, 0x3, 0xb, 0x1, 0xffffffffffffffff, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x4}]}, 0x0, 0xe3, 0x0, 0x0, 0x41100, 0x3, [], r4, 0xa, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f000000fec0)={0x3, 0x4, 0x1000, 0x585}, 0x10}, 0x70) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r5, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={0x0}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(r7, 0x400454cd, 0x1b) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)=r6, 0x4) 12:49:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="006312ce1cac5a5bcc17ab"], 0xb) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="a2fafafcd5c9bb9aa101b9d27f0c35d3411bfdc9b303ffb353b5d607fb941f85fd614a7ce7e72a3003749674a20a4f66f1483cf80c2cf3d4e5f320d9c7bc3b98a106a0b9d12ba1f977bd7c19e6f68be3eef91c3754380742d950e635b62ad4f863df71221bb3aff89ea4be0c4f4d33b2de3fa92893893bb3f564c7734e723701c83f100c1e6b3da51c626486afdfacd52a5ac110fa781a4b546b146c5d524e317309be0e7eaffffaf26ea120957b95ff51554d8c4a7e44ed6dfd6514f51ccaa35de80154fa4b851e1e72caa831781ea544bfd58ec7d792678144c2ce87f8d9c4e4d692bb14b53766dbef0070b8f31fd05c5b05c184e6194d8dfa3560350c41e270cfcc5f2dcbabf70156a4264ae2cd1d7a2a0aca686590c35ec1ca2380191139c9c7343ab997ef4960d737613f24772a47dc042ed5133f9b3a6db08040875e7db231d01b83e3a480798e2765cf7251e40a3694f2d8bd9e3b27483f4c93a8ab48b098843c1383f5e7a0f572b69e8c74f1251a1c2b9f389facf711674f309217ab4d89e732898350e61eb66e6c1c156a278c2e5bf8f7cd81e9cebf986be83b16db196dde5f8b0631ea987e1fc5b3727ac1596c82b9d5c06c617e852279a46a58edf3c474daa095"], 0x1c6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)={[{0x0, 'rdma'}, {0x2f, 'cpu'}, {0x2f, 'cpu'}, {0x2f, 'cpu'}, {0x2d, 'rdma'}, {0x2d, 'pids'}, {0x2f, 'pids'}]}, 0x27) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x40, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x0, 0x0, 0x5, 0x938, 0x0, 0xfff, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x3, 0xb, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 12:49:55 executing program 5: r0 = socket$kcm(0xa, 0x8000000000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x1ff, 0x5, 0x1, 0x4, 0x0, 0x7019, 0x1000, 0x8, 0x9, 0x103, 0xe7f, 0x51, 0x2, 0x80000000, 0xa4, 0x0, 0x182, 0xfffffffffffffff8, 0x5, 0xb346, 0x5, 0x4, 0x7fffffff, 0x5, 0x89, 0x50, 0x3, 0x6, 0x101, 0x8, 0x1, 0x1, 0x800, 0x8000, 0x162da079, 0x93, 0x0, 0xfffffffffffffffc, 0x6, @perf_config_ext={0x7, 0x8}, 0x2a580, 0x1, 0x3f, 0x3, 0x6, 0x0, 0x8}, 0x0, 0x7, 0xffffffffffffff9c, 0x1) socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000200)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000280)=""/224, 0xe0}, {&(0x7f0000000380)=""/234, 0xea}], 0x2, &(0x7f00000004c0)=""/127, 0x7f}, 0x2000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x5, 0xec92, 0x2, 0x68d9, 0x40, r1, 0x2, [], r2, r3, 0x0, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x40000000, 0x0, 0xaa00000000000000, 0x80fe}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000080)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc85a2b1496c0c48000302080a2f858ad2c4aa412d", 0x48}], 0x1}, 0x0) [ 652.573608][ T24] kauditd_printk_skb: 14 callbacks suppressed [ 652.573624][ T24] audit: type=1804 audit(1563194995.207:163): pid=24301 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir149502207/syzkaller.tRWlb4/589/memory.events" dev="sda1" ino=16738 res=1 12:49:55 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000002}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) 12:49:55 executing program 3: perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x100000000, 0x2, 0xb, 0x0, 0x84, 0x80000001, 0xfff, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x6, 0x3ac9, 0x0, 0x101, 0xb32, 0x0, 0x3, 0x0, 0x0, 0xff, 0x1f, 0x6, 0x101, 0x18f7, 0x0, 0x0, 0x0, 0xa3e3, 0x2, @perf_bp={0x0, 0x6}, 0x0, 0x20, 0x9, 0x4c623d5b576c199a, 0x101, 0x8, 0x7}, 0xffffffffffffff9c, 0xd, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f00000005c0)={0x7, 0x70, 0x7, 0x5fa, 0xffffffffffff26d8, 0x7, 0x0, 0x68d, 0x0, 0x3, 0x3, 0x401, 0x6, 0x4, 0x5, 0x5, 0x200, 0x3, 0x0, 0x4, 0x7fff, 0x11dcf08c, 0x4, 0x0, 0x80000001, 0x2, 0x8001, 0x1, 0x5, 0x1f, 0x1f, 0x2, 0x3, 0x0, 0xfffffffffffffffe, 0x1800, 0x6, 0x4, 0x0, 0x3, 0x2, @perf_bp={0x0, 0xb}, 0x42, 0x1ff, 0x81, 0x7, 0x401, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000000340)='%+\'(eth0[trusted\\\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x1d, &(0x7f0000000440)='.&vboxnet1posix_acl_access,\\\x00'}, 0x30) r2 = perf_event_open(0x0, r1, 0xffffffdffffffffa, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000940)=ANY=[@ANYBLOB], 0x0}, 0x20) recvmsg$kcm(r3, &(0x7f000000fe40)={&(0x7f000000fc00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000fd00)=[{&(0x7f000000fc80)=""/86, 0x56}], 0x1, &(0x7f000000fd40)=""/255, 0xff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000ff00)={0xd, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@ldst={0x3, 0x2, 0x1, 0xb, 0x0, 0xffffffffffffffff}, @ldst={0x3, 0x1, 0x0, 0x0, 0x7, 0xfffffffffffffffc, 0xfffffffffffffffc}, @ldst={0x2, 0x2, 0x3, 0xb, 0x1, 0xffffffffffffffff, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x4}]}, 0x0, 0xe3, 0x0, 0x0, 0x41100, 0x3, [], r4, 0xa, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f000000fec0)={0x3, 0x4, 0x1000, 0x585}, 0x10}, 0x70) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r5, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={0x0}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(r7, 0x400454cd, 0x1b) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)=r6, 0x4) 12:49:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="006312ce1cac5a5bcc17ab"], 0xb) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1c6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)={[{0x0, 'rdma'}, {0x2f, 'cpu'}, {0x2f, 'cpu'}, {0x2f, 'cpu'}, {0x2d, 'rdma'}, {0x2d, 'pids'}, {0x2f, 'pids'}]}, 0x27) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x40, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x0, 0x0, 0x5, 0x938, 0x0, 0xfff, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x3, 0xb, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 12:49:55 executing program 0: perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x100000000, 0x2, 0xb, 0x0, 0x84, 0x80000001, 0xfff, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x6, 0x3ac9, 0x0, 0x101, 0xb32, 0x0, 0x3, 0x0, 0x0, 0xff, 0x1f, 0x6, 0x101, 0x18f7, 0x0, 0x0, 0x0, 0xa3e3, 0x2, @perf_bp={0x0, 0x6}, 0x0, 0x20, 0x9, 0x4c623d5b576c199a, 0x101, 0x8, 0x7}, 0xffffffffffffff9c, 0xd, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f00000005c0)={0x7, 0x70, 0x7, 0x5fa, 0xffffffffffff26d8, 0x7, 0x0, 0x68d, 0x0, 0x3, 0x3, 0x401, 0x6, 0x4, 0x5, 0x5, 0x200, 0x3, 0x0, 0x4, 0x7fff, 0x11dcf08c, 0x4, 0x0, 0x80000001, 0x2, 0x8001, 0x1, 0x5, 0x1f, 0x1f, 0x2, 0x3, 0x0, 0xfffffffffffffffe, 0x1800, 0x6, 0x4, 0x0, 0x3, 0x2, @perf_bp={0x0, 0xb}, 0x42, 0x1ff, 0x81, 0x7, 0x401, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000000340)='%+\'(eth0[trusted\\\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x1d, &(0x7f0000000440)='.&vboxnet1posix_acl_access,\\\x00'}, 0x30) r2 = perf_event_open(0x0, r1, 0xffffffdffffffffa, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000940)=ANY=[@ANYBLOB], 0x0}, 0x20) recvmsg$kcm(r3, &(0x7f000000fe40)={&(0x7f000000fc00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000fd00)=[{&(0x7f000000fc80)=""/86, 0x56}], 0x1, &(0x7f000000fd40)=""/255, 0xff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000ff00)={0xd, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@ldst={0x3, 0x2, 0x1, 0xb, 0x0, 0xffffffffffffffff}, @ldst={0x3, 0x1, 0x0, 0x0, 0x7, 0xfffffffffffffffc, 0xfffffffffffffffc}, @ldst={0x2, 0x2, 0x3, 0xb, 0x1, 0xffffffffffffffff, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x4}]}, 0x0, 0xe3, 0x0, 0x0, 0x41100, 0x3, [], r4, 0xa, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f000000fec0)={0x3, 0x4, 0x1000, 0x585}, 0x10}, 0x70) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r5, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={0x0}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(r7, 0x400454cd, 0x1b) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)=r6, 0x4) 12:49:55 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000002}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) 12:49:55 executing program 5: r0 = socket$kcm(0xa, 0x8000000000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x1ff, 0x5, 0x1, 0x4, 0x0, 0x7019, 0x1000, 0x8, 0x9, 0x103, 0xe7f, 0x51, 0x2, 0x80000000, 0xa4, 0x0, 0x182, 0xfffffffffffffff8, 0x5, 0xb346, 0x5, 0x4, 0x7fffffff, 0x5, 0x89, 0x50, 0x3, 0x6, 0x101, 0x8, 0x1, 0x1, 0x800, 0x8000, 0x162da079, 0x93, 0x0, 0xfffffffffffffffc, 0x6, @perf_config_ext={0x7, 0x8}, 0x2a580, 0x1, 0x3f, 0x3, 0x6, 0x0, 0x8}, 0x0, 0x7, 0xffffffffffffff9c, 0x1) socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000200)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000280)=""/224, 0xe0}, {&(0x7f0000000380)=""/234, 0xea}], 0x2, &(0x7f00000004c0)=""/127, 0x7f}, 0x2000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x5, 0xec92, 0x2, 0x68d9, 0x40, r1, 0x2, [], r2, r3, 0x0, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x40000000, 0x0, 0xaa00000000000000, 0x80fe}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000080)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc85a2b1496c0c48000302080a2f858ad2c4aa412d", 0x48}], 0x1}, 0x0) [ 652.997901][ T24] audit: type=1804 audit(1563194995.637:164): pid=24320 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir217795719/syzkaller.cOOXm9/207/memory.events" dev="sda1" ino=16613 res=1 12:49:55 executing program 3: perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x100000000, 0x2, 0xb, 0x0, 0x84, 0x80000001, 0xfff, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x6, 0x3ac9, 0x0, 0x101, 0xb32, 0x0, 0x3, 0x0, 0x0, 0xff, 0x1f, 0x6, 0x101, 0x18f7, 0x0, 0x0, 0x0, 0xa3e3, 0x2, @perf_bp={0x0, 0x6}, 0x0, 0x20, 0x9, 0x4c623d5b576c199a, 0x101, 0x8, 0x7}, 0xffffffffffffff9c, 0xd, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f00000005c0)={0x7, 0x70, 0x7, 0x5fa, 0xffffffffffff26d8, 0x7, 0x0, 0x68d, 0x0, 0x3, 0x3, 0x401, 0x6, 0x4, 0x5, 0x5, 0x200, 0x3, 0x0, 0x4, 0x7fff, 0x11dcf08c, 0x4, 0x0, 0x80000001, 0x2, 0x8001, 0x1, 0x5, 0x1f, 0x1f, 0x2, 0x3, 0x0, 0xfffffffffffffffe, 0x1800, 0x6, 0x4, 0x0, 0x3, 0x2, @perf_bp={0x0, 0xb}, 0x42, 0x1ff, 0x81, 0x7, 0x401, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000000340)='%+\'(eth0[trusted\\\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x1d, &(0x7f0000000440)='.&vboxnet1posix_acl_access,\\\x00'}, 0x30) r2 = perf_event_open(0x0, r1, 0xffffffdffffffffa, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000940)=ANY=[@ANYBLOB], 0x0}, 0x20) recvmsg$kcm(r3, &(0x7f000000fe40)={&(0x7f000000fc00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000fd00)=[{&(0x7f000000fc80)=""/86, 0x56}], 0x1, &(0x7f000000fd40)=""/255, 0xff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000ff00)={0xd, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@ldst={0x3, 0x2, 0x1, 0xb, 0x0, 0xffffffffffffffff}, @ldst={0x3, 0x1, 0x0, 0x0, 0x7, 0xfffffffffffffffc, 0xfffffffffffffffc}, @ldst={0x2, 0x2, 0x3, 0xb, 0x1, 0xffffffffffffffff, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x4}]}, 0x0, 0xe3, 0x0, 0x0, 0x41100, 0x3, [], r4, 0xa, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f000000fec0)={0x3, 0x4, 0x1000, 0x585}, 0x10}, 0x70) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r5, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={0x0}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(r7, 0x400454cd, 0x1b) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)=r6, 0x4) 12:49:55 executing program 0: perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x100000000, 0x2, 0xb, 0x0, 0x84, 0x80000001, 0xfff, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x6, 0x3ac9, 0x0, 0x101, 0xb32, 0x0, 0x3, 0x0, 0x0, 0xff, 0x1f, 0x6, 0x101, 0x18f7, 0x0, 0x0, 0x0, 0xa3e3, 0x2, @perf_bp={0x0, 0x6}, 0x0, 0x20, 0x9, 0x4c623d5b576c199a, 0x101, 0x8, 0x7}, 0xffffffffffffff9c, 0xd, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f00000005c0)={0x7, 0x70, 0x7, 0x5fa, 0xffffffffffff26d8, 0x7, 0x0, 0x68d, 0x0, 0x3, 0x3, 0x401, 0x6, 0x4, 0x5, 0x5, 0x200, 0x3, 0x0, 0x4, 0x7fff, 0x11dcf08c, 0x4, 0x0, 0x80000001, 0x2, 0x8001, 0x1, 0x5, 0x1f, 0x1f, 0x2, 0x3, 0x0, 0xfffffffffffffffe, 0x1800, 0x6, 0x4, 0x0, 0x3, 0x2, @perf_bp={0x0, 0xb}, 0x42, 0x1ff, 0x81, 0x7, 0x401, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000000340)='%+\'(eth0[trusted\\\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x1d, &(0x7f0000000440)='.&vboxnet1posix_acl_access,\\\x00'}, 0x30) r2 = perf_event_open(0x0, r1, 0xffffffdffffffffa, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000940)=ANY=[@ANYBLOB], 0x0}, 0x20) recvmsg$kcm(r3, &(0x7f000000fe40)={&(0x7f000000fc00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000fd00)=[{&(0x7f000000fc80)=""/86, 0x56}], 0x1, &(0x7f000000fd40)=""/255, 0xff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000ff00)={0xd, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, [@ldst={0x3, 0x2, 0x1, 0xb, 0x0, 0xffffffffffffffff}, @ldst={0x3, 0x1, 0x0, 0x0, 0x7, 0xfffffffffffffffc, 0xfffffffffffffffc}, @ldst={0x2, 0x2, 0x3, 0xb, 0x1, 0xffffffffffffffff, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x4}]}, 0x0, 0xe3, 0x0, 0x0, 0x41100, 0x3, [], r4, 0xa, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f000000fec0)={0x3, 0x4, 0x1000, 0x585}, 0x10}, 0x70) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r5, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={0x0}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(r7, 0x400454cd, 0x1b) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)=r6, 0x4) [ 653.170943][ T24] audit: type=1804 audit(1563194995.747:165): pid=24327 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir149502207/syzkaller.tRWlb4/590/memory.events" dev="sda1" ino=16547 res=1 12:49:55 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000002}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) 12:49:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="006312ce1cac5a5bcc17ab"], 0xb) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1c6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)={[{0x0, 'rdma'}, {0x2f, 'cpu'}, {0x2f, 'cpu'}, {0x2f, 'cpu'}, {0x2d, 'rdma'}, {0x2d, 'pids'}, {0x2f, 'pids'}]}, 0x27) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x1, 0x0, 0x0, 0x3, 0x10000, 0x3, 0x40, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x4, 0x101, 0x1f, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x0, 0x0, 0x5, 0x938, 0x0, 0xfff, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x3, 0xb, 0x4, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 12:49:56 executing program 5: r0 = socket$kcm(0xa, 0x8000000000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x1ff, 0x5, 0x1, 0x4, 0x0, 0x7019, 0x1000, 0x8, 0x9, 0x103, 0xe7f, 0x51, 0x2, 0x80000000, 0xa4, 0x0, 0x182, 0xfffffffffffffff8, 0x5, 0xb346, 0x5, 0x4, 0x7fffffff, 0x5, 0x89, 0x50, 0x3, 0x6, 0x101, 0x8, 0x1, 0x1, 0x800, 0x8000, 0x162da079, 0x93, 0x0, 0xfffffffffffffffc, 0x6, @perf_config_ext={0x7, 0x8}, 0x2a580, 0x1, 0x3f, 0x3, 0x6, 0x0, 0x8}, 0x0, 0x7, 0xffffffffffffff9c, 0x1) socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000200)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000280)=""/224, 0xe0}, {&(0x7f0000000380)=""/234, 0xea}], 0x2, &(0x7f00000004c0)=""/127, 0x7f}, 0x2000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x5, 0xec92, 0x2, 0x68d9, 0x40, r1, 0x2, [], r2, r3, 0x0, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x40000000, 0x0, 0xaa00000000000000, 0x80fe}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000080)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc85a2b1496c0c48000302080a2f858ad2c4aa412d", 0x48}], 0x1}, 0x0) 12:49:56 executing program 2: r0 = socket$kcm(0xa, 0x8000000000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x1ff, 0x5, 0x1, 0x4, 0x0, 0x7019, 0x1000, 0x8, 0x9, 0x103, 0xe7f, 0x51, 0x2, 0x80000000, 0xa4, 0x0, 0x182, 0xfffffffffffffff8, 0x5, 0xb346, 0x5, 0x4, 0x7fffffff, 0x5, 0x89, 0x50, 0x3, 0x6, 0x101, 0x8, 0x1, 0x1, 0x800, 0x8000, 0x162da079, 0x93, 0x0, 0xfffffffffffffffc, 0x6, @perf_config_ext={0x7, 0x8}, 0x2a580, 0x1, 0x3f, 0x3, 0x6, 0x0, 0x8}, 0x0, 0x7, 0xffffffffffffff9c, 0x1) socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000200)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000280)=""/224, 0xe0}, {&(0x7f0000000380)=""/234, 0xea}], 0x2, &(0x7f00000004c0)=""/127, 0x7f}, 0x2000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x5, 0xec92, 0x2, 0x68d9, 0x40, r1, 0x2, [], r2, r3, 0x0, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x40000000, 0x0, 0xaa00000000000000, 0x80fe}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000080)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc85a2b1496c0c48000302080a2f858ad2c4aa412d", 0x48}], 0x1}, 0x0) 12:49:56 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 12:49:56 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0xc}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251}, 0x48) socket$kcm(0xa, 0x0, 0x11) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440), 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) gettid() 12:49:56 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000440)='syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000001580)="ce58af7be534a1deb327c9fa8f7948e00300ca65b2f6bf8678a523b73dfc4c3091fb96cae105cf3efd5b649fd72b05f8361c60e9fbafbe333cea065b3641a7f3de504005f54b730c73cda70f95c1709aef3e9119f4c6b460044de6c1f79d5217fbbf029a545cee0ba5ddda857b48352d4b18d43d3095742f71ed66f99d5e76fb4615750ccda9c3f01ba05ec33fe166fc93f2f51416de007a47b87673cb62e10b2725f21509ac6f44b323ec5649cf1da8bd737ee5b717c27182150aec25f8e5764629b8709db71ecf74a5ff422c02435c52291a8db6378e3d95ab0ad9d8b0903655a39ee5d8ff28ff60ed5c975038ee8b526a62c6e9d292", 0xf7}], 0x1}, 0x10) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r3, 0x28, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r4, 0x7, 0x8}, 0xc) write$cgroup_pid(r3, &(0x7f0000000100), 0x4bf8f226) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3a9e, 0x0, 0x0, 0x2, 0x100000001000, 0x0, 0x4, 0xb811, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x2, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xb, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) gettid() 12:49:56 executing program 2: r0 = socket$kcm(0xa, 0x8000000000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x1ff, 0x5, 0x1, 0x4, 0x0, 0x7019, 0x1000, 0x8, 0x9, 0x103, 0xe7f, 0x51, 0x2, 0x80000000, 0xa4, 0x0, 0x182, 0xfffffffffffffff8, 0x5, 0xb346, 0x5, 0x4, 0x7fffffff, 0x5, 0x89, 0x50, 0x3, 0x6, 0x101, 0x8, 0x1, 0x1, 0x800, 0x8000, 0x162da079, 0x93, 0x0, 0xfffffffffffffffc, 0x6, @perf_config_ext={0x7, 0x8}, 0x2a580, 0x1, 0x3f, 0x3, 0x6, 0x0, 0x8}, 0x0, 0x7, 0xffffffffffffff9c, 0x1) socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000200)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000280)=""/224, 0xe0}, {&(0x7f0000000380)=""/234, 0xea}], 0x2, &(0x7f00000004c0)=""/127, 0x7f}, 0x2000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x5, 0xec92, 0x2, 0x68d9, 0x40, r1, 0x2, [], r2, r3, 0x0, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x40000000, 0x0, 0xaa00000000000000, 0x80fe}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000080)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc85a2b1496c0c48000302080a2f858ad2c4aa412d", 0x48}], 0x1}, 0x0) 12:49:56 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) sendmsg$kcm(r1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f00000004c0)='./file0\x00'}, 0x10) close(0xffffffffffffffff) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x80001) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000340)="c1e4af8e45bd30c8f18ecf3ea375f5fc1390797051f05368815ef79ffcb2d4d0443a3725ef25cbdf36836d8bbc2095042474dedf08447d1215bb216890bee238b85de69d6ed23f06f0c9985ee24b453745c0cba35ae3c5dea0dc5aad1bfa7c51f6c297fbd8a72adeb76905b48161c21b6be9454a0c12833ab2975dd6964fbe2c36c7d87dce4e993bba5b0dc39c76bf495fb2c32d124de801c921fee12b96dc43cb", 0x0}, 0x18) r3 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r3, 0x6, 0x17, &(0x7f0000000040)=r3, 0x4) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={r4, 0x1, 0x1, 0x7ff, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000000), 0x0) recvmsg(r2, &(0x7f0000004fc0)={0x0, 0xfffffffffffffe64, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1f1}], 0x4}, 0x10040) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cpu.stat\x00', 0x0, 0x0) 12:49:56 executing program 5: r0 = socket$kcm(0xa, 0x8000000000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x1ff, 0x5, 0x1, 0x4, 0x0, 0x7019, 0x1000, 0x8, 0x9, 0x103, 0xe7f, 0x51, 0x2, 0x80000000, 0xa4, 0x0, 0x182, 0xfffffffffffffff8, 0x5, 0xb346, 0x5, 0x4, 0x7fffffff, 0x5, 0x89, 0x50, 0x3, 0x6, 0x101, 0x8, 0x1, 0x1, 0x800, 0x8000, 0x162da079, 0x93, 0x0, 0xfffffffffffffffc, 0x6, @perf_config_ext={0x7, 0x8}, 0x2a580, 0x1, 0x3f, 0x3, 0x6, 0x0, 0x8}, 0x0, 0x7, 0xffffffffffffff9c, 0x1) socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000200)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000280)=""/224, 0xe0}, {&(0x7f0000000380)=""/234, 0xea}], 0x2, &(0x7f00000004c0)=""/127, 0x7f}, 0x2000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x5, 0xec92, 0x2, 0x68d9, 0x40, r1, 0x2, [], r2, r3, 0x0, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x40000000, 0x0, 0xaa00000000000000, 0x80fe}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000080)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc85a2b1496c0c48000302080a2f858ad2c4aa412d", 0x48}], 0x1}, 0x0) [ 653.750228][ T24] audit: type=1804 audit(1563194996.387:166): pid=24352 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir217795719/syzkaller.cOOXm9/208/memory.events" dev="sda1" ino=16518 res=1 12:49:56 executing program 2: r0 = socket$kcm(0xa, 0x8000000000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x1ff, 0x5, 0x1, 0x4, 0x0, 0x7019, 0x1000, 0x8, 0x9, 0x103, 0xe7f, 0x51, 0x2, 0x80000000, 0xa4, 0x0, 0x182, 0xfffffffffffffff8, 0x5, 0xb346, 0x5, 0x4, 0x7fffffff, 0x5, 0x89, 0x50, 0x3, 0x6, 0x101, 0x8, 0x1, 0x1, 0x800, 0x8000, 0x162da079, 0x93, 0x0, 0xfffffffffffffffc, 0x6, @perf_config_ext={0x7, 0x8}, 0x2a580, 0x1, 0x3f, 0x3, 0x6, 0x0, 0x8}, 0x0, 0x7, 0xffffffffffffff9c, 0x1) socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000200)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000280)=""/224, 0xe0}, {&(0x7f0000000380)=""/234, 0xea}], 0x2, &(0x7f00000004c0)=""/127, 0x7f}, 0x2000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x5, 0xec92, 0x2, 0x68d9, 0x40, r1, 0x2, [], r2, r3, 0x0, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x40000000, 0x0, 0xaa00000000000000, 0x80fe}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000080)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc85a2b1496c0c48000302080a2f858ad2c4aa412d", 0x48}], 0x1}, 0x0) 12:49:56 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="8aeb00fa18000000000200003c0000005400000072c000000000c43b684501cd239570c9b6030b51d686a9faac4aa17f6b252e4d58855ff260ae268ed79a30383aaadcb3033da94f5d04ec69f2fe834e17714e4aa3855982dfecb7b9da181df572d3b1ff984144c5c7b432b2053b82b6fdd3030924cdefbb61e3b9cd5c7c725881c2f12ef78dbd4d9dcd1fed326ef600827ad4f1ef9e98077af136284a5811942254b8c4f881e98d7c44f7c2032410f2e13cf878da75124fc898eab12fd6c9cffb1b6cf151db50036b73e2eb6438187694f2194c32784bce954f35afcd949e3dfbfecca43930b03ae7a5d7b769059f"], 0x0, 0xef, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 654.077029][T24381] __nla_validate_parse: 1 callbacks suppressed [ 654.077092][T24381] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 654.115391][ C0] net_ratelimit: 3 callbacks suppressed [ 654.115400][ C0] protocol 88fb is buggy, dev hsr_slave_0 12:49:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f00000002c0)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8941, &(0x7f0000000240)=0x1) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 654.115757][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 654.121093][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 654.127360][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:49:56 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0xc}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251}, 0x48) socket$kcm(0xa, 0x0, 0x11) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440), 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) gettid() 12:49:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000100)='pids.max\x00', 0x2, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x41, &(0x7f0000000000)=r1, 0x4) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000040)=@caif=@rfm={0x25, 0x1f, "35b0d04845eddb3bc5582e88086d0216"}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000140)=""/249, 0xf9}], 0x1}, 0x2000) [ 654.195182][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 654.201122][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 654.396868][T24395] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 12:49:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000380)='memory.events\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='\x00', r2}, 0x10) recvmsg(r3, 0x0, 0x10000) close(0xffffffffffffffff) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000001, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xffffffffffffff96) r5 = socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r4, 0x12}, 0x381) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x890b, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r3, 0x29, 0x14, 0x0, 0x0) r6 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r6, 0x0, 0x2, 0x0) r7 = socket$kcm(0x2, 0x3, 0x2) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r9, 0x29, 0x1b, &(0x7f0000000040)=r9, 0x52d) close(r9) 12:49:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000100)='pids.max\x00', 0x2, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x41, &(0x7f0000000000)=r1, 0x4) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000040)=@caif=@rfm={0x25, 0x1f, "35b0d04845eddb3bc5582e88086d0216"}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000140)=""/249, 0xf9}], 0x1}, 0x2000) 12:49:57 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0xc}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251}, 0x48) socket$kcm(0xa, 0x0, 0x11) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440), 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) gettid() [ 654.716877][T24405] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 654.746696][T24405] CPU: 0 PID: 24405 Comm: syz-executor.0 Not tainted 5.2.0+ #40 [ 654.754391][T24405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 654.764460][T24405] Call Trace: [ 654.767768][T24405] dump_stack+0x172/0x1f0 [ 654.772129][T24405] dump_header+0x10f/0xd33 [ 654.776575][T24405] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 654.782405][T24405] ? ___ratelimit+0x60/0x595 [ 654.787022][T24405] ? do_raw_spin_unlock+0x57/0x270 [ 654.792157][T24405] oom_kill_process.cold+0x10/0x15 [ 654.797328][T24405] out_of_memory+0x7f5/0x12e0 [ 654.802035][T24405] ? __sched_text_start+0x8/0x8 [ 654.806918][T24405] ? oom_killer_disable+0x280/0x280 12:49:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f00000002c0)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8941, &(0x7f0000000240)=0x1) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 654.812159][T24405] mem_cgroup_out_of_memory+0x1ca/0x230 [ 654.817732][T24405] ? memcg_event_wake+0x230/0x230 [ 654.822799][T24405] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 654.829353][T24405] ? cgroup_file_notify+0x140/0x1b0 [ 654.834608][T24405] memory_max_write+0x22f/0x390 [ 654.839470][T24405] ? find_held_lock+0x35/0x130 [ 654.839493][T24405] ? mem_cgroup_write+0x360/0x360 [ 654.839509][T24405] ? lock_acquire+0x16f/0x3f0 [ 654.839527][T24405] ? kernfs_fop_write+0x227/0x480 [ 654.839550][T24405] cgroup_file_write+0x241/0x790 [ 654.839572][T24405] ? mem_cgroup_write+0x360/0x360 [ 654.849378][T24405] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 654.849410][T24405] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 654.849427][T24405] kernfs_fop_write+0x2b8/0x480 [ 654.849446][T24405] __vfs_write+0x8a/0x110 [ 654.849460][T24405] ? kernfs_fop_open+0xd80/0xd80 [ 654.849477][T24405] vfs_write+0x20c/0x580 [ 654.849497][T24405] ksys_write+0x14f/0x290 [ 654.849515][T24405] ? __ia32_sys_read+0xb0/0xb0 [ 654.849534][T24405] ? do_syscall_64+0x26/0x680 [ 654.849554][T24405] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 654.849568][T24405] ? do_syscall_64+0x26/0x680 [ 654.849587][T24405] __x64_sys_write+0x73/0xb0 [ 654.849603][T24405] do_syscall_64+0xfd/0x680 [ 654.849623][T24405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 654.849636][T24405] RIP: 0033:0x459819 [ 654.849652][T24405] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 654.849660][T24405] RSP: 002b:00007f4a14597c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 654.849674][T24405] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 654.849682][T24405] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 654.849690][T24405] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 654.849699][T24405] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a145986d4 [ 654.849708][T24405] R13: 00000000004c9774 R14: 00000000004e0ba8 R15: 00000000ffffffff 12:49:57 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) sendmsg$kcm(r1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f00000004c0)='./file0\x00'}, 0x10) close(0xffffffffffffffff) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x80001) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000340)="c1e4af8e45bd30c8f18ecf3ea375f5fc1390797051f05368815ef79ffcb2d4d0443a3725ef25cbdf36836d8bbc2095042474dedf08447d1215bb216890bee238b85de69d6ed23f06f0c9985ee24b453745c0cba35ae3c5dea0dc5aad1bfa7c51f6c297fbd8a72adeb76905b48161c21b6be9454a0c12833ab2975dd6964fbe2c36c7d87dce4e993bba5b0dc39c76bf495fb2c32d124de801c921fee12b96dc43cb", 0x0}, 0x18) r3 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r3, 0x6, 0x17, &(0x7f0000000040)=r3, 0x4) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={r4, 0x1, 0x1, 0x7ff, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000000), 0x0) recvmsg(r2, &(0x7f0000004fc0)={0x0, 0xfffffffffffffe64, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1f1}], 0x4}, 0x10040) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cpu.stat\x00', 0x0, 0x0) [ 654.905374][T24405] memory: usage 7352kB, limit 0kB, failcnt 52914 12:49:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000100)='pids.max\x00', 0x2, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x41, &(0x7f0000000000)=r1, 0x4) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000040)=@caif=@rfm={0x25, 0x1f, "35b0d04845eddb3bc5582e88086d0216"}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000140)=""/249, 0xf9}], 0x1}, 0x2000) [ 655.075200][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 655.081417][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 655.087398][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 655.093210][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 655.124035][T24426] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 12:49:57 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0xc}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251}, 0x48) socket$kcm(0xa, 0x0, 0x11) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440), 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) gettid() [ 655.189240][T24405] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 12:49:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000100)='pids.max\x00', 0x2, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x41, &(0x7f0000000000)=r1, 0x4) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000040)=@caif=@rfm={0x25, 0x1f, "35b0d04845eddb3bc5582e88086d0216"}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000140)=""/249, 0xf9}], 0x1}, 0x2000) [ 655.341724][T24405] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 655.378019][T24405] Memory cgroup stats for /syz0: cache:0KB rss:2204KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2204KB inactive_file:0KB active_file:0KB unevictable:0KB [ 655.435235][T24405] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=24387,uid=0 [ 655.542131][T24405] Memory cgroup out of memory: Killed process 24387 (syz-executor.0) total-vm:72836kB, anon-rss:2200kB, file-rss:35824kB, shmem-rss:0kB [ 655.582780][ T1050] oom_reaper: reaped process 24387 (syz-executor.0), now anon-rss:0kB, file-rss:34864kB, shmem-rss:0kB 12:49:58 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="8aeb00fa18000000000200003c0000005400000072c000000000c43b684501cd239570c9b6030b51d686a9faac4aa17f6b252e4d58855ff260ae268ed79a30383aaadcb3033da94f5d04ec69f2fe834e17714e4aa3855982dfecb7b9da181df572d3b1ff984144c5c7b432b2053b82b6fdd3030924cdefbb61e3b9cd5c7c725881c2f12ef78dbd4d9dcd1fed326ef600827ad4f1ef9e98077af136284a5811942254b8c4f881e98d7c44f7c2032410f2e13cf878da75124fc898eab12fd6c9cffb1b6cf151db50036b73e2eb6438187694f2194c32784bce954f35afcd949e3dfbfecca43930b03ae7a5d7b769059f"], 0x0, 0xef, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) 12:49:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f00000002c0)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8941, &(0x7f0000000240)=0x1) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 12:49:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000380)='memory.events\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='\x00', r2}, 0x10) recvmsg(r3, 0x0, 0x10000) close(0xffffffffffffffff) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000001, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xffffffffffffff96) r5 = socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r4, 0x12}, 0x381) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x890b, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r3, 0x29, 0x14, 0x0, 0x0) r6 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r6, 0x0, 0x2, 0x0) r7 = socket$kcm(0x2, 0x3, 0x2) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r9, 0x29, 0x1b, &(0x7f0000000040)=r9, 0x52d) close(r9) 12:49:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000380)='memory.events\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='\x00', r2}, 0x10) recvmsg(r3, 0x0, 0x10000) close(0xffffffffffffffff) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000001, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xffffffffffffff96) r5 = socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r4, 0x12}, 0x381) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x890b, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r3, 0x29, 0x14, 0x0, 0x0) r6 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r6, 0x0, 0x2, 0x0) r7 = socket$kcm(0x2, 0x3, 0x2) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r9, 0x29, 0x1b, &(0x7f0000000040)=r9, 0x52d) close(r9) 12:49:58 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) sendmsg$kcm(r1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f00000004c0)='./file0\x00'}, 0x10) close(0xffffffffffffffff) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x80001) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000340)="c1e4af8e45bd30c8f18ecf3ea375f5fc1390797051f05368815ef79ffcb2d4d0443a3725ef25cbdf36836d8bbc2095042474dedf08447d1215bb216890bee238b85de69d6ed23f06f0c9985ee24b453745c0cba35ae3c5dea0dc5aad1bfa7c51f6c297fbd8a72adeb76905b48161c21b6be9454a0c12833ab2975dd6964fbe2c36c7d87dce4e993bba5b0dc39c76bf495fb2c32d124de801c921fee12b96dc43cb", 0x0}, 0x18) r3 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r3, 0x6, 0x17, &(0x7f0000000040)=r3, 0x4) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={r4, 0x1, 0x1, 0x7ff, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000000), 0x0) recvmsg(r2, &(0x7f0000004fc0)={0x0, 0xfffffffffffffe64, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1f1}], 0x4}, 0x10040) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cpu.stat\x00', 0x0, 0x0) [ 655.734332][T18778] syz-executor.0 invoked oom-killer: gfp_mask=0x40cd0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 655.782111][T18778] CPU: 0 PID: 18778 Comm: syz-executor.0 Not tainted 5.2.0+ #40 [ 655.789824][T18778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 655.799902][T18778] Call Trace: [ 655.803222][T18778] dump_stack+0x172/0x1f0 [ 655.807569][T18778] dump_header+0x10f/0xd33 [ 655.812005][T18778] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 655.817823][T18778] ? ___ratelimit+0x60/0x595 [ 655.822501][T18778] ? do_raw_spin_unlock+0x57/0x270 [ 655.827643][T18778] oom_kill_process.cold+0x10/0x15 [ 655.832778][T18778] out_of_memory+0x7f5/0x12e0 [ 655.837557][T18778] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 655.843373][T18778] ? oom_killer_disable+0x280/0x280 [ 655.848594][T18778] mem_cgroup_out_of_memory+0x1ca/0x230 [ 655.854160][T18778] ? memcg_event_wake+0x230/0x230 [ 655.854781][T24456] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 655.859213][T18778] ? do_raw_spin_unlock+0x57/0x270 [ 655.859233][T18778] ? _raw_spin_unlock+0x2d/0x50 [ 655.859251][T18778] try_charge+0x1042/0x1410 [ 655.859264][T18778] ? should_fail+0x1de/0x852 [ 655.859286][T18778] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 655.859310][T18778] ? rcu_read_lock_sched_held+0x110/0x130 [ 655.859326][T18778] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 655.859341][T18778] ? ____cache_alloc_node+0x1be/0x1e0 [ 655.859361][T18778] __memcg_kmem_charge_memcg+0x7c/0x130 [ 655.859383][T18778] ? memcg_kmem_put_cache+0xb0/0xb0 [ 655.873837][T18778] ? cache_grow_begin+0x3d6/0x650 [ 655.873857][T18778] ? lockdep_hardirqs_on+0x418/0x5d0 [ 655.873876][T18778] ? trace_hardirqs_on+0x67/0x220 [ 655.873894][T18778] cache_grow_begin+0x402/0x650 [ 655.873916][T18778] ? __cpuset_node_allowed+0x136/0x540 [ 655.946974][T18778] fallback_alloc+0x1fd/0x2d0 [ 655.951686][T18778] ____cache_alloc_node+0x1be/0x1e0 [ 655.956894][T18778] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 655.964574][T18778] kmem_cache_alloc+0x1e8/0x6f0 [ 655.969456][T18778] alloc_inode+0x16f/0x1e0 [ 655.973875][T18778] iget_locked+0x196/0x4a0 [ 655.978302][T18778] kernfs_get_inode+0x4e/0x580 [ 655.983099][T18778] kernfs_iop_lookup+0x1ab/0x230 [ 655.988054][T18778] __lookup_slow+0x279/0x500 [ 655.992668][T18778] ? vfs_unlink+0x620/0x620 [ 655.997192][T18778] lookup_slow+0x58/0x80 [ 656.001470][T18778] path_mountpoint+0x5d2/0x1e60 [ 656.006338][T18778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 656.012628][T18778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 656.018919][T18778] ? path_openat+0x46d0/0x46d0 [ 656.023713][T18778] filename_mountpoint+0x190/0x3c0 [ 656.028848][T18778] ? rwlock_bug.part.0+0x90/0x90 [ 656.033795][T18778] ? filename_parentat.isra.0+0x410/0x410 [ 656.039533][T18778] ? __phys_addr_symbol+0x30/0x70 [ 656.044568][T18778] ? __check_object_size+0x3d/0x42f [ 656.049762][T18778] ? strncpy_from_user+0x2ac/0x380 [ 656.054871][T18778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 656.061121][T18778] ? getname_flags+0x277/0x5b0 [ 656.065903][T18778] user_path_mountpoint_at+0x3a/0x50 [ 656.071200][T18778] ksys_umount+0x167/0xf00 [ 656.075638][T18778] ? down_read_non_owner+0x450/0x450 [ 656.080933][T18778] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 656.087176][T18778] ? __detach_mounts+0x320/0x320 [ 656.092126][T18778] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 656.097598][T18778] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 656.103056][T18778] ? do_syscall_64+0x26/0x680 [ 656.107725][T18778] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 656.113795][T18778] ? do_syscall_64+0x26/0x680 [ 656.118589][T18778] ? lockdep_hardirqs_on+0x418/0x5d0 [ 656.123917][T18778] __x64_sys_umount+0x54/0x80 [ 656.128615][T18778] do_syscall_64+0xfd/0x680 [ 656.133141][T18778] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 656.139082][T18778] RIP: 0033:0x45c247 [ 656.142981][T18778] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 656.162671][T18778] RSP: 002b:00007ffeb585aff8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 656.171090][T18778] RAX: ffffffffffffffda RBX: 000000000009ff30 RCX: 000000000045c247 [ 656.179086][T18778] RDX: 0000000000403470 RSI: 0000000000000002 RDI: 00007ffeb585b0a0 [ 656.187062][T18778] RBP: 00000000000002a6 R08: 0000000000000000 R09: 0000000000000010 [ 656.195047][T18778] R10: 000000000000000a R11: 0000000000000206 R12: 00007ffeb585c130 [ 656.203140][T18778] R13: 000055555697d940 R14: 0000000000000000 R15: 00007ffeb585c130 [ 656.216507][T18778] memory: usage 4896kB, limit 0kB, failcnt 52935 [ 656.223173][T18778] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 12:49:58 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) sendmsg$kcm(r1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f00000004c0)='./file0\x00'}, 0x10) close(0xffffffffffffffff) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x80001) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000340)="c1e4af8e45bd30c8f18ecf3ea375f5fc1390797051f05368815ef79ffcb2d4d0443a3725ef25cbdf36836d8bbc2095042474dedf08447d1215bb216890bee238b85de69d6ed23f06f0c9985ee24b453745c0cba35ae3c5dea0dc5aad1bfa7c51f6c297fbd8a72adeb76905b48161c21b6be9454a0c12833ab2975dd6964fbe2c36c7d87dce4e993bba5b0dc39c76bf495fb2c32d124de801c921fee12b96dc43cb", 0x0}, 0x18) r3 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r3, 0x6, 0x17, &(0x7f0000000040)=r3, 0x4) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={r4, 0x1, 0x1, 0x7ff, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000000), 0x0) recvmsg(r2, &(0x7f0000004fc0)={0x0, 0xfffffffffffffe64, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1f1}], 0x4}, 0x10040) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cpu.stat\x00', 0x0, 0x0) [ 656.231085][T18778] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 656.245407][T18778] Memory cgroup stats for /syz0: cache:0KB rss:52KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:52KB inactive_file:0KB active_file:0KB unevictable:0KB [ 656.266916][T18778] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=18778,uid=0 [ 656.283149][T18778] Memory cgroup out of memory: Killed process 18778 (syz-executor.0) total-vm:72440kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB [ 656.299102][ T1050] oom_reaper: reaped process 18778 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 12:49:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f00000002c0)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8941, &(0x7f0000000240)=0x1) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 656.491663][T24464] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 12:49:59 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) sendmsg$kcm(r1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f00000004c0)='./file0\x00'}, 0x10) close(0xffffffffffffffff) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x80001) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000340)="c1e4af8e45bd30c8f18ecf3ea375f5fc1390797051f05368815ef79ffcb2d4d0443a3725ef25cbdf36836d8bbc2095042474dedf08447d1215bb216890bee238b85de69d6ed23f06f0c9985ee24b453745c0cba35ae3c5dea0dc5aad1bfa7c51f6c297fbd8a72adeb76905b48161c21b6be9454a0c12833ab2975dd6964fbe2c36c7d87dce4e993bba5b0dc39c76bf495fb2c32d124de801c921fee12b96dc43cb", 0x0}, 0x18) r3 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r3, 0x6, 0x17, &(0x7f0000000040)=r3, 0x4) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={r4, 0x1, 0x1, 0x7ff, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000000), 0x0) recvmsg(r2, &(0x7f0000004fc0)={0x0, 0xfffffffffffffe64, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1f1}], 0x4}, 0x10040) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cpu.stat\x00', 0x0, 0x0) 12:49:59 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="8aeb00fa18000000000200003c0000005400000072c000000000c43b684501cd239570c9b6030b51d686a9faac4aa17f6b252e4d58855ff260ae268ed79a30383aaadcb3033da94f5d04ec69f2fe834e17714e4aa3855982dfecb7b9da181df572d3b1ff984144c5c7b432b2053b82b6fdd3030924cdefbb61e3b9cd5c7c725881c2f12ef78dbd4d9dcd1fed326ef600827ad4f1ef9e98077af136284a5811942254b8c4f881e98d7c44f7c2032410f2e13cf878da75124fc898eab12fd6c9cffb1b6cf151db50036b73e2eb6438187694f2194c32784bce954f35afcd949e3dfbfecca43930b03ae7a5d7b769059f"], 0x0, 0xef, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 656.765518][T24476] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 12:49:59 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="8aeb00fa18000000000200003c0000005400000072c000000000c43b684501cd239570c9b6030b51d686a9faac4aa17f6b252e4d58855ff260ae268ed79a30383aaadcb3033da94f5d04ec69f2fe834e17714e4aa3855982dfecb7b9da181df572d3b1ff984144c5c7b432b2053b82b6fdd3030924cdefbb61e3b9cd5c7c725881c2f12ef78dbd4d9dcd1fed326ef600827ad4f1ef9e98077af136284a5811942254b8c4f881e98d7c44f7c2032410f2e13cf878da75124fc898eab12fd6c9cffb1b6cf151db50036b73e2eb6438187694f2194c32784bce954f35afcd949e3dfbfecca43930b03ae7a5d7b769059f"], 0x0, 0xef, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 657.072892][T24473] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 12:49:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000380)='memory.events\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='\x00', r2}, 0x10) recvmsg(r3, 0x0, 0x10000) close(0xffffffffffffffff) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000001, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xffffffffffffff96) r5 = socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r4, 0x12}, 0x381) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x890b, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r3, 0x29, 0x14, 0x0, 0x0) r6 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r6, 0x0, 0x2, 0x0) r7 = socket$kcm(0x2, 0x3, 0x2) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r9, 0x29, 0x1b, &(0x7f0000000040)=r9, 0x52d) close(r9) 12:49:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000380)='memory.events\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='\x00', r2}, 0x10) recvmsg(r3, 0x0, 0x10000) close(0xffffffffffffffff) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000001, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xffffffffffffff96) r5 = socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r4, 0x12}, 0x381) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x890b, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r3, 0x29, 0x14, 0x0, 0x0) r6 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r6, 0x0, 0x2, 0x0) r7 = socket$kcm(0x2, 0x3, 0x2) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r9, 0x29, 0x1b, &(0x7f0000000040)=r9, 0x52d) close(r9) 12:49:59 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="8aeb00fa18000000000200003c0000005400000072c000000000c43b684501cd239570c9b6030b51d686a9faac4aa17f6b252e4d58855ff260ae268ed79a30383aaadcb3033da94f5d04ec69f2fe834e17714e4aa3855982dfecb7b9da181df572d3b1ff984144c5c7b432b2053b82b6fdd3030924cdefbb61e3b9cd5c7c725881c2f12ef78dbd4d9dcd1fed326ef600827ad4f1ef9e98077af136284a5811942254b8c4f881e98d7c44f7c2032410f2e13cf878da75124fc898eab12fd6c9cffb1b6cf151db50036b73e2eb6438187694f2194c32784bce954f35afcd949e3dfbfecca43930b03ae7a5d7b769059f"], 0x0, 0xef, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) 12:49:59 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) sendmsg$kcm(r1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f00000004c0)='./file0\x00'}, 0x10) close(0xffffffffffffffff) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x80001) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000340)="c1e4af8e45bd30c8f18ecf3ea375f5fc1390797051f05368815ef79ffcb2d4d0443a3725ef25cbdf36836d8bbc2095042474dedf08447d1215bb216890bee238b85de69d6ed23f06f0c9985ee24b453745c0cba35ae3c5dea0dc5aad1bfa7c51f6c297fbd8a72adeb76905b48161c21b6be9454a0c12833ab2975dd6964fbe2c36c7d87dce4e993bba5b0dc39c76bf495fb2c32d124de801c921fee12b96dc43cb", 0x0}, 0x18) r3 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r3, 0x6, 0x17, &(0x7f0000000040)=r3, 0x4) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={r4, 0x1, 0x1, 0x7ff, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000000), 0x0) recvmsg(r2, &(0x7f0000004fc0)={0x0, 0xfffffffffffffe64, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1f1}], 0x4}, 0x10040) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cpu.stat\x00', 0x0, 0x0) [ 657.291603][T24476] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 657.344776][T24476] CPU: 0 PID: 24476 Comm: syz-executor.5 Not tainted 5.2.0+ #40 [ 657.352490][T24476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 657.362559][T24476] Call Trace: [ 657.365874][T24476] dump_stack+0x172/0x1f0 [ 657.370222][T24476] dump_header+0x10f/0xd33 [ 657.374693][T24476] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 657.380652][T24476] ? ___ratelimit+0x60/0x595 [ 657.385363][T24476] ? do_raw_spin_unlock+0x57/0x270 [ 657.390509][T24476] oom_kill_process.cold+0x10/0x15 [ 657.395653][T24476] out_of_memory+0x7f5/0x12e0 [ 657.400355][T24476] ? retint_kernel+0x2b/0x2b [ 657.405065][T24476] ? oom_killer_disable+0x280/0x280 [ 657.410317][T24476] mem_cgroup_out_of_memory+0x1ca/0x230 [ 657.415896][T24476] ? memcg_event_wake+0x230/0x230 [ 657.420959][T24476] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 657.426793][T24476] ? cgroup_file_notify+0x140/0x1b0 [ 657.432019][T24476] memory_max_write+0x22f/0x390 [ 657.436899][T24476] ? mem_cgroup_write+0x360/0x360 [ 657.441940][T24476] ? lock_acquire+0x1ea/0x3f0 [ 657.446675][T24476] cgroup_file_write+0x241/0x790 [ 657.451659][T24476] ? mem_cgroup_write+0x360/0x360 [ 657.456719][T24476] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 657.462567][T24476] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 657.468227][T24476] kernfs_fop_write+0x2b8/0x480 [ 657.473130][T24476] __vfs_write+0x8a/0x110 [ 657.477485][T24476] ? kernfs_fop_open+0xd80/0xd80 [ 657.482463][T24476] vfs_write+0x20c/0x580 [ 657.486827][T24476] ksys_write+0x14f/0x290 [ 657.491200][T24476] ? __ia32_sys_read+0xb0/0xb0 [ 657.496000][T24476] __x64_sys_write+0x73/0xb0 [ 657.500641][T24476] do_syscall_64+0xfd/0x680 [ 657.505172][T24476] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 657.511188][T24476] RIP: 0033:0x459819 [ 657.515099][T24476] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 657.534889][T24476] RSP: 002b:00007f673f085c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 657.543323][T24476] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 657.551312][T24476] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 657.559424][T24476] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 657.567428][T24476] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f673f0866d4 [ 657.575415][T24476] R13: 00000000004c9774 R14: 00000000004e0ba8 R15: 00000000ffffffff [ 657.762432][T24476] memory: usage 6684kB, limit 0kB, failcnt 42 [ 657.801308][T24476] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 657.823539][T24486] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 657.824602][T24476] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 657.855279][T24476] Memory cgroup stats for /syz5: cache:0KB rss:2204KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2204KB inactive_file:0KB active_file:0KB unevictable:0KB 12:50:00 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000003fc) sendmsg$kcm(r1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f00000004c0)='./file0\x00'}, 0x10) close(0xffffffffffffffff) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x80001) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000340)="c1e4af8e45bd30c8f18ecf3ea375f5fc1390797051f05368815ef79ffcb2d4d0443a3725ef25cbdf36836d8bbc2095042474dedf08447d1215bb216890bee238b85de69d6ed23f06f0c9985ee24b453745c0cba35ae3c5dea0dc5aad1bfa7c51f6c297fbd8a72adeb76905b48161c21b6be9454a0c12833ab2975dd6964fbe2c36c7d87dce4e993bba5b0dc39c76bf495fb2c32d124de801c921fee12b96dc43cb", 0x0}, 0x18) r3 = socket$kcm(0x2b, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r3, 0x6, 0x17, &(0x7f0000000040)=r3, 0x4) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={r4, 0x1, 0x1, 0x7ff, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000000), 0x0) recvmsg(r2, &(0x7f0000004fc0)={0x0, 0xfffffffffffffe64, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1f1}], 0x4}, 0x10040) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cpu.stat\x00', 0x0, 0x0) [ 657.983956][T24476] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=24475,uid=0 [ 658.016839][T24476] Memory cgroup out of memory: Killed process 24476 (syz-executor.5) total-vm:72572kB, anon-rss:2204kB, file-rss:35904kB, shmem-rss:0kB 12:50:00 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="8aeb00fa18000000000200003c0000005400000072c000000000c43b684501cd239570c9b6030b51d686a9faac4aa17f6b252e4d58855ff260ae268ed79a30383aaadcb3033da94f5d04ec69f2fe834e17714e4aa3855982dfecb7b9da181df572d3b1ff984144c5c7b432b2053b82b6fdd3030924cdefbb61e3b9cd5c7c725881c2f12ef78dbd4d9dcd1fed326ef600827ad4f1ef9e98077af136284a5811942254b8c4f881e98d7c44f7c2032410f2e13cf878da75124fc898eab12fd6c9cffb1b6cf151db50036b73e2eb6438187694f2194c32784bce954f35afcd949e3dfbfecca43930b03ae7a5d7b769059f"], 0x0, 0xef, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 658.043580][ T1050] oom_reaper: reaped process 24476 (syz-executor.5), now anon-rss:0kB, file-rss:34944kB, shmem-rss:0kB [ 658.134977][T21822] syz-executor.5 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 658.161587][T21822] CPU: 1 PID: 21822 Comm: syz-executor.5 Not tainted 5.2.0+ #40 [ 658.169289][T21822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 658.179359][T21822] Call Trace: [ 658.179391][T21822] dump_stack+0x172/0x1f0 [ 658.179411][T21822] dump_header+0x10f/0xd33 [ 658.179429][T21822] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 658.179442][T21822] ? ___ratelimit+0x60/0x595 [ 658.179460][T21822] ? do_raw_spin_unlock+0x57/0x270 [ 658.179483][T21822] oom_kill_process.cold+0x10/0x15 [ 658.179498][T21822] out_of_memory+0x7f5/0x12e0 [ 658.187337][T21822] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 658.187355][T21822] ? oom_killer_disable+0x280/0x280 [ 658.187382][T21822] mem_cgroup_out_of_memory+0x1ca/0x230 [ 658.187396][T21822] ? memcg_event_wake+0x230/0x230 [ 658.187415][T21822] ? do_raw_spin_unlock+0x57/0x270 [ 658.187435][T21822] ? _raw_spin_unlock+0x2d/0x50 [ 658.187460][T21822] try_charge+0x1042/0x1410 [ 658.212734][T21822] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 658.212763][T21822] ? rcu_read_lock_sched_held+0x110/0x130 [ 658.238998][T21822] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 658.239015][T21822] ? ____cache_alloc_node+0x1be/0x1e0 [ 658.239037][T21822] __memcg_kmem_charge_memcg+0x7c/0x130 12:50:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000380)='memory.events\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='\x00', r2}, 0x10) recvmsg(r3, 0x0, 0x10000) close(0xffffffffffffffff) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000001, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xffffffffffffff96) r5 = socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r4, 0x12}, 0x381) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x890b, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r3, 0x29, 0x14, 0x0, 0x0) r6 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r6, 0x0, 0x2, 0x0) r7 = socket$kcm(0x2, 0x3, 0x2) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r9, 0x29, 0x1b, &(0x7f0000000040)=r9, 0x52d) close(r9) 12:50:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000380)='memory.events\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='\x00', r2}, 0x10) recvmsg(r3, 0x0, 0x10000) close(0xffffffffffffffff) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000001, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xffffffffffffff96) r5 = socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r4, 0x12}, 0x381) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x890b, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000080), 0x301) setsockopt$sock_attach_bpf(r3, 0x29, 0x14, 0x0, 0x0) r6 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r6, 0x0, 0x2, 0x0) r7 = socket$kcm(0x2, 0x3, 0x2) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r9, 0x29, 0x1b, &(0x7f0000000040)=r9, 0x52d) close(r9) [ 658.259028][T21822] ? memcg_kmem_put_cache+0xb0/0xb0 [ 658.259042][T21822] ? cache_grow_begin+0x3d6/0x650 [ 658.259057][T21822] ? lockdep_hardirqs_on+0x418/0x5d0 [ 658.259073][T21822] ? trace_hardirqs_on+0x67/0x220 [ 658.259089][T21822] cache_grow_begin+0x402/0x650 [ 658.259104][T21822] ? __cpuset_node_allowed+0x136/0x540 [ 658.259121][T21822] fallback_alloc+0x1fd/0x2d0 [ 658.259142][T21822] ____cache_alloc_node+0x1be/0x1e0 [ 658.259157][T21822] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 658.259175][T21822] kmem_cache_alloc_node+0xe3/0x710 [ 658.259188][T21822] ? lockdep_hardirqs_on+0x418/0x5d0 [ 658.259204][T21822] ? trace_hardirqs_on+0x67/0x220 [ 658.259227][T21822] copy_process+0x46d0/0x6b00 [ 658.259246][T21822] ? __lock_acquire+0x537/0x4af0 [ 658.259263][T21822] ? _raw_spin_unlock+0x2d/0x50 [ 658.259293][T21822] ? __cleanup_sighand+0x60/0x60 [ 658.270605][T21822] ? find_held_lock+0x35/0x130 [ 658.281517][T21822] _do_fork+0x146/0xf70 [ 658.281538][T21822] ? copy_init_mm+0x20/0x20 [ 658.281560][T21822] ? kasan_check_read+0x11/0x20 [ 658.291779][T21822] ? _copy_to_user+0xc9/0x120 [ 658.291802][T21822] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 658.291818][T21822] ? put_timespec64+0xda/0x140 [ 658.291842][T21822] __x64_sys_clone+0x186/0x250 [ 658.397553][T21822] ? __ia32_sys_vfork+0xc0/0xc0 [ 658.397577][T21822] ? lockdep_hardirqs_on+0x418/0x5d0 [ 658.397594][T21822] ? trace_hardirqs_on+0x67/0x220 [ 658.397614][T21822] do_syscall_64+0xfd/0x680 [ 658.397639][T21822] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 658.407256][T21822] RIP: 0033:0x457dea [ 658.407271][T21822] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 658.407278][T21822] RSP: 002b:00007fffda01ab90 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 658.407291][T21822] RAX: ffffffffffffffda RBX: 00007fffda01ab90 RCX: 0000000000457dea [ 658.407299][T21822] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 658.407308][T21822] RBP: 00007fffda01abd0 R08: 0000000000000001 R09: 000055555667f940 [ 658.407316][T21822] R10: 000055555667fc10 R11: 0000000000000246 R12: 0000000000000001 [ 658.407324][T21822] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fffda01ac20 [ 658.409601][T21822] memory: usage 4332kB, limit 0kB, failcnt 54 [ 658.455688][T21822] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 658.566647][T21822] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 658.590142][T21822] Memory cgroup stats for /syz5: cache:0KB rss:64KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:64KB inactive_file:0KB active_file:0KB unevictable:0KB [ 658.611292][T21822] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=21822,uid=0 [ 658.627420][T21822] Memory cgroup out of memory: Killed process 21822 (syz-executor.5) total-vm:72440kB, anon-rss:112kB, file-rss:35776kB, shmem-rss:0kB [ 658.642737][ T1050] oom_reaper: reaped process 21822 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 658.673315][T24498] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 12:50:01 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="8aeb00fa18000000000200003c0000005400000072c000000000c43b684501cd239570c9b6030b51d686a9faac4aa17f6b252e4d58855ff260ae268ed79a30383aaadcb3033da94f5d04ec69f2fe834e17714e4aa3855982dfecb7b9da181df572d3b1ff984144c5c7b432b2053b82b6fdd3030924cdefbb61e3b9cd5c7c725881c2f12ef78dbd4d9dcd1fed326ef600827ad4f1ef9e98077af136284a5811942254b8c4f881e98d7c44f7c2032410f2e13cf878da75124fc898eab12fd6c9cffb1b6cf151db50036b73e2eb6438187694f2194c32784bce954f35afcd949e3dfbfecca43930b03ae7a5d7b769059f"], 0x0, 0xef, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 658.813743][T24517] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 658.992056][T24519] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 659.019670][T24519] CPU: 1 PID: 24519 Comm: syz-executor.1 Not tainted 5.2.0+ #40 [ 659.027357][T24519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 659.037424][T24519] Call Trace: [ 659.040742][T24519] dump_stack+0x172/0x1f0 [ 659.045102][T24519] dump_header+0x10f/0xd33 [ 659.049664][T24519] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 659.055596][T24519] ? ___ratelimit+0x60/0x595 [ 659.060232][T24519] ? do_raw_spin_unlock+0x57/0x270 [ 659.065468][T24519] oom_kill_process.cold+0x10/0x15 [ 659.070611][T24519] out_of_memory+0x7f5/0x12e0 [ 659.075319][T24519] ? __sched_text_start+0x8/0x8 [ 659.080220][T24519] ? oom_killer_disable+0x280/0x280 [ 659.085570][T24519] mem_cgroup_out_of_memory+0x1ca/0x230 [ 659.091320][T24519] ? memcg_event_wake+0x230/0x230 [ 659.097415][T24519] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 659.103279][T24519] ? cgroup_file_notify+0x140/0x1b0 [ 659.108864][T24519] memory_max_write+0x22f/0x390 [ 659.113837][T24519] ? find_held_lock+0x35/0x130 [ 659.118629][T24519] ? mem_cgroup_write+0x360/0x360 [ 659.123699][T24519] ? lock_acquire+0x16f/0x3f0 [ 659.128410][T24519] ? kernfs_fop_write+0x227/0x480 [ 659.133476][T24519] cgroup_file_write+0x241/0x790 [ 659.138453][T24519] ? mem_cgroup_write+0x360/0x360 [ 659.143767][T24519] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 659.149432][T24519] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 659.155137][T24519] kernfs_fop_write+0x2b8/0x480 [ 659.160024][T24519] __vfs_write+0x8a/0x110 [ 659.165071][T24519] ? kernfs_fop_open+0xd80/0xd80 [ 659.170041][T24519] vfs_write+0x20c/0x580 [ 659.174316][T24519] ksys_write+0x14f/0x290 [ 659.178761][T24519] ? __ia32_sys_read+0xb0/0xb0 [ 659.183539][T24519] ? do_syscall_64+0x26/0x680 [ 659.188216][T24519] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 659.194282][T24519] ? do_syscall_64+0x26/0x680 [ 659.199128][T24519] __x64_sys_write+0x73/0xb0 [ 659.203725][T24519] do_syscall_64+0xfd/0x680 [ 659.208239][T24519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 659.214129][T24519] RIP: 0033:0x459819 [ 659.218049][T24519] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 659.237758][T24519] RSP: 002b:00007fcec3852c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 659.246165][T24519] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 659.254238][T24519] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 659.263443][T24519] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 659.272290][T24519] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcec38536d4 [ 659.280288][T24519] R13: 00000000004c9774 R14: 00000000004e0ba8 R15: 00000000ffffffff [ 659.293905][T24519] memory: usage 8380kB, limit 0kB, failcnt 55253 [ 659.305139][T24519] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 659.312836][T24519] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 659.325220][T24519] Memory cgroup stats for /syz1: cache:16KB rss:2216KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2216KB inactive_file:4KB active_file:12KB unevictable:0KB [ 659.347107][T24519] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=24516,uid=0 [ 659.368044][T24519] Memory cgroup out of memory: Killed process 24516 (syz-executor.1) total-vm:72704kB, anon-rss:2204kB, file-rss:35848kB, shmem-rss:0kB [ 659.369747][ T1050] oom_reaper: reaped process 24516 (syz-executor.1), now anon-rss:0kB, file-rss:34916kB, shmem-rss:0kB 12:50:02 executing program 4: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20}) r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x72, &(0x7f0000000080), 0xc) 12:50:02 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="8aeb00fa18000000000200003c0000005400000072c000000000c43b684501cd239570c9b6030b51d686a9faac4aa17f6b252e4d58855ff260ae268ed79a30383aaadcb3033da94f5d04ec69f2fe834e17714e4aa3855982dfecb7b9da181df572d3b1ff984144c5c7b432b2053b82b6fdd3030924cdefbb61e3b9cd5c7c725881c2f12ef78dbd4d9dcd1fed326ef600827ad4f1ef9e98077af136284a5811942254b8c4f881e98d7c44f7c2032410f2e13cf878da75124fc898eab12fd6c9cffb1b6cf151db50036b73e2eb6438187694f2194c32784bce954f35afcd949e3dfbfecca43930b03ae7a5d7b769059f"], 0x0, 0xef, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 659.496097][T14197] syz-executor.1 invoked oom-killer: gfp_mask=0x40cd0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 659.512252][T14197] CPU: 0 PID: 14197 Comm: syz-executor.1 Not tainted 5.2.0+ #40 [ 659.519943][T14197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 659.530019][T14197] Call Trace: [ 659.533327][T14197] dump_stack+0x172/0x1f0 [ 659.537714][T14197] dump_header+0x10f/0xd33 [ 659.542182][T14197] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 659.548050][T14197] ? ___ratelimit+0x60/0x595 [ 659.552651][T14197] ? do_raw_spin_unlock+0x57/0x270 [ 659.558076][T14197] oom_kill_process.cold+0x10/0x15 [ 659.563216][T14197] out_of_memory+0x7f5/0x12e0 [ 659.567918][T14197] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 659.573767][T14197] ? oom_killer_disable+0x280/0x280 [ 659.579031][T14197] mem_cgroup_out_of_memory+0x1ca/0x230 [ 659.584579][T14197] ? memcg_event_wake+0x230/0x230 [ 659.589620][T14197] ? do_raw_spin_unlock+0x57/0x270 [ 659.594743][T14197] ? _raw_spin_unlock+0x2d/0x50 [ 659.599618][T14197] try_charge+0x1042/0x1410 [ 659.604139][T14197] ? should_fail+0x1de/0x852 [ 659.608760][T14197] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 659.614328][T14197] ? rcu_read_lock_sched_held+0x110/0x130 [ 659.620076][T14197] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 659.625642][T14197] ? ____cache_alloc_node+0x1be/0x1e0 [ 659.631018][T14197] __memcg_kmem_charge_memcg+0x7c/0x130 [ 659.636592][T14197] ? memcg_kmem_put_cache+0xb0/0xb0 [ 659.641793][T14197] ? cache_grow_begin+0x3d6/0x650 [ 659.646908][T14197] ? lockdep_hardirqs_on+0x418/0x5d0 [ 659.652215][T14197] ? trace_hardirqs_on+0x67/0x220 [ 659.657241][T14197] cache_grow_begin+0x402/0x650 [ 659.662109][T14197] ? __cpuset_node_allowed+0x136/0x540 [ 659.667567][T14197] fallback_alloc+0x1fd/0x2d0 [ 659.672250][T14197] ____cache_alloc_node+0x1be/0x1e0 [ 659.677453][T14197] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 659.683698][T14197] kmem_cache_alloc+0x1e8/0x6f0 [ 659.688556][T14197] __d_alloc+0x2e/0x8c0 [ 659.692713][T14197] d_alloc+0x4d/0x280 [ 659.696697][T14197] d_alloc_parallel+0xf4/0x1bb0 [ 659.701546][T14197] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 659.707824][T14197] ? lookup_fast+0x56c/0x11a0 [ 659.712515][T14197] ? __d_lookup_rcu+0x6b0/0x6b0 [ 659.717393][T14197] ? __lock_acquire+0x537/0x4af0 [ 659.722405][T14197] ? __lock_acquire+0x537/0x4af0 [ 659.727387][T14197] ? lockdep_init_map+0x1be/0x6d0 [ 659.732428][T14197] ? lockdep_init_map+0x1be/0x6d0 [ 659.737502][T14197] __lookup_slow+0x1ab/0x500 [ 659.742123][T14197] ? vfs_unlink+0x620/0x620 [ 659.746643][T14197] lookup_slow+0x58/0x80 [ 659.750951][T14197] path_mountpoint+0x5d2/0x1e60 [ 659.755868][T14197] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 659.762249][T14197] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 659.768610][T14197] ? path_openat+0x46d0/0x46d0 [ 659.773373][T14197] filename_mountpoint+0x190/0x3c0 [ 659.778483][T14197] ? rwlock_bug.part.0+0x90/0x90 [ 659.783419][T14197] ? filename_parentat.isra.0+0x410/0x410 [ 659.789142][T14197] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 659.795412][T14197] ? __phys_addr_symbol+0x30/0x70 [ 659.800491][T14197] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 659.806212][T14197] ? __check_object_size+0x3d/0x42f [ 659.811606][T14197] ? strncpy_from_user+0x2ac/0x380 [ 659.816762][T14197] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 659.823023][T14197] ? getname_flags+0x277/0x5b0 [ 659.827787][T14197] user_path_mountpoint_at+0x3a/0x50 [ 659.833089][T14197] ksys_umount+0x167/0xf00 [ 659.837501][T14197] ? __ia32_sys_rmdir+0x40/0x40 [ 659.842563][T14197] ? __detach_mounts+0x320/0x320 [ 659.847853][T14197] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 659.854185][T14197] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 659.859657][T14197] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 659.865144][T14197] ? do_syscall_64+0x26/0x680 [ 659.869859][T14197] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 659.875932][T14197] ? do_syscall_64+0x26/0x680 [ 659.880632][T14197] ? lockdep_hardirqs_on+0x418/0x5d0 [ 659.885920][T14197] __x64_sys_umount+0x54/0x80 [ 659.890643][T14197] do_syscall_64+0xfd/0x680 [ 659.895160][T14197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 659.901073][T14197] RIP: 0033:0x45c247 [ 659.905311][T14197] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 659.924914][T14197] RSP: 002b:00007ffdfcee6858 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 659.933343][T14197] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c247 12:50:02 executing program 4: socket$kcm(0x10, 0x2, 0x4) socket$kcm(0xa, 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x8f84, 'memory'}]}, 0xfdef) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 659.941313][T14197] RDX: 0000000000403470 RSI: 0000000000000002 RDI: 00007ffdfcee6900 [ 659.949479][T14197] RBP: 00000000000004b6 R08: 0000000000000000 R09: 000000000000000b [ 659.962690][T14197] R10: 0000000000000005 R11: 0000000000000206 R12: 00007ffdfcee7990 [ 659.970674][T14197] R13: 0000555556126940 R14: 0000000000000000 R15: 00007ffdfcee7990 [ 659.979826][T14197] memory: usage 5940kB, limit 0kB, failcnt 55269 12:50:02 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="8aeb00fa18000000000200003c0000005400000072c000000000c43b684501cd239570c9b6030b51d686a9faac4aa17f6b252e4d58855ff260ae268ed79a30383aaadcb3033da94f5d04ec69f2fe834e17714e4aa3855982dfecb7b9da181df572d3b1ff984144c5c7b432b2053b82b6fdd3030924cdefbb61e3b9cd5c7c725881c2f12ef78dbd4d9dcd1fed326ef600827ad4f1ef9e98077af136284a5811942254b8c4f881e98d7c44f7c2032410f2e13cf878da75124fc898eab12fd6c9cffb1b6cf151db50036b73e2eb6438187694f2194c32784bce954f35afcd949e3dfbfecca43930b03ae7a5d7b769059f"], 0x0, 0xef, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) [ 660.010861][T24520] IPVS: ftp: loaded support on port[0] = 21 [ 660.034638][T14197] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 660.053856][T14197] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 12:50:02 executing program 3: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x4951604f1a584337) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x80, 0x0) r2 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001b40)='cgroup.type\x00', 0x2, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) close(r2) socketpair(0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) recvmsg(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) [ 660.069830][T14197] Memory cgroup stats for /syz1: cache:8KB rss:64KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:64KB inactive_file:4KB active_file:4KB unevictable:0KB [ 660.188386][T14197] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=14197,uid=0 [ 660.254257][T14197] Memory cgroup out of memory: Killed process 14197 (syz-executor.1) total-vm:72440kB, anon-rss:112kB, file-rss:35776kB, shmem-rss:0kB [ 660.354523][ T1050] oom_reaper: reaped process 14197 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 660.570209][ T24] audit: type=1804 audit(1563195003.207:167): pid=24535 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir033619619/syzkaller.sqXtXm/395/memory.events" dev="sda1" ino=16513 res=1 [ 660.622196][ T24] audit: type=1800 audit(1563195003.207:168): pid=24535 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16513 res=0 [ 660.816921][ T24] audit: type=1804 audit(1563195003.457:169): pid=24531 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir033619619/syzkaller.sqXtXm/395/memory.events" dev="sda1" ino=16513 res=1 [ 660.843934][ T24] audit: type=1800 audit(1563195003.477:170): pid=24531 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16513 res=0 [ 661.060898][T24520] chnl_net:caif_netlink_parms(): no params data found [ 661.092250][T24520] bridge0: port 1(bridge_slave_0) entered blocking state [ 661.099832][T24520] bridge0: port 1(bridge_slave_0) entered disabled state [ 661.107937][T24520] device bridge_slave_0 entered promiscuous mode [ 661.179664][T24520] bridge0: port 2(bridge_slave_1) entered blocking state [ 661.187017][T24520] bridge0: port 2(bridge_slave_1) entered disabled state [ 661.194969][T24520] device bridge_slave_1 entered promiscuous mode [ 661.211930][T24520] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 661.271470][T24520] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 661.291940][T24520] team0: Port device team_slave_0 added [ 661.299279][T24520] team0: Port device team_slave_1 added [ 661.429365][T24520] device hsr_slave_0 entered promiscuous mode [ 661.485707][T24520] device hsr_slave_1 entered promiscuous mode [ 661.603727][T24520] bridge0: port 2(bridge_slave_1) entered blocking state [ 661.610939][T24520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 661.618400][T24520] bridge0: port 1(bridge_slave_0) entered blocking state [ 661.625568][T24520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 661.703958][T24520] 8021q: adding VLAN 0 to HW filter on device bond0 [ 661.722623][ T9506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 661.731625][ T9506] bridge0: port 1(bridge_slave_0) entered disabled state [ 661.740834][ T9506] bridge0: port 2(bridge_slave_1) entered disabled state [ 661.754812][T24520] 8021q: adding VLAN 0 to HW filter on device team0 [ 661.854223][ T9507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 661.863599][ T9507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 661.872477][ T9507] bridge0: port 1(bridge_slave_0) entered blocking state [ 661.879707][ T9507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 661.891506][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 661.900370][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 661.909072][ T8865] bridge0: port 2(bridge_slave_1) entered blocking state [ 661.916217][ T8865] bridge0: port 2(bridge_slave_1) entered forwarding state [ 661.987259][ T9507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 661.997173][ T9507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 662.019784][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 662.029317][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 662.038375][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 662.047307][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 662.056610][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 662.065275][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 662.073683][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 662.082642][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 662.091301][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 662.102930][T24520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 662.176692][T24520] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 662.342347][T24547] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 662.502090][T24547] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 662.513332][T24547] CPU: 0 PID: 24547 Comm: syz-executor.0 Not tainted 5.2.0+ #40 [ 662.522002][T24547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 662.532062][T24547] Call Trace: [ 662.535372][T24547] dump_stack+0x172/0x1f0 [ 662.539702][T24547] dump_header+0x10f/0xd33 [ 662.544144][T24547] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 662.549978][T24547] ? ___ratelimit+0x60/0x595 [ 662.554581][T24547] ? do_raw_spin_unlock+0x57/0x270 [ 662.559700][T24547] oom_kill_process.cold+0x10/0x15 [ 662.564825][T24547] out_of_memory+0x7f5/0x12e0 [ 662.569524][T24547] ? retint_kernel+0x2b/0x2b [ 662.574942][T24547] ? oom_killer_disable+0x280/0x280 [ 662.580289][T24547] mem_cgroup_out_of_memory+0x1ca/0x230 [ 662.585964][T24547] ? memcg_event_wake+0x230/0x230 [ 662.591035][T24547] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 662.596872][T24547] ? cgroup_file_notify+0x140/0x1b0 [ 662.602371][T24547] memory_max_write+0x22f/0x390 [ 662.607713][T24547] ? __this_cpu_preempt_check+0x3a/0x210 [ 662.613477][T24547] ? mem_cgroup_write+0x360/0x360 [ 662.619085][T24547] ? cgroup_file_write+0x86/0x790 [ 662.624118][T24547] cgroup_file_write+0x241/0x790 [ 662.629938][T24547] ? mem_cgroup_write+0x360/0x360 [ 662.635149][T24547] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 662.640827][T24547] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 662.646564][T24547] kernfs_fop_write+0x2b8/0x480 [ 662.651441][T24547] __vfs_write+0x8a/0x110 [ 662.655802][T24547] ? kernfs_fop_open+0xd80/0xd80 [ 662.660776][T24547] vfs_write+0x20c/0x580 [ 662.665024][T24547] ksys_write+0x14f/0x290 [ 662.669409][T24547] ? __ia32_sys_read+0xb0/0xb0 [ 662.674217][T24547] __x64_sys_write+0x73/0xb0 [ 662.678940][T24547] ? do_syscall_64+0x5b/0x680 [ 662.683745][T24547] do_syscall_64+0xfd/0x680 [ 662.688291][T24547] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.694194][T24547] RIP: 0033:0x459819 [ 662.698096][T24547] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 662.717785][T24547] RSP: 002b:00007f10fdd11c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 662.726295][T24547] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 662.734298][T24547] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 662.742267][T24547] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 662.750245][T24547] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f10fdd126d4 [ 662.758259][T24547] R13: 00000000004c9774 R14: 00000000004e0ba8 R15: 00000000ffffffff [ 662.775566][T24547] memory: usage 7116kB, limit 0kB, failcnt 52936 [ 662.782276][T24547] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 662.795917][T24547] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 662.803166][T24547] Memory cgroup stats for /syz0: cache:0KB rss:2168KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2148KB inactive_file:0KB active_file:0KB unevictable:0KB [ 662.827086][T24547] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=24545,uid=0 [ 662.845164][T24547] Memory cgroup out of memory: Killed process 24545 (syz-executor.0) total-vm:72576kB, anon-rss:2184kB, file-rss:35848kB, shmem-rss:0kB [ 662.872311][ T1050] oom_reaper: reaped process 24545 (syz-executor.0), now anon-rss:0kB, file-rss:34916kB, shmem-rss:0kB 12:50:05 executing program 0: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x4951604f1a584337) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x80, 0x0) r2 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001b40)='cgroup.type\x00', 0x2, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) close(r2) socketpair(0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) recvmsg(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 12:50:05 executing program 2: r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f00000015c0)={&(0x7f00000000c0)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x24}}, 0x80, 0x0}, 0x20048080) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @remote}, 0xf, 0x0}, 0x0) 12:50:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) getpid() write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x60e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x336) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x7, 0x20, 0x1000}]}) write$cgroup_int(r1, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x3) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) unlink(&(0x7f0000000140)='./file0\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0xc0002, 0x5, 0x9, 0x4a, 0x0, 0x0, 0x0, 0x5, 0x3, 0x2, 0x40, 0x5d60, 0x80000000, 0x80000001, 0x9, 0x5, 0x1, 0x4, 0x10001, 0x6, 0x90, 0xff, 0xbc6, 0x7, 0x10000, 0x7, 0x270, 0x0, 0xfffffffffffffffa, 0x80000000, 0x0, 0x4, 0x4, @perf_bp={0x0, 0x5}, 0x6000, 0x4, 0x0, 0x7, 0xff, 0x221, 0x3}) 12:50:05 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r3, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x99) r5 = gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="8aeb00fa18000000000200003c0000005400000072c000000000c43b684501cd239570c9b6030b51d686a9faac4aa17f6b252e4d58855ff260ae268ed79a30383aaadcb3033da94f5d04ec69f2fe834e17714e4aa3855982dfecb7b9da181df572d3b1ff984144c5c7b432b2053b82b6fdd3030924cdefbb61e3b9cd5c7c725881c2f12ef78dbd4d9dcd1fed326ef600827ad4f1ef9e98077af136284a5811942254b8c4f881e98d7c44f7c2032410f2e13cf878da75124fc898eab12fd6c9cffb1b6cf151db50036b73e2eb6438187694f2194c32784bce954f35afcd949e3dfbfecca43930b03ae7a5d7b769059f"], 0x0, 0xef, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0xcc, 0x8000, 0x3, 0x0, 0x3f, 0x4, 0xc, 0x8, 0xfffffffffffffffe, 0x607fa06b, 0x0, 0x9, 0xeced, 0x5, 0x3, 0x1, 0xfffffffffffffffa, 0x9, 0xc62, 0x7f, 0xfff, 0x8, 0x1b, 0xfffffffffffffffd, 0x800, 0x5, 0x3ff, 0xd680, 0x1ff, 0x2, 0xfffffffffffffc36, 0xae2, 0x8, 0x7, 0x7fffffff, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x4004, 0x3, 0x9, 0x9, 0x6, 0x7, 0xfffffffffffeffff}, 0x0, 0xa, r2, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r6, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r7, 0x100000001, 0x8}, 0xc) r8 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff97) gettid() perf_event_open(0x0, r5, 0x3, r1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) 12:50:05 executing program 3: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x4951604f1a584337) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x80, 0x0) r2 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001b40)='cgroup.type\x00', 0x2, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) close(r2) socketpair(0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) recvmsg(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 12:50:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x1b0001}, [@ldst={0xffffffbd, 0x0, 0x0, 0x2}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195}, 0x48) [ 663.121842][T24520] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 663.179742][T24520] CPU: 1 PID: 24520 Comm: syz-executor.0 Not tainted 5.2.0+ #40 [ 663.187429][T24520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.197554][T24520] Call Trace: [ 663.200876][T24520] dump_stack+0x172/0x1f0 [ 663.205234][T24520] dump_header+0x10f/0xd33 [ 663.209676][T24520] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 663.215501][T24520] ? ___ratelimit+0x60/0x595 [ 663.220130][T24520] ? do_raw_spin_unlock+0x57/0x270 [ 663.225267][T24520] oom_kill_process.cold+0x10/0x15 [ 663.230402][T24520] out_of_memory+0x7f5/0x12e0 [ 663.235099][T24520] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 663.241023][T24520] ? oom_killer_disable+0x280/0x280 [ 663.246261][T24520] mem_cgroup_out_of_memory+0x1ca/0x230 [ 663.251835][T24520] ? memcg_event_wake+0x230/0x230 [ 663.256931][T24520] ? do_raw_spin_unlock+0x57/0x270 [ 663.262114][T24520] ? _raw_spin_unlock+0x2d/0x50 [ 663.266990][T24520] try_charge+0x1042/0x1410 [ 663.271526][T24520] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 663.277099][T24520] ? percpu_ref_tryget_live+0x111/0x290 [ 663.282679][T24520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 663.288955][T24520] ? kasan_check_read+0x11/0x20 [ 663.293927][T24520] ? get_mem_cgroup_from_mm+0x156/0x320 [ 663.299624][T24520] mem_cgroup_try_charge+0x259/0x6b0 [ 663.304952][T24520] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 663.310739][T24520] wp_page_copy+0x416/0x1770 [ 663.315360][T24520] ? __sched_text_start+0x8/0x8 [ 663.320272][T24520] ? pmd_pfn+0x1d0/0x1d0 [ 663.324547][T24520] ? preempt_schedule+0x4b/0x60 [ 663.329434][T24520] ? preempt_schedule_common+0x4f/0xd0 [ 663.334952][T24520] ? preempt_schedule+0x4b/0x60 [ 663.339938][T24520] ? ___preempt_schedule+0x16/0x18 [ 663.345094][T24520] do_wp_page+0x5d8/0x16c0 [ 663.349550][T24520] ? finish_mkwrite_fault+0x540/0x540 [ 663.354967][T24520] __handle_mm_fault+0x22e3/0x3eb0 [ 663.360246][T24520] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 663.365831][T24520] ? kasan_check_read+0x11/0x20 [ 663.370719][T24520] handle_mm_fault+0x1b5/0x6b0 [ 663.375512][T24520] __do_page_fault+0x5f4/0xdb0 [ 663.380316][T24520] do_page_fault+0x71/0x57d [ 663.384845][T24520] ? page_fault+0x8/0x30 [ 663.389113][T24520] page_fault+0x1e/0x30 [ 663.393300][T24520] RIP: 0033:0x4308f6 [ 663.397213][T24520] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 6c 46 64 00 85 c0 0f 84 [ 663.416835][T24520] RSP: 002b:00007ffff2d76200 EFLAGS: 00010206 [ 663.422920][T24520] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 663.430915][T24520] RDX: 000055555568a930 RSI: 0000555555692970 RDI: 0000000000000003 [ 663.438903][T24520] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555555689940 [ 663.446894][T24520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 663.454888][T24520] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 12:50:06 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x4951604f1a584337) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x80, 0x0) r2 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001b40)='cgroup.type\x00', 0x2, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) close(r2) socketpair(0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) recvmsg(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 12:50:06 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x1b00000000000000) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) close(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg(r0, &(0x7f0000009140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000008c80)=[{0x10, 0x84, 0x1}], 0x10}, 0x0) [ 663.535266][T24520] memory: usage 4748kB, limit 0kB, failcnt 52944 [ 663.541659][T24520] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 663.581847][T24520] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 663.611729][T24520] Memory cgroup stats for /syz0: cache:0KB rss:40KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB [ 663.632447][ T24] audit: type=1804 audit(1563195006.267:171): pid=24558 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir033619619/syzkaller.sqXtXm/396/memory.events" dev="sda1" ino=16487 res=1 [ 663.687668][ T24] audit: type=1800 audit(1563195006.267:172): pid=24558 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16487 res=0 [ 663.700055][T24520] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=24520,uid=0 12:50:06 executing program 3: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x4951604f1a584337) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x80, 0x0) r2 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001b40)='cgroup.type\x00', 0x2, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) close(r2) socketpair(0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) recvmsg(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) [ 663.745735][T24520] Memory cgroup out of memory: Killed process 24520 (syz-executor.0) total-vm:72444kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 663.771085][ T1050] oom_reaper: reaped process 24520 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 12:50:06 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x1b00000000000000) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) close(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg(r0, &(0x7f0000009140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000008c80)=[{0x10, 0x84, 0x1}], 0x10}, 0x0) [ 663.854220][ T24] audit: type=1804 audit(1563195006.487:173): pid=24565 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir217795719/syzkaller.cOOXm9/219/memory.events" dev="sda1" ino=16572 res=1 [ 663.959072][ T24] audit: type=1800 audit(1563195006.487:174): pid=24565 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16572 res=0 12:50:06 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x4951604f1a584337) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x80, 0x0) r2 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001b40)='cgroup.type\x00', 0x2, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) close(r2) socketpair(0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) recvmsg(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 12:50:06 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x1b00000000000000) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) close(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg(r0, &(0x7f0000009140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000008c80)=[{0x10, 0x84, 0x1}], 0x10}, 0x0) [ 664.339671][ T24] audit: type=1804 audit(1563195006.977:175): pid=24573 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir033619619/syzkaller.sqXtXm/397/memory.events" dev="sda1" ino=16516 res=1 [ 664.480162][ T24] audit: type=1800 audit(1563195006.977:176): pid=24573 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16516 res=0 12:50:07 executing program 0: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x4951604f1a584337) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x80, 0x0) r2 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001b40)='cgroup.type\x00', 0x2, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) close(r2) socketpair(0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) recvmsg(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) [ 664.842550][T24587] IPVS: ftp: loaded support on port[0] = 21 12:50:07 executing program 3: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x4951604f1a584337) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x80, 0x0) r2 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001b40)='cgroup.type\x00', 0x2, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) close(r2) socketpair(0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) recvmsg(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) [ 664.923095][T24589] IPVS: ftp: loaded support on port[0] = 21 [ 665.549651][T24587] chnl_net:caif_netlink_parms(): no params data found [ 665.559954][T24589] chnl_net:caif_netlink_parms(): no params data found [ 665.720643][T24587] bridge0: port 1(bridge_slave_0) entered blocking state [ 665.727964][T24587] bridge0: port 1(bridge_slave_0) entered disabled state [ 665.737029][T24587] device bridge_slave_0 entered promiscuous mode [ 665.745626][T24589] bridge0: port 1(bridge_slave_0) entered blocking state [ 665.752697][T24589] bridge0: port 1(bridge_slave_0) entered disabled state [ 665.765244][T24589] device bridge_slave_0 entered promiscuous mode [ 665.773211][T24589] bridge0: port 2(bridge_slave_1) entered blocking state [ 665.780584][T24589] bridge0: port 2(bridge_slave_1) entered disabled state [ 665.788973][T24589] device bridge_slave_1 entered promiscuous mode [ 665.797051][T24587] bridge0: port 2(bridge_slave_1) entered blocking state [ 665.804123][T24587] bridge0: port 2(bridge_slave_1) entered disabled state [ 665.812278][T24587] device bridge_slave_1 entered promiscuous mode [ 665.886269][T24589] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 665.898564][T24589] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 665.961847][T24587] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 665.973537][T24587] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 665.997163][T24589] team0: Port device team_slave_0 added [ 666.048808][T24589] team0: Port device team_slave_1 added [ 666.058046][T24587] team0: Port device team_slave_0 added [ 666.095450][ T21] device hsr_slave_0 left promiscuous mode [ 666.135348][ T21] device hsr_slave_1 left promiscuous mode [ 666.225637][ T21] device bridge_slave_1 left promiscuous mode [ 666.231985][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 666.286402][ T21] device bridge_slave_0 left promiscuous mode [ 666.292690][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.073568][ T21] team0 (unregistering): Port device team_slave_1 removed [ 668.086834][ T21] team0 (unregistering): Port device team_slave_0 removed [ 668.100037][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 668.141632][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 668.227238][ T21] bond0 (unregistering): Released all slaves [ 668.311713][T24587] team0: Port device team_slave_1 added [ 668.388403][T24589] device hsr_slave_0 entered promiscuous mode [ 668.425789][T24589] device hsr_slave_1 entered promiscuous mode [ 668.538330][T24587] device hsr_slave_0 entered promiscuous mode [ 668.575695][T24587] device hsr_slave_1 entered promiscuous mode [ 668.745552][T24587] 8021q: adding VLAN 0 to HW filter on device bond0 [ 668.768684][T24589] 8021q: adding VLAN 0 to HW filter on device bond0 [ 668.794385][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 668.804228][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 668.820750][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 668.832359][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 668.857306][T24587] 8021q: adding VLAN 0 to HW filter on device team0 [ 668.868247][T24589] 8021q: adding VLAN 0 to HW filter on device team0 [ 668.881416][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 668.892899][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 668.902120][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.909283][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 668.935921][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 668.946510][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 668.955933][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 668.964597][ T8865] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.971765][ T8865] bridge0: port 1(bridge_slave_0) entered forwarding state [ 668.989778][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 669.003169][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 669.019890][ T8865] bridge0: port 2(bridge_slave_1) entered blocking state [ 669.027066][ T8865] bridge0: port 2(bridge_slave_1) entered forwarding state [ 669.035885][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 669.044837][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 669.069560][ T8865] bridge0: port 2(bridge_slave_1) entered blocking state [ 669.076741][ T8865] bridge0: port 2(bridge_slave_1) entered forwarding state [ 669.085932][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 669.106292][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 669.153448][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 669.161892][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 669.179581][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 669.189966][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 669.199335][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 669.209122][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 669.218417][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 669.228005][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 669.238056][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 669.247670][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 669.257128][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 669.281802][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 669.293920][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 669.311235][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 669.324327][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 669.337986][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 669.359523][T24587] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 669.374217][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 669.386366][T24589] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 669.431600][T24587] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 669.443362][T24589] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 669.699458][T24609] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 12:50:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) getpid() write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x60e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x336) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x7, 0x20, 0x1000}]}) write$cgroup_int(r1, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x3) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) unlink(&(0x7f0000000140)='./file0\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0xc0002, 0x5, 0x9, 0x4a, 0x0, 0x0, 0x0, 0x5, 0x3, 0x2, 0x40, 0x5d60, 0x80000000, 0x80000001, 0x9, 0x5, 0x1, 0x4, 0x10001, 0x6, 0x90, 0xff, 0xbc6, 0x7, 0x10000, 0x7, 0x270, 0x0, 0xfffffffffffffffa, 0x80000000, 0x0, 0x4, 0x4, @perf_bp={0x0, 0x5}, 0x6000, 0x4, 0x0, 0x7, 0xff, 0x221, 0x3}) [ 670.006668][T24609] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 670.026961][T24609] CPU: 0 PID: 24609 Comm: syz-executor.1 Not tainted 5.2.0+ #40 [ 670.034700][T24609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.034716][T24609] Call Trace: [ 670.054310][T24609] dump_stack+0x172/0x1f0 [ 670.058715][T24609] dump_header+0x10f/0xd33 [ 670.063150][T24609] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 670.068984][T24609] ? ___ratelimit+0x60/0x595 [ 670.073593][T24609] ? do_raw_spin_unlock+0x57/0x270 [ 670.078751][T24609] oom_kill_process.cold+0x10/0x15 [ 670.078772][T24609] out_of_memory+0x7f5/0x12e0 [ 670.078791][T24609] ? __sched_text_start+0x8/0x8 [ 670.078809][T24609] ? oom_killer_disable+0x280/0x280 [ 670.078837][T24609] mem_cgroup_out_of_memory+0x1ca/0x230 [ 670.078859][T24609] ? memcg_event_wake+0x230/0x230 [ 670.109315][T24609] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 670.115533][T24609] ? cgroup_file_notify+0x140/0x1b0 [ 670.120820][T24609] memory_max_write+0x22f/0x390 [ 670.125737][T24609] ? __this_cpu_preempt_check+0x3a/0x210 [ 670.131454][T24609] ? mem_cgroup_write+0x360/0x360 [ 670.136701][T24609] ? mem_cgroup_write+0x360/0x360 [ 670.141782][T24609] ? cgroup_file_write+0x1e2/0x790 [ 670.146935][T24609] cgroup_file_write+0x241/0x790 [ 670.151921][T24609] ? mem_cgroup_write+0x360/0x360 [ 670.157001][T24609] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 670.162670][T24609] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 670.168327][T24609] kernfs_fop_write+0x2b8/0x480 [ 670.173206][T24609] __vfs_write+0x8a/0x110 [ 670.177590][T24609] ? kernfs_fop_open+0xd80/0xd80 [ 670.182730][T24609] vfs_write+0x20c/0x580 [ 670.187012][T24609] ksys_write+0x14f/0x290 [ 670.191470][T24609] ? __ia32_sys_read+0xb0/0xb0 [ 670.196261][T24609] ? do_syscall_64+0x26/0x680 [ 670.200967][T24609] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.207065][T24609] ? do_syscall_64+0x26/0x680 [ 670.211771][T24609] __x64_sys_write+0x73/0xb0 [ 670.216504][T24609] do_syscall_64+0xfd/0x680 [ 670.221046][T24609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.226972][T24609] RIP: 0033:0x459819 [ 670.231047][T24609] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 670.250828][T24609] RSP: 002b:00007fd0a53dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 670.259262][T24609] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 670.267259][T24609] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 670.275339][T24609] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 670.283439][T24609] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0a53db6d4 [ 670.291519][T24609] R13: 00000000004c9774 R14: 00000000004e0ba8 R15: 00000000ffffffff [ 670.304338][T24609] memory: usage 8040kB, limit 0kB, failcnt 55270 [ 670.314934][T24609] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 670.323732][T24609] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 670.339189][T24609] Memory cgroup stats for /syz1: cache:8KB rss:2164KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:8KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2164KB inactive_file:0KB active_file:8KB unevictable:0KB [ 670.363926][T24609] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=24608,uid=0 [ 670.380643][T24609] Memory cgroup out of memory: Killed process 24608 (syz-executor.1) total-vm:72576kB, anon-rss:2184kB, file-rss:35852kB, shmem-rss:0kB [ 670.397655][ T1050] oom_reaper: reaped process 24608 (syz-executor.1), now anon-rss:0kB, file-rss:34920kB, shmem-rss:0kB 12:50:13 executing program 0: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x4951604f1a584337) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x80, 0x0) r2 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001b40)='cgroup.type\x00', 0x2, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) close(r2) socketpair(0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) recvmsg(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 12:50:13 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x4951604f1a584337) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffe, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x80, 0x0) r2 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001b40)='cgroup.type\x00', 0x2, 0x0) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) close(r2) socketpair(0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) recvmsg(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 12:50:13 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x1b00000000000000) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) close(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg(r0, &(0x7f0000009140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000008c80)=[{0x10, 0x84, 0x1}], 0x10}, 0x0) 12:50:13 executing program 3: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x10e, 0xa, 0x0, 0x0) [ 670.650361][T24589] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 670.741305][T24589] CPU: 1 PID: 24589 Comm: syz-executor.1 Not tainted 5.2.0+ #40 [ 670.749008][T24589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.759112][T24589] Call Trace: [ 670.762465][T24589] dump_stack+0x172/0x1f0 [ 670.766818][T24589] dump_header+0x10f/0xd33 [ 670.771278][T24589] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 670.777109][T24589] ? ___ratelimit+0x60/0x595 [ 670.781713][T24589] ? do_raw_spin_unlock+0x57/0x270 [ 670.786849][T24589] oom_kill_process.cold+0x10/0x15 [ 670.792161][T24589] out_of_memory+0x7f5/0x12e0 [ 670.796864][T24589] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 670.802692][T24589] ? oom_killer_disable+0x280/0x280 [ 670.807925][T24589] mem_cgroup_out_of_memory+0x1ca/0x230 [ 670.813494][T24589] ? memcg_event_wake+0x230/0x230 [ 670.818542][T24589] ? do_raw_spin_unlock+0x57/0x270 [ 670.823961][T24589] ? _raw_spin_unlock+0x2d/0x50 [ 670.828837][T24589] try_charge+0x1042/0x1410 [ 670.833363][T24589] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 670.838933][T24589] ? percpu_ref_tryget_live+0x111/0x290 [ 670.844507][T24589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.850780][T24589] ? kasan_check_read+0x11/0x20 [ 670.855654][T24589] ? get_mem_cgroup_from_mm+0x156/0x320 [ 670.861225][T24589] mem_cgroup_try_charge+0x259/0x6b0 [ 670.866544][T24589] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 670.872211][T24589] wp_page_copy+0x416/0x1770 [ 670.876831][T24589] ? find_held_lock+0x35/0x130 [ 670.881715][T24589] ? pmd_pfn+0x1d0/0x1d0 [ 670.885981][T24589] ? lock_downgrade+0x920/0x920 [ 670.890859][T24589] ? swp_swapcount+0x540/0x540 [ 670.895647][T24589] ? kasan_check_read+0x11/0x20 [ 670.900524][T24589] ? do_raw_spin_unlock+0x57/0x270 [ 670.905658][T24589] do_wp_page+0x5d8/0x16c0 [ 670.910099][T24589] ? finish_mkwrite_fault+0x540/0x540 [ 670.915535][T24589] __handle_mm_fault+0x22e3/0x3eb0 [ 670.920680][T24589] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 670.926263][T24589] ? kasan_check_read+0x11/0x20 [ 670.931145][T24589] handle_mm_fault+0x1b5/0x6b0 [ 670.936061][T24589] __do_page_fault+0x5f4/0xdb0 [ 670.947813][T24589] do_page_fault+0x71/0x57d [ 670.952629][T24589] ? page_fault+0x8/0x30 [ 670.956901][T24589] page_fault+0x1e/0x30 [ 670.961117][T24589] RIP: 0033:0x403442 [ 670.965032][T24589] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 f9 8d 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 19 43 05 00 48 [ 670.984653][T24589] RSP: 002b:00007ffd5651ece0 EFLAGS: 00010246 [ 670.990756][T24589] RAX: 0000000000000000 RBX: 00000000000a38cf RCX: 0000000000413420 [ 670.998759][T24589] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffd5651fe10 [ 671.006754][T24589] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555556a01940 [ 671.014744][T24589] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd5651fe10 [ 671.022737][T24589] R13: 00007ffd5651fe00 R14: 0000000000000000 R15: 00007ffd5651fe10 12:50:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) getpid() write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x60e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x336) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x7, 0x20, 0x1000}]}) write$cgroup_int(r1, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x3) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) unlink(&(0x7f0000000140)='./file0\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0xc0002, 0x5, 0x9, 0x4a, 0x0, 0x0, 0x0, 0x5, 0x3, 0x2, 0x40, 0x5d60, 0x80000000, 0x80000001, 0x9, 0x5, 0x1, 0x4, 0x10001, 0x6, 0x90, 0xff, 0xbc6, 0x7, 0x10000, 0x7, 0x270, 0x0, 0xfffffffffffffffa, 0x80000000, 0x0, 0x4, 0x4, @perf_bp={0x0, 0x5}, 0x6000, 0x4, 0x0, 0x7, 0xff, 0x221, 0x3}) 12:50:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000d40)}, 0x40) [ 671.100670][ T24] kauditd_printk_skb: 4 callbacks suppressed [ 671.100685][ T24] audit: type=1804 audit(1563195013.737:181): pid=24632 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir217795719/syzkaller.cOOXm9/221/memory.events" dev="sda1" ino=16567 res=1 [ 671.135198][T24589] memory: usage 5716kB, limit 0kB, failcnt 55278 [ 671.145459][T24589] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 671.185555][T24589] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 671.216669][T24589] Memory cgroup stats for /syz1: cache:8KB rss:40KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:8KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:8KB unevictable:0KB [ 671.305531][ T24] audit: type=1800 audit(1563195013.777:182): pid=24632 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16567 res=0 12:50:14 executing program 3: r0 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0xfec0000000000000]}, 0x27}, 0x80, 0x0}, 0x20008843) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000002e40)={0x0, 0x0, 0x0}, 0x40008d0) 12:50:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) getpid() write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x60e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x336) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x7, 0x20, 0x1000}]}) write$cgroup_int(r1, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x3) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) unlink(&(0x7f0000000140)='./file0\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0xc0002, 0x5, 0x9, 0x4a, 0x0, 0x0, 0x0, 0x5, 0x3, 0x2, 0x40, 0x5d60, 0x80000000, 0x80000001, 0x9, 0x5, 0x1, 0x4, 0x10001, 0x6, 0x90, 0xff, 0xbc6, 0x7, 0x10000, 0x7, 0x270, 0x0, 0xfffffffffffffffa, 0x80000000, 0x0, 0x4, 0x4, @perf_bp={0x0, 0x5}, 0x6000, 0x4, 0x0, 0x7, 0xff, 0x221, 0x3}) 12:50:14 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r2, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x3, 0xb, 0x3}, &(0x7f0000000400)=0xff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x7ff}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001ba80)=r3, 0xdc) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:50:14 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x10022) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:50:14 executing program 3: r0 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0xfec0000000000000]}, 0x27}, 0x80, 0x0}, 0x20008843) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000002e40)={0x0, 0x0, 0x0}, 0x40008d0) 12:50:14 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r2, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x3, 0xb, 0x3}, &(0x7f0000000400)=0xff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x7ff}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001ba80)=r3, 0xdc) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 671.777336][T24589] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=24589,uid=0 [ 671.862931][T24589] Memory cgroup out of memory: Killed process 24589 (syz-executor.1) total-vm:72444kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 671.942165][ T1050] oom_reaper: reaped process 24589 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 673.069460][T24669] IPVS: ftp: loaded support on port[0] = 21 [ 673.381603][T24669] chnl_net:caif_netlink_parms(): no params data found [ 673.601417][T24669] bridge0: port 1(bridge_slave_0) entered blocking state [ 673.609969][T24669] bridge0: port 1(bridge_slave_0) entered disabled state [ 673.619112][T24669] device bridge_slave_0 entered promiscuous mode [ 673.826237][T24669] bridge0: port 2(bridge_slave_1) entered blocking state [ 673.833399][T24669] bridge0: port 2(bridge_slave_1) entered disabled state [ 673.841442][T24669] device bridge_slave_1 entered promiscuous mode [ 674.063339][T24669] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 674.074304][T24669] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 674.097391][T24669] team0: Port device team_slave_0 added [ 674.104967][T24669] team0: Port device team_slave_1 added [ 674.357535][T24669] device hsr_slave_0 entered promiscuous mode [ 674.385531][T24669] device hsr_slave_1 entered promiscuous mode [ 674.913043][T24669] 8021q: adding VLAN 0 to HW filter on device bond0 [ 674.935391][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 674.949684][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 674.958047][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 675.158516][T24669] 8021q: adding VLAN 0 to HW filter on device team0 [ 675.170498][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 675.180353][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 675.189521][ T8865] bridge0: port 1(bridge_slave_0) entered blocking state [ 675.196691][ T8865] bridge0: port 1(bridge_slave_0) entered forwarding state [ 675.210516][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 675.219136][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 675.229857][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 675.238873][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 675.246164][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 675.305806][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 675.314761][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 675.327234][ T9506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 675.336055][ T9506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 675.352332][ T9506] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 675.360423][ T9506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 675.370191][ T9506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 675.444320][T24669] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 675.455538][T24669] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 675.467821][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 675.477172][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 675.486066][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 675.494760][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 675.548537][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 675.569184][T24669] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 676.022993][ T24] audit: type=1804 audit(1563195018.657:183): pid=24682 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir988695061/syzkaller.8TMcOE/0/memory.events" dev="sda1" ino=16674 res=1 [ 676.050858][ T24] audit: type=1800 audit(1563195018.667:184): pid=24682 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=16674 res=0 12:50:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) getpid() write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x60e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x336) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x7, 0x20, 0x1000}]}) write$cgroup_int(r1, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x3) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) unlink(&(0x7f0000000140)='./file0\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0xc0002, 0x5, 0x9, 0x4a, 0x0, 0x0, 0x0, 0x5, 0x3, 0x2, 0x40, 0x5d60, 0x80000000, 0x80000001, 0x9, 0x5, 0x1, 0x4, 0x10001, 0x6, 0x90, 0xff, 0xbc6, 0x7, 0x10000, 0x7, 0x270, 0x0, 0xfffffffffffffffa, 0x80000000, 0x0, 0x4, 0x4, @perf_bp={0x0, 0x5}, 0x6000, 0x4, 0x0, 0x7, 0xff, 0x221, 0x3}) 12:50:18 executing program 3: r0 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0xfec0000000000000]}, 0x27}, 0x80, 0x0}, 0x20008843) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000002e40)={0x0, 0x0, 0x0}, 0x40008d0) 12:50:18 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r2, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x3, 0xb, 0x3}, &(0x7f0000000400)=0xff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x7ff}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001ba80)=r3, 0xdc) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:50:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) getpid() write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x60e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x336) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x7, 0x20, 0x1000}]}) write$cgroup_int(r1, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x3) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) unlink(&(0x7f0000000140)='./file0\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0xc0002, 0x5, 0x9, 0x4a, 0x0, 0x0, 0x0, 0x5, 0x3, 0x2, 0x40, 0x5d60, 0x80000000, 0x80000001, 0x9, 0x5, 0x1, 0x4, 0x10001, 0x6, 0x90, 0xff, 0xbc6, 0x7, 0x10000, 0x7, 0x270, 0x0, 0xfffffffffffffffa, 0x80000000, 0x0, 0x4, 0x4, @perf_bp={0x0, 0x5}, 0x6000, 0x4, 0x0, 0x7, 0xff, 0x221, 0x3}) 12:50:18 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x10022) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:50:18 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r2, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x3, 0xb, 0x3}, &(0x7f0000000400)=0xff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x7ff}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001ba80)=r3, 0xdc) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:50:19 executing program 3: r0 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0xfec0000000000000]}, 0x27}, 0x80, 0x0}, 0x20008843) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000002e40)={0x0, 0x0, 0x0}, 0x40008d0) 12:50:19 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r2, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x3, 0xb, 0x3}, &(0x7f0000000400)=0xff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x7ff}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001ba80)=r3, 0xdc) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:50:19 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r2, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x3, 0xb, 0x3}, &(0x7f0000000400)=0xff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x7ff}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001ba80)=r3, 0xdc) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:50:19 executing program 4: r0 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0xfec0000000000000]}, 0x27}, 0x80, 0x0}, 0x20008843) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000002e40)={0x0, 0x0, 0x0}, 0x40008d0) 12:50:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x20000, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x70, 0x800, 0x2, 0x0, 0x5, 0x0, 0x0, 0x40002, 0x0, 0x6c74, 0x7, 0x9, 0xfff, 0x400, 0x8, 0xffff, 0x4, 0xff, 0xe9aa264, 0x4, 0x0, 0x401, 0xffff, 0x29caf546, 0x8, 0x0, 0x8, 0x7fffffff, 0x7, 0x1, 0x6, 0x3, 0x8, 0x1cc, 0x1, 0x5, 0x80000001, 0x0, 0x2, 0x1, @perf_bp={0x0, 0x4}, 0x100, 0xd0, 0x3, 0xb, 0x3ff}, 0xffffffffffffffff, 0xa, r0, 0xd) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xfffffe5c) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7ff, 0x9060, 0x0, 0x2, 0x0, 0x5, 0x4000, 0x4, 0x3f, 0x8, 0x9, 0x0, 0xffff, 0xbea, 0x1, 0x80000001, 0x0, 0x1, 0x0, 0xffffffffffffffc0, 0x3, 0xffff, 0x9, 0x7ff, 0x100, 0x80000001, 0x10000, 0x0, 0x0, 0x1, 0x12b, 0x5, 0x100, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x1, @perf_config_ext={0x2}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x8}, 0x0, 0x4, r2, 0x1) 12:50:19 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x2000002, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r2, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x3, 0xb, 0x3}, &(0x7f0000000400)=0xff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x7ff}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001ba80)=r3, 0xdc) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 677.972500][T24732] IPVS: ftp: loaded support on port[0] = 21 [ 678.169892][T24732] chnl_net:caif_netlink_parms(): no params data found [ 678.201788][T24732] bridge0: port 1(bridge_slave_0) entered blocking state [ 678.209202][T24732] bridge0: port 1(bridge_slave_0) entered disabled state [ 678.217434][T24732] device bridge_slave_0 entered promiscuous mode [ 678.225545][T24732] bridge0: port 2(bridge_slave_1) entered blocking state [ 678.232743][T24732] bridge0: port 2(bridge_slave_1) entered disabled state [ 678.241036][T24732] device bridge_slave_1 entered promiscuous mode [ 678.296566][T24732] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 678.308511][T24732] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 678.330082][T24732] team0: Port device team_slave_0 added [ 678.338779][T24732] team0: Port device team_slave_1 added [ 678.398958][T24732] device hsr_slave_0 entered promiscuous mode [ 678.445571][T24732] device hsr_slave_1 entered promiscuous mode [ 678.549861][T24732] bridge0: port 2(bridge_slave_1) entered blocking state [ 678.557031][T24732] bridge0: port 2(bridge_slave_1) entered forwarding state [ 678.564371][T24732] bridge0: port 1(bridge_slave_0) entered blocking state [ 678.571569][T24732] bridge0: port 1(bridge_slave_0) entered forwarding state [ 678.661104][T24732] 8021q: adding VLAN 0 to HW filter on device bond0 [ 678.673559][ T9506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 678.682475][ T9506] bridge0: port 1(bridge_slave_0) entered disabled state [ 678.691958][ T9506] bridge0: port 2(bridge_slave_1) entered disabled state [ 678.701246][ T9506] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 678.772638][T24732] 8021q: adding VLAN 0 to HW filter on device team0 [ 678.784110][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 678.793017][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 678.800187][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 678.826739][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 678.836213][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 678.843402][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 678.852779][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 678.861697][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 678.929286][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 678.939660][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 678.954167][T24732] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 678.966829][T24732] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 678.974935][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 679.031186][T24732] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 679.865441][ T21] device hsr_slave_0 left promiscuous mode [ 679.920240][ T21] device hsr_slave_1 left promiscuous mode [ 680.005548][ T21] device bridge_slave_1 left promiscuous mode [ 680.011836][ T21] bridge0: port 2(bridge_slave_1) entered disabled state 12:50:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) getpid() write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x60e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x336) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x7, 0x20, 0x1000}]}) write$cgroup_int(r1, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x3) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) unlink(&(0x7f0000000140)='./file0\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0xc0002, 0x5, 0x9, 0x4a, 0x0, 0x0, 0x0, 0x5, 0x3, 0x2, 0x40, 0x5d60, 0x80000000, 0x80000001, 0x9, 0x5, 0x1, 0x4, 0x10001, 0x6, 0x90, 0xff, 0xbc6, 0x7, 0x10000, 0x7, 0x270, 0x0, 0xfffffffffffffffa, 0x80000000, 0x0, 0x4, 0x4, @perf_bp={0x0, 0x5}, 0x6000, 0x4, 0x0, 0x7, 0xff, 0x221, 0x3}) 12:50:22 executing program 4: r0 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0xfec0000000000000]}, 0x27}, 0x80, 0x0}, 0x20008843) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000002e40)={0x0, 0x0, 0x0}, 0x40008d0) 12:50:22 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x10022) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:50:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net//..\x00', 0x0, 0x0) 12:50:22 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f0000000640), 0x12) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f00000004c0), 0xfdef) 12:50:22 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1f000000180081ac02041cecff091ffa1c1400000049778a28761a485ead3a", 0x1f}], 0x1}, 0x0) [ 680.075459][ T21] device bridge_slave_0 left promiscuous mode [ 680.081757][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 680.249206][ T21] device hsr_slave_0 left promiscuous mode 12:50:22 executing program 4: r0 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0xfec0000000000000]}, 0x27}, 0x80, 0x0}, 0x20008843) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000002e40)={0x0, 0x0, 0x0}, 0x40008d0) [ 680.316014][ T21] device hsr_slave_1 left promiscuous mode 12:50:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net//..\x00', 0x0, 0x0) [ 680.395746][ T21] device bridge_slave_1 left promiscuous mode [ 680.402135][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 680.487663][ T21] device bridge_slave_0 left promiscuous mode [ 680.502616][ T21] bridge0: port 1(bridge_slave_0) entered disabled state 12:50:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net//..\x00', 0x0, 0x0) [ 680.626753][ T21] device hsr_slave_0 left promiscuous mode [ 680.665751][ T21] device hsr_slave_1 left promiscuous mode 12:50:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000002, 0x0}, 0x2c) [ 680.746006][ T21] device bridge_slave_1 left promiscuous mode [ 680.758322][ T21] bridge0: port 2(bridge_slave_1) entered disabled state 12:50:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net//..\x00', 0x0, 0x0) [ 680.827075][ T21] device bridge_slave_0 left promiscuous mode [ 680.838396][ T21] bridge0: port 1(bridge_slave_0) entered disabled state 12:50:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000002, 0x0}, 0x2c) 12:50:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x11, 0x0, 0x403, 0x0, 0x40000a0, 0xffffffffffffffff, 0x200000000000, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) recvmsg(r1, &(0x7f0000000100)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/172, 0xac}], 0x1}, 0x12000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 12:50:23 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000002, 0x0}, 0x2c) [ 686.864082][ T21] team0 (unregistering): Port device team_slave_1 removed [ 686.877882][ T21] team0 (unregistering): Port device team_slave_0 removed [ 686.891612][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 686.932256][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 687.030591][ T21] bond0 (unregistering): Released all slaves [ 687.133083][ T21] team0 (unregistering): Port device team_slave_1 removed [ 687.148361][ T21] team0 (unregistering): Port device team_slave_0 removed [ 687.163589][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 687.222099][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 687.320260][ T21] bond0 (unregistering): Released all slaves [ 687.434726][ T21] team0 (unregistering): Port device team_slave_1 removed [ 687.449288][ T21] team0 (unregistering): Port device team_slave_0 removed [ 687.460831][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 687.502662][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 687.578663][ T21] bond0 (unregistering): Released all slaves 12:50:30 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x10022) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:50:30 executing program 1: r0 = socket$kcm(0x10, 0x3, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="4c000000120081f87059ae08060c04000200eb10100103fe054e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a0200000046314461e6ffffffffffffff0201c50b182bbe1056", 0x4c}], 0x1}, 0x0) 12:50:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xc, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x19, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) 12:50:30 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e00000027000509315a03000000940d0324fc001000044002000000053582c137153e3789b84400d1bd00002200", 0x2e}], 0x1}, 0x0) 12:50:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000002, 0x0}, 0x2c) 12:50:30 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000600)='^\n\xf6\x89\xb7G\x96\xb5-\xa7\xea \xc2c\x03G}nodev\\}\\ppp0%em1]\x16po') close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00'}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r2, &(0x7f0000001000)="413e8880f1f315857dbaa1bbfbf656b4fc0ecdac1ca73b13a95f69e38568fb69f2bbcfe9c72d6873889ad6b53d1e7404cd13ac21fd09468954312d26", 0x0}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'teql0\x00', @remote}) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) sendmsg$kcm(r3, &(0x7f0000001440)={0x0, 0xd7, 0x0}, 0x84) openat$tun(0xffffffffffffff9c, 0x0, 0x100, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000fc0)={&(0x7f0000000f80)='./file0\x00', r3}, 0x10) sendmsg$kcm(r1, 0x0, 0x20000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r3, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 687.694996][T24752] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. 12:50:30 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x4000000000005, 0x3, 0x100000001, 0x6}, 0x3c) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETLE(r1, 0x400454dc, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000009c0)={r0, &(0x7f0000000540)="6cedabef7d56a68026273634892f6d9519d75b8bc1a12fa6bcdd011aaeb5c5", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r4 = getpid() ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000840)={0x0, 0x70, 0x8, 0x100, 0x200, 0x7, 0x0, 0x20a2, 0x40000, 0x8, 0x4, 0x79, 0xa2c, 0x0, 0x8, 0xfffffffffffffffd, 0x6, 0x4, 0x2, 0x1, 0x100000000, 0x5, 0x0, 0xffff, 0x8, 0x40, 0x866, 0x7, 0x8, 0x1, 0x800, 0x5, 0x2, 0x3, 0x3, 0x8, 0x60f, 0x3, 0x0, 0x2, 0x0, @perf_config_ext={0x8}, 0x40, 0xa2, 0x4, 0x7, 0x8001, 0x1, 0x9}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000a00)=0x7ff) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb100000001000000005000000020000000000000e030000000100000000007f7f00"], 0x0, 0x23, 0x0, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffff9c, 0x10, &(0x7f0000000640)={&(0x7f00000005c0)=""/95, 0x5f, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r5, 0x10, &(0x7f00000006c0)={&(0x7f0000000580), 0x0, r6}}, 0x10) r7 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x6, 0xffffffffffffffbe, 0x100000001, 0x0, 0x0, 0x8000, 0x440, 0x9, 0x1, 0x1, 0xa81, 0x6, 0x9, 0x5, 0x2, 0x5, 0x7, 0x5c, 0xfffffffffffeffff, 0x555, 0x6, 0x3, 0x2, 0x800, 0x100, 0x3, 0x8, 0x5, 0x5, 0xfffffffffffffffd, 0x6, 0x40, 0xd0f0, 0x3, 0x4, 0x3ff, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0xa04, 0x0, 0x9, 0x5, 0x0, 0x10001, 0x7fffffff}, r4, 0x10, r2, 0x3) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r3}, 0x2c) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0xffffffffffff45ac, 0x2, 0xd0, 0x7f, 0x0, 0x8, 0x1, 0x8, 0x100000001, 0x7, 0x3ff, 0x81, 0xfffffffffffffffb, 0xfffffffffffffff9, 0x3, 0x9, 0xfffffffffffffffe, 0x80, 0x9, 0xffff, 0xff, 0x3f, 0x7, 0x7ff, 0x9, 0x0, 0xfff, 0x1ff, 0x1, 0x10000, 0x33, 0x5, 0x58399e2, 0x3f, 0x673, 0x6, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000140), 0x4}, 0x10, 0x5, 0x1, 0x7, 0x6f60000, 0x9, 0xbe}, 0xffffffffffffffff, 0x4, r7, 0x0) close(r1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)={0x14, 0x4, 0x1627addb, 0x9, 0x20, r0, 0x5, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) 12:50:30 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) mkdir(0x0, 0x8) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:50:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xc, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x19, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) [ 688.004016][T24813] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 688.045177][T24813] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. 12:50:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xc, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x19, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) [ 688.229825][T24822] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 688.255009][T24822] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. [ 688.306817][ T24] audit: type=1804 audit(1563195030.937:185): pid=24820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir217795719/syzkaller.cOOXm9/233/memory.events" dev="sda1" ino=16675 res=1 12:50:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2e0000002700050ad25a80648c63940d0300fc00100003400a000000053582c137153e370900088004001700d1bd", 0x2e}], 0x1}, 0x0) 12:50:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xc, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x19, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) [ 688.470740][ T24] audit: type=1804 audit(1563195031.107:186): pid=24829 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir217795719/syzkaller.cOOXm9/233/memory.events" dev="sda1" ino=16675 res=1 [ 688.631899][ T24] audit: type=1804 audit(1563195031.137:187): pid=24820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir217795719/syzkaller.cOOXm9/233/memory.events" dev="sda1" ino=16675 res=1 12:50:31 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) mkdir(0x0, 0x8) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:50:31 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x4000000000005, 0x3, 0x100000001, 0x6}, 0x3c) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETLE(r1, 0x400454dc, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000009c0)={r0, &(0x7f0000000540)="6cedabef7d56a68026273634892f6d9519d75b8bc1a12fa6bcdd011aaeb5c5", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r4 = getpid() ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000840)={0x0, 0x70, 0x8, 0x100, 0x200, 0x7, 0x0, 0x20a2, 0x40000, 0x8, 0x4, 0x79, 0xa2c, 0x0, 0x8, 0xfffffffffffffffd, 0x6, 0x4, 0x2, 0x1, 0x100000000, 0x5, 0x0, 0xffff, 0x8, 0x40, 0x866, 0x7, 0x8, 0x1, 0x800, 0x5, 0x2, 0x3, 0x3, 0x8, 0x60f, 0x3, 0x0, 0x2, 0x0, @perf_config_ext={0x8}, 0x40, 0xa2, 0x4, 0x7, 0x8001, 0x1, 0x9}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000a00)=0x7ff) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb100000001000000005000000020000000000000e030000000100000000007f7f00"], 0x0, 0x23, 0x0, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffff9c, 0x10, &(0x7f0000000640)={&(0x7f00000005c0)=""/95, 0x5f, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r5, 0x10, &(0x7f00000006c0)={&(0x7f0000000580), 0x0, r6}}, 0x10) r7 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x6, 0xffffffffffffffbe, 0x100000001, 0x0, 0x0, 0x8000, 0x440, 0x9, 0x1, 0x1, 0xa81, 0x6, 0x9, 0x5, 0x2, 0x5, 0x7, 0x5c, 0xfffffffffffeffff, 0x555, 0x6, 0x3, 0x2, 0x800, 0x100, 0x3, 0x8, 0x5, 0x5, 0xfffffffffffffffd, 0x6, 0x40, 0xd0f0, 0x3, 0x4, 0x3ff, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0xa04, 0x0, 0x9, 0x5, 0x0, 0x10001, 0x7fffffff}, r4, 0x10, r2, 0x3) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r3}, 0x2c) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0xffffffffffff45ac, 0x2, 0xd0, 0x7f, 0x0, 0x8, 0x1, 0x8, 0x100000001, 0x7, 0x3ff, 0x81, 0xfffffffffffffffb, 0xfffffffffffffff9, 0x3, 0x9, 0xfffffffffffffffe, 0x80, 0x9, 0xffff, 0xff, 0x3f, 0x7, 0x7ff, 0x9, 0x0, 0xfff, 0x1ff, 0x1, 0x10000, 0x33, 0x5, 0x58399e2, 0x3f, 0x673, 0x6, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000140), 0x4}, 0x10, 0x5, 0x1, 0x7, 0x6f60000, 0x9, 0xbe}, 0xffffffffffffffff, 0x4, r7, 0x0) close(r1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)={0x14, 0x4, 0x1627addb, 0x9, 0x20, r0, 0x5, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) 12:50:31 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x4000000000005, 0x3, 0x100000001, 0x6}, 0x3c) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETLE(r1, 0x400454dc, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000009c0)={r0, &(0x7f0000000540)="6cedabef7d56a68026273634892f6d9519d75b8bc1a12fa6bcdd011aaeb5c5", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r4 = getpid() ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000840)={0x0, 0x70, 0x8, 0x100, 0x200, 0x7, 0x0, 0x20a2, 0x40000, 0x8, 0x4, 0x79, 0xa2c, 0x0, 0x8, 0xfffffffffffffffd, 0x6, 0x4, 0x2, 0x1, 0x100000000, 0x5, 0x0, 0xffff, 0x8, 0x40, 0x866, 0x7, 0x8, 0x1, 0x800, 0x5, 0x2, 0x3, 0x3, 0x8, 0x60f, 0x3, 0x0, 0x2, 0x0, @perf_config_ext={0x8}, 0x40, 0xa2, 0x4, 0x7, 0x8001, 0x1, 0x9}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000a00)=0x7ff) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb100000001000000005000000020000000000000e030000000100000000007f7f00"], 0x0, 0x23, 0x0, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffff9c, 0x10, &(0x7f0000000640)={&(0x7f00000005c0)=""/95, 0x5f, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r5, 0x10, &(0x7f00000006c0)={&(0x7f0000000580), 0x0, r6}}, 0x10) r7 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x6, 0xffffffffffffffbe, 0x100000001, 0x0, 0x0, 0x8000, 0x440, 0x9, 0x1, 0x1, 0xa81, 0x6, 0x9, 0x5, 0x2, 0x5, 0x7, 0x5c, 0xfffffffffffeffff, 0x555, 0x6, 0x3, 0x2, 0x800, 0x100, 0x3, 0x8, 0x5, 0x5, 0xfffffffffffffffd, 0x6, 0x40, 0xd0f0, 0x3, 0x4, 0x3ff, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0xa04, 0x0, 0x9, 0x5, 0x0, 0x10001, 0x7fffffff}, r4, 0x10, r2, 0x3) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r3}, 0x2c) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0xffffffffffff45ac, 0x2, 0xd0, 0x7f, 0x0, 0x8, 0x1, 0x8, 0x100000001, 0x7, 0x3ff, 0x81, 0xfffffffffffffffb, 0xfffffffffffffff9, 0x3, 0x9, 0xfffffffffffffffe, 0x80, 0x9, 0xffff, 0xff, 0x3f, 0x7, 0x7ff, 0x9, 0x0, 0xfff, 0x1ff, 0x1, 0x10000, 0x33, 0x5, 0x58399e2, 0x3f, 0x673, 0x6, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000140), 0x4}, 0x10, 0x5, 0x1, 0x7, 0x6f60000, 0x9, 0xbe}, 0xffffffffffffffff, 0x4, r7, 0x0) close(r1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)={0x14, 0x4, 0x1627addb, 0x9, 0x20, r0, 0x5, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) 12:50:31 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) mkdir(0x0, 0x8) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 688.725772][T24839] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 688.795282][T24839] netlink: 'syz-executor.3': attribute type 8 has an invalid length. [ 688.948052][T24851] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 688.967684][ T24] audit: type=1804 audit(1563195031.597:188): pid=24850 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir217795719/syzkaller.cOOXm9/234/memory.events" dev="sda1" ino=16721 res=1 [ 688.980382][T24851] netlink: 'syz-executor.3': attribute type 8 has an invalid length. 12:50:31 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000600)='^\n\xf6\x89\xb7G\x96\xb5-\xa7\xea \xc2c\x03G}nodev\\}\\ppp0%em1]\x16po') close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00'}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r2, &(0x7f0000001000)="413e8880f1f315857dbaa1bbfbf656b4fc0ecdac1ca73b13a95f69e38568fb69f2bbcfe9c72d6873889ad6b53d1e7404cd13ac21fd09468954312d26", 0x0}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'teql0\x00', @remote}) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) sendmsg$kcm(r3, &(0x7f0000001440)={0x0, 0xd7, 0x0}, 0x84) openat$tun(0xffffffffffffff9c, 0x0, 0x100, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000fc0)={&(0x7f0000000f80)='./file0\x00', r3}, 0x10) sendmsg$kcm(r1, 0x0, 0x20000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r3, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 689.101942][ T24] audit: type=1804 audit(1563195031.687:189): pid=24849 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir149502207/syzkaller.tRWlb4/607/memory.events" dev="sda1" ino=16705 res=1 12:50:31 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) mkdir(0x0, 0x8) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:50:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2e0000002700050ad25a80648c63940d0300fc00100003400a000000053582c137153e370900088004001700d1bd", 0x2e}], 0x1}, 0x0) 12:50:32 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x4000000000005, 0x3, 0x100000001, 0x6}, 0x3c) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETLE(r1, 0x400454dc, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000009c0)={r0, &(0x7f0000000540)="6cedabef7d56a68026273634892f6d9519d75b8bc1a12fa6bcdd011aaeb5c5", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r4 = getpid() ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000840)={0x0, 0x70, 0x8, 0x100, 0x200, 0x7, 0x0, 0x20a2, 0x40000, 0x8, 0x4, 0x79, 0xa2c, 0x0, 0x8, 0xfffffffffffffffd, 0x6, 0x4, 0x2, 0x1, 0x100000000, 0x5, 0x0, 0xffff, 0x8, 0x40, 0x866, 0x7, 0x8, 0x1, 0x800, 0x5, 0x2, 0x3, 0x3, 0x8, 0x60f, 0x3, 0x0, 0x2, 0x0, @perf_config_ext={0x8}, 0x40, 0xa2, 0x4, 0x7, 0x8001, 0x1, 0x9}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000a00)=0x7ff) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb100000001000000005000000020000000000000e030000000100000000007f7f00"], 0x0, 0x23, 0x0, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffff9c, 0x10, &(0x7f0000000640)={&(0x7f00000005c0)=""/95, 0x5f, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r5, 0x10, &(0x7f00000006c0)={&(0x7f0000000580), 0x0, r6}}, 0x10) r7 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x6, 0xffffffffffffffbe, 0x100000001, 0x0, 0x0, 0x8000, 0x440, 0x9, 0x1, 0x1, 0xa81, 0x6, 0x9, 0x5, 0x2, 0x5, 0x7, 0x5c, 0xfffffffffffeffff, 0x555, 0x6, 0x3, 0x2, 0x800, 0x100, 0x3, 0x8, 0x5, 0x5, 0xfffffffffffffffd, 0x6, 0x40, 0xd0f0, 0x3, 0x4, 0x3ff, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0xa04, 0x0, 0x9, 0x5, 0x0, 0x10001, 0x7fffffff}, r4, 0x10, r2, 0x3) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r3}, 0x2c) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0xffffffffffff45ac, 0x2, 0xd0, 0x7f, 0x0, 0x8, 0x1, 0x8, 0x100000001, 0x7, 0x3ff, 0x81, 0xfffffffffffffffb, 0xfffffffffffffff9, 0x3, 0x9, 0xfffffffffffffffe, 0x80, 0x9, 0xffff, 0xff, 0x3f, 0x7, 0x7ff, 0x9, 0x0, 0xfff, 0x1ff, 0x1, 0x10000, 0x33, 0x5, 0x58399e2, 0x3f, 0x673, 0x6, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000140), 0x4}, 0x10, 0x5, 0x1, 0x7, 0x6f60000, 0x9, 0xbe}, 0xffffffffffffffff, 0x4, r7, 0x0) close(r1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)={0x14, 0x4, 0x1627addb, 0x9, 0x20, r0, 0x5, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) [ 689.437054][T24864] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 12:50:32 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x4000000000005, 0x3, 0x100000001, 0x6}, 0x3c) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETLE(r1, 0x400454dc, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000009c0)={r0, &(0x7f0000000540)="6cedabef7d56a68026273634892f6d9519d75b8bc1a12fa6bcdd011aaeb5c5", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r4 = getpid() ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000840)={0x0, 0x70, 0x8, 0x100, 0x200, 0x7, 0x0, 0x20a2, 0x40000, 0x8, 0x4, 0x79, 0xa2c, 0x0, 0x8, 0xfffffffffffffffd, 0x6, 0x4, 0x2, 0x1, 0x100000000, 0x5, 0x0, 0xffff, 0x8, 0x40, 0x866, 0x7, 0x8, 0x1, 0x800, 0x5, 0x2, 0x3, 0x3, 0x8, 0x60f, 0x3, 0x0, 0x2, 0x0, @perf_config_ext={0x8}, 0x40, 0xa2, 0x4, 0x7, 0x8001, 0x1, 0x9}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000a00)=0x7ff) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb100000001000000005000000020000000000000e030000000100000000007f7f00"], 0x0, 0x23, 0x0, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffff9c, 0x10, &(0x7f0000000640)={&(0x7f00000005c0)=""/95, 0x5f, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r5, 0x10, &(0x7f00000006c0)={&(0x7f0000000580), 0x0, r6}}, 0x10) r7 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x6, 0xffffffffffffffbe, 0x100000001, 0x0, 0x0, 0x8000, 0x440, 0x9, 0x1, 0x1, 0xa81, 0x6, 0x9, 0x5, 0x2, 0x5, 0x7, 0x5c, 0xfffffffffffeffff, 0x555, 0x6, 0x3, 0x2, 0x800, 0x100, 0x3, 0x8, 0x5, 0x5, 0xfffffffffffffffd, 0x6, 0x40, 0xd0f0, 0x3, 0x4, 0x3ff, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0xa04, 0x0, 0x9, 0x5, 0x0, 0x10001, 0x7fffffff}, r4, 0x10, r2, 0x3) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r3}, 0x2c) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0xffffffffffff45ac, 0x2, 0xd0, 0x7f, 0x0, 0x8, 0x1, 0x8, 0x100000001, 0x7, 0x3ff, 0x81, 0xfffffffffffffffb, 0xfffffffffffffff9, 0x3, 0x9, 0xfffffffffffffffe, 0x80, 0x9, 0xffff, 0xff, 0x3f, 0x7, 0x7ff, 0x9, 0x0, 0xfff, 0x1ff, 0x1, 0x10000, 0x33, 0x5, 0x58399e2, 0x3f, 0x673, 0x6, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000140), 0x4}, 0x10, 0x5, 0x1, 0x7, 0x6f60000, 0x9, 0xbe}, 0xffffffffffffffff, 0x4, r7, 0x0) close(r1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)={0x14, 0x4, 0x1627addb, 0x9, 0x20, r0, 0x5, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) [ 689.466193][ T24] audit: type=1804 audit(1563195032.097:190): pid=24860 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir217795719/syzkaller.cOOXm9/235/memory.events" dev="sda1" ino=16579 res=1 12:50:32 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) mkdir(0x0, 0x8) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:50:32 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000600)='^\n\xf6\x89\xb7G\x96\xb5-\xa7\xea \xc2c\x03G}nodev\\}\\ppp0%em1]\x16po') close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00'}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r2, &(0x7f0000001000)="413e8880f1f315857dbaa1bbfbf656b4fc0ecdac1ca73b13a95f69e38568fb69f2bbcfe9c72d6873889ad6b53d1e7404cd13ac21fd09468954312d26", 0x0}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'teql0\x00', @remote}) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) sendmsg$kcm(r3, &(0x7f0000001440)={0x0, 0xd7, 0x0}, 0x84) openat$tun(0xffffffffffffff9c, 0x0, 0x100, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000fc0)={&(0x7f0000000f80)='./file0\x00', r3}, 0x10) sendmsg$kcm(r1, 0x0, 0x20000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r3, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 689.536519][T24864] netlink: 'syz-executor.3': attribute type 8 has an invalid length. 12:50:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2e0000002700050ad25a80648c63940d0300fc00100003400a000000053582c137153e370900088004001700d1bd", 0x2e}], 0x1}, 0x0) 12:50:32 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) mkdir(0x0, 0x8) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 689.904913][ T24] audit: type=1804 audit(1563195032.537:191): pid=24877 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir149502207/syzkaller.tRWlb4/608/memory.events" dev="sda1" ino=16641 res=1 [ 689.950729][T24884] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 690.012556][T24884] netlink: 'syz-executor.3': attribute type 8 has an invalid length. [ 690.068749][ T24] audit: type=1804 audit(1563195032.707:192): pid=24885 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir217795719/syzkaller.cOOXm9/236/memory.events" dev="sda1" ino=16563 res=1 12:50:32 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000600)='^\n\xf6\x89\xb7G\x96\xb5-\xa7\xea \xc2c\x03G}nodev\\}\\ppp0%em1]\x16po') close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00'}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r2, &(0x7f0000001000)="413e8880f1f315857dbaa1bbfbf656b4fc0ecdac1ca73b13a95f69e38568fb69f2bbcfe9c72d6873889ad6b53d1e7404cd13ac21fd09468954312d26", 0x0}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'teql0\x00', @remote}) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) sendmsg$kcm(r3, &(0x7f0000001440)={0x0, 0xd7, 0x0}, 0x84) openat$tun(0xffffffffffffff9c, 0x0, 0x100, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000fc0)={&(0x7f0000000f80)='./file0\x00', r3}, 0x10) sendmsg$kcm(r1, 0x0, 0x20000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r3, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 12:50:32 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) mkdir(0x0, 0x8) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:50:32 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x4000000000005, 0x3, 0x100000001, 0x6}, 0x3c) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETLE(r1, 0x400454dc, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000009c0)={r0, &(0x7f0000000540)="6cedabef7d56a68026273634892f6d9519d75b8bc1a12fa6bcdd011aaeb5c5", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r4 = getpid() ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000840)={0x0, 0x70, 0x8, 0x100, 0x200, 0x7, 0x0, 0x20a2, 0x40000, 0x8, 0x4, 0x79, 0xa2c, 0x0, 0x8, 0xfffffffffffffffd, 0x6, 0x4, 0x2, 0x1, 0x100000000, 0x5, 0x0, 0xffff, 0x8, 0x40, 0x866, 0x7, 0x8, 0x1, 0x800, 0x5, 0x2, 0x3, 0x3, 0x8, 0x60f, 0x3, 0x0, 0x2, 0x0, @perf_config_ext={0x8}, 0x40, 0xa2, 0x4, 0x7, 0x8001, 0x1, 0x9}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000a00)=0x7ff) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb100000001000000005000000020000000000000e030000000100000000007f7f00"], 0x0, 0x23, 0x0, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffff9c, 0x10, &(0x7f0000000640)={&(0x7f00000005c0)=""/95, 0x5f, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r5, 0x10, &(0x7f00000006c0)={&(0x7f0000000580), 0x0, r6}}, 0x10) r7 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x6, 0xffffffffffffffbe, 0x100000001, 0x0, 0x0, 0x8000, 0x440, 0x9, 0x1, 0x1, 0xa81, 0x6, 0x9, 0x5, 0x2, 0x5, 0x7, 0x5c, 0xfffffffffffeffff, 0x555, 0x6, 0x3, 0x2, 0x800, 0x100, 0x3, 0x8, 0x5, 0x5, 0xfffffffffffffffd, 0x6, 0x40, 0xd0f0, 0x3, 0x4, 0x3ff, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0xa04, 0x0, 0x9, 0x5, 0x0, 0x10001, 0x7fffffff}, r4, 0x10, r2, 0x3) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r3}, 0x2c) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0xffffffffffff45ac, 0x2, 0xd0, 0x7f, 0x0, 0x8, 0x1, 0x8, 0x100000001, 0x7, 0x3ff, 0x81, 0xfffffffffffffffb, 0xfffffffffffffff9, 0x3, 0x9, 0xfffffffffffffffe, 0x80, 0x9, 0xffff, 0xff, 0x3f, 0x7, 0x7ff, 0x9, 0x0, 0xfff, 0x1ff, 0x1, 0x10000, 0x33, 0x5, 0x58399e2, 0x3f, 0x673, 0x6, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000140), 0x4}, 0x10, 0x5, 0x1, 0x7, 0x6f60000, 0x9, 0xbe}, 0xffffffffffffffff, 0x4, r7, 0x0) close(r1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)={0x14, 0x4, 0x1627addb, 0x9, 0x20, r0, 0x5, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) 12:50:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2e0000002700050ad25a80648c63940d0300fc00100003400a000000053582c137153e370900088004001700d1bd", 0x2e}], 0x1}, 0x0) 12:50:33 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x4000000000005, 0x3, 0x100000001, 0x6}, 0x3c) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETLE(r1, 0x400454dc, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000009c0)={r0, &(0x7f0000000540)="6cedabef7d56a68026273634892f6d9519d75b8bc1a12fa6bcdd011aaeb5c5", 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r4 = getpid() ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000840)={0x0, 0x70, 0x8, 0x100, 0x200, 0x7, 0x0, 0x20a2, 0x40000, 0x8, 0x4, 0x79, 0xa2c, 0x0, 0x8, 0xfffffffffffffffd, 0x6, 0x4, 0x2, 0x1, 0x100000000, 0x5, 0x0, 0xffff, 0x8, 0x40, 0x866, 0x7, 0x8, 0x1, 0x800, 0x5, 0x2, 0x3, 0x3, 0x8, 0x60f, 0x3, 0x0, 0x2, 0x0, @perf_config_ext={0x8}, 0x40, 0xa2, 0x4, 0x7, 0x8001, 0x1, 0x9}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000a00)=0x7ff) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb100000001000000005000000020000000000000e030000000100000000007f7f00"], 0x0, 0x23, 0x0, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={0xffffffffffffff9c, 0x10, &(0x7f0000000640)={&(0x7f00000005c0)=""/95, 0x5f, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r5, 0x10, &(0x7f00000006c0)={&(0x7f0000000580), 0x0, r6}}, 0x10) r7 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x6, 0xffffffffffffffbe, 0x100000001, 0x0, 0x0, 0x8000, 0x440, 0x9, 0x1, 0x1, 0xa81, 0x6, 0x9, 0x5, 0x2, 0x5, 0x7, 0x5c, 0xfffffffffffeffff, 0x555, 0x6, 0x3, 0x2, 0x800, 0x100, 0x3, 0x8, 0x5, 0x5, 0xfffffffffffffffd, 0x6, 0x40, 0xd0f0, 0x3, 0x4, 0x3ff, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0xa04, 0x0, 0x9, 0x5, 0x0, 0x10001, 0x7fffffff}, r4, 0x10, r2, 0x3) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r3}, 0x2c) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0xffffffffffff45ac, 0x2, 0xd0, 0x7f, 0x0, 0x8, 0x1, 0x8, 0x100000001, 0x7, 0x3ff, 0x81, 0xfffffffffffffffb, 0xfffffffffffffff9, 0x3, 0x9, 0xfffffffffffffffe, 0x80, 0x9, 0xffff, 0xff, 0x3f, 0x7, 0x7ff, 0x9, 0x0, 0xfff, 0x1ff, 0x1, 0x10000, 0x33, 0x5, 0x58399e2, 0x3f, 0x673, 0x6, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000140), 0x4}, 0x10, 0x5, 0x1, 0x7, 0x6f60000, 0x9, 0xbe}, 0xffffffffffffffff, 0x4, r7, 0x0) close(r1) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)={0x14, 0x4, 0x1627addb, 0x9, 0x20, r0, 0x5, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) 12:50:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x65}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 690.514339][ T24] audit: type=1804 audit(1563195033.147:193): pid=24900 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir149502207/syzkaller.tRWlb4/609/memory.events" dev="sda1" ino=16581 res=1 12:50:33 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x80000000000005, 0x8, 0x100000000000913, 0x6, 0x1}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000340)={r0, &(0x7f0000000200), 0x0}, 0x10) 12:50:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x3f000000, 0x6f}, [@ldst={0x7}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 12:50:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff44}, 0x70) r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0xa, &(0x7f0000000140), 0x20) 12:50:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x805, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x2, &(0x7f0000000180), 0x8) sendmsg$kcm(r0, &(0x7f0000001600)={&(0x7f0000000480)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000001340)=[{&(0x7f0000000080)="e5", 0x1}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:50:33 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xe, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, 0x0, &(0x7f00000000c0)=""/123}, 0x18) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) 12:50:33 executing program 1: r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000140)=@isdn={0x22, 0x0, 0x0, 0x90a}, 0x80, 0x0}, 0x0) 12:50:33 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00\x00\xff\xa0oup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000002c0)='../..\x00\x00\x00tap\x00\x89PY7/\x11\x99\xaaS\xf0\xbb\\\xf7\xb6L\xb73ke\x02d\xb1\xf1G\xddC\x9d\x1b\xce\xff;\aZ\'E\xf5\x00 \x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00 \x17\x87\x19<\xf2\xbf\xe8\xbcQ\xbc&@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\xb11j\x001Lf\x93\xdat=\xf8\x16\x19\xf1\xc36o2R\xee\a\x8c<8\xf2\xb0\xadD\x95\xdb\xcf\x89\xe4\x10\x86(\x8e\x13\xb6#\xb4M\x12\x8e\xb9\xed\xcc\xc4\xcf\xb5\xcdA<\xba?\x85m\xf7\xd9\'\x84\xac\x11T\x1c\x19\xabpM\x1f\x9dk\xe3\xba\b\xf5P\xfb\xc5\xa3\xe2=\xb9\xc4\xc1%E\x8d\xcaj}\xe5e\x89\xfa\x19\xa3\x1fO\x1f\xe4]n\"\x95e\xd8\xddVFn\xaf\x1c\x1f\x84$\x80M=)spB\xa6{\xc8\'u\x19\x9b|&\x92\x1e\xd1\xc0z\xaf\x82\x1d\xd0s\xc2\xefL\x16b\xf1\xe6,\x01CW\xd3\xce\x1e\x99bizKQ\xed)\xf9\xd2 :\"\xbeN\f\'\xd4HXk:Al\xd2\x7f3\xc0,\xab\xf8e4k\x0f\v\xc1\x9c\x02\xb2zo\xd0\x8aR\x98\x84J\xacK\xff\xff\xff\xff\xff\xff\xff\xfaY\xda\xa1\xf5\xf9tt\xc8\xe7!.\x9c\vogZ\xb7\xd5k\x1b\a\x00\x00\x00\x88R\xa7\x90%\x18\x87)\x1b\n\xcb\x1d\xe4\x1d\x9f\x9f.\xa2;\xe8@\x86\x03\x19Np\xbb\x00\xb4\r\xadnd\x1e\xb2\xb6nF%\x15\xbb\xc2\"4y\xba\xab\xb5}\x0f\xc5\xa3\x1cD\x89\xa7a\xd8\xee{F\xdb\t\x8dS\xaa&y', 0x2761, 0x0) 12:50:33 executing program 5: r0 = socket$kcm(0x10, 0x80000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000140)="d094ee6687edb946c2e5aeeac5c8913a36d511ca01a7f0cf4416b0908f", 0x1d}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001280)="d800000018008106e00f80ecdb4cf904021d65ef0b007c05e8fe55a1bc00050000000000f8000f00050000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798267141f12aef70d12f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cabc8e34451966657f2a9ecbee5de6ccd40dd6e4edef3d93452a92", 0xd8}], 0x1}, 0x0) 12:50:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x2, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='Q\xa2\xa2\x11\xbbo-\x95\xd3\xc0I\x960(U\x06\t.\xc3\t\xa4\xd5\x99\x02_2\x01\r\xf8\xedxR\xc2\a\xc0\x17\x15k3\xfc\xe7\x9d\xea\xe7\x19M#\"N\xe4\xe4\xc5\xe3!\xfd\x80\xb7', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x2e8}, 0x34) 12:50:33 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x200004000000001, 0x0) r0 = socket$kcm(0x10, 0x200000000003, 0x4) sendmsg$kcm(r0, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="39000000140081ae00d175040f62b04a2b546f2a66bf8c6e3fa1bcb3735858eba3390983b34f897506e606dbb7d553b4a40000000000000008", 0x39}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) 12:50:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x1e}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:50:34 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0xf, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8916, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2100) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000100)={r4}) 12:50:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f01030000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x73}, 0x0) 12:50:34 executing program 2: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local, 0x4}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000340)="84", 0x1}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x7, &(0x7f0000000080), 0x4) 12:50:34 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0xa, 0x1000000000000001, 0x0) socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x10, 0x3, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000000900)={0x1, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:50:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x805, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x2, &(0x7f0000000180), 0x8) sendmsg$kcm(r0, &(0x7f0000001600)={&(0x7f0000000480)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000001340)=[{&(0x7f0000000080)="e5", 0x1}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:50:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff000}, {0x16}]}) [ 691.875178][ C0] net_ratelimit: 20 callbacks suppressed [ 691.875212][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 691.875420][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 691.881053][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 691.887225][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 691.892694][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 691.918347][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:50:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f01030000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x73}, 0x0) [ 692.101031][T24965] device nr0 entered promiscuous mode 12:50:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x805, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x2, &(0x7f0000000180), 0x8) sendmsg$kcm(r0, &(0x7f0000001600)={&(0x7f0000000480)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000001340)=[{&(0x7f0000000080)="e5", 0x1}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:50:35 executing program 0: openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0xfffffffffffffee5) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="aa396016d96780fb8001fd927c4e9030cf7f6c921aa8cf547fcfd065795b6a31c024a88c8c18d9a00bf273ae1e28c698de128524afbc0e724d6d029e6b84b625d20260b9f0afbecf7ac6231f1f0bf4180a8f30cd59c7143b9950eb673abfc55f10e9e86b518667fed4fd65f35a21b157186e194038e611eda803c25374412a983061124711f4edc7779ee1a48ee1e9da7cab7b1edc4cda554a85a24c47a92a0aaa00f49291477ac93640aaf35642d14ac9a1d6390a2081e46ebae080dff59f29589d593ee42a500180deb588477a4e9ee916e4966e7a"], 0xd6) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000000000000, 0x9900, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x1f, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x10000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x4280, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x100) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) [ 692.623686][ T24] audit: type=1804 audit(1563195035.257:194): pid=24992 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir988695061/syzkaller.8TMcOE/15/memory.events" dev="sda1" ino=16642 res=1 12:50:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f01030000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x73}, 0x0) 12:50:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x2}, @const]}}, &(0x7f0000000140)=""/202, 0x32, 0xca, 0x2}, 0x20) 12:50:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x2000, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0x0) 12:50:35 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0xf, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8916, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2100) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000100)={r4}) 12:50:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x2, 0x300) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000080)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000000)="9cffff0000000000009b80000806", 0xe}], 0x1}, 0x0) 12:50:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x805, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x2, &(0x7f0000000180), 0x8) sendmsg$kcm(r0, &(0x7f0000001600)={&(0x7f0000000480)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000001340)=[{&(0x7f0000000080)="e5", 0x1}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:50:35 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0x3e) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$TUNSETCARRIER(r4, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') 12:50:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xeca60000, 0xffffff7f01030000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x73}, 0x0) [ 693.655421][ T24] audit: type=1804 audit(1563195036.287:195): pid=25019 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir988695061/syzkaller.8TMcOE/15/memory.events" dev="sda1" ino=16642 res=1 12:50:36 executing program 0: openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0xfffffffffffffee5) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="aa396016d96780fb8001fd927c4e9030cf7f6c921aa8cf547fcfd065795b6a31c024a88c8c18d9a00bf273ae1e28c698de128524afbc0e724d6d029e6b84b625d20260b9f0afbecf7ac6231f1f0bf4180a8f30cd59c7143b9950eb673abfc55f10e9e86b518667fed4fd65f35a21b157186e194038e611eda803c25374412a983061124711f4edc7779ee1a48ee1e9da7cab7b1edc4cda554a85a24c47a92a0aaa00f49291477ac93640aaf35642d14ac9a1d6390a2081e46ebae080dff59f29589d593ee42a500180deb588477a4e9ee916e4966e7a"], 0xd6) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000000000000, 0x9900, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x1f, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x10000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x4280, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x100) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 12:50:36 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0x3e) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$TUNSETCARRIER(r4, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') 12:50:36 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0x3e) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$TUNSETCARRIER(r4, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') 12:50:36 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0xf, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8916, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2100) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000100)={r4}) 12:50:36 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x15, 0x0, 0x8) [ 694.118157][ T24] audit: type=1804 audit(1563195036.757:196): pid=25031 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir988695061/syzkaller.8TMcOE/16/memory.events" dev="sda1" ino=16642 res=1 12:50:37 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0x1000, 0x10}, 0xc) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x9, 0x2, 0x6, 0x4, 0xffffffffffffffff, 0x558c, [], 0x0, 0xffffffffffffff9c, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000900)={r1, &(0x7f0000000880)="4a6f567708e96474a6d2653677a75bf066e39372c9fe99d461bdf06ee18422d8721fe70019e855876c79ef6304093678c6d0add1352ca9de8c7bf7bbded045c8da7a983c5e88e735c7555ef210bd7167154577fd4b720b26dd0cd1c591a0356e7ee2ad8652315d495ced47b23a7c514e18ac07"}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0xffffffffffffffdb}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000580)='ip6_vti1\x00') 12:50:37 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0x3e) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$TUNSETCARRIER(r4, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') 12:50:37 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') 12:50:37 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0x3e) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$TUNSETCARRIER(r4, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') 12:50:37 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0x1000, 0x10}, 0xc) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x9, 0x2, 0x6, 0x4, 0xffffffffffffffff, 0x558c, [], 0x0, 0xffffffffffffff9c, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000900)={r1, &(0x7f0000000880)="4a6f567708e96474a6d2653677a75bf066e39372c9fe99d461bdf06ee18422d8721fe70019e855876c79ef6304093678c6d0add1352ca9de8c7bf7bbded045c8da7a983c5e88e735c7555ef210bd7167154577fd4b720b26dd0cd1c591a0356e7ee2ad8652315d495ced47b23a7c514e18ac07"}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0xffffffffffffffdb}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000580)='ip6_vti1\x00') 12:50:37 executing program 0: openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0xfffffffffffffee5) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="aa396016d96780fb8001fd927c4e9030cf7f6c921aa8cf547fcfd065795b6a31c024a88c8c18d9a00bf273ae1e28c698de128524afbc0e724d6d029e6b84b625d20260b9f0afbecf7ac6231f1f0bf4180a8f30cd59c7143b9950eb673abfc55f10e9e86b518667fed4fd65f35a21b157186e194038e611eda803c25374412a983061124711f4edc7779ee1a48ee1e9da7cab7b1edc4cda554a85a24c47a92a0aaa00f49291477ac93640aaf35642d14ac9a1d6390a2081e46ebae080dff59f29589d593ee42a500180deb588477a4e9ee916e4966e7a"], 0xd6) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000000000000, 0x9900, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x1f, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x10000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x4280, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x100) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) [ 695.295452][T25046] device nr0 entered promiscuous mode [ 695.374444][ T24] audit: type=1804 audit(1563195038.007:197): pid=25084 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir988695061/syzkaller.8TMcOE/17/memory.events" dev="sda1" ino=16642 res=1 12:50:38 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0x3e) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$TUNSETCARRIER(r4, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') 12:50:38 executing program 4: r0 = socket$kcm(0x29, 0xfffffffffffffffd, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000007ac0)={&(0x7f0000007780)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000079c0)=[{&(0x7f0000007800)=""/130, 0x82}, {&(0x7f00000078c0)}, {&(0x7f0000007900)=""/160, 0xa0}], 0x3, &(0x7f0000007a00)=""/135, 0x87}, 0x140) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0x400000004, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r2, &(0x7f0000000200)="f21c", 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000600)='io.stat\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000480)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000580)=0x7, 0x12) r7 = openat$cgroup_ro(r6, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000100)={r6}) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x83, &(0x7f0000000fc0)=ANY=[@ANYBLOB="7ba8f8c81ba657e373000000f4de26a30000000000000054b3ef0892fdff3fe28307b1cf7fc30c9c8bda2ef9cd489ad4750a8e308921078f886c7c1315729b34f8ced91549c4dbcd026ff7cf02901671beee07659cd458ad168e023e97537c91071797507107d3001911145e1f676a080000000000000072c2e72dbb079ee600ae835d6c99d4525ccde1fc9530490804000000cb875c20698066d27d53e1bf6339066bc77548c64428e6bf32b6828d9b5c981e5f4e20ae903650d12c43c182e7458c04b5e113a7170b2d7800000000eb97308b22273dfcfbb18331e4df2fbdac4009df3c90ef194eea212e5f951c75d9fed156a1c4b3c3be788ec3846beba30bb2da91e2bb1566c132b82a02e508a3147afefe5a2dbbd98e35ddbc4bcf2cbb8ae6f9a8bb9d9f3d400004593122e464c7d6c817e39cf962a05c3dd191bcaf54f5240d4a94abb26ddb6d73acfef71da7a4d866766433dc5ed3d7ebf77dc6a44bab6430d945737fb6a0c3faff05f36a1fb8fd90d9e0238d7d5082e95e437f08efbb14cef872e8975c96721d564b50baf1856f82c083eb795030906b269539512e51084796546c49843fabc53640e2ccc6a59bea63862d76d8ce84c66c6739b1f4664f763dd4f0ad6c97457b33d6b9766b1c3aeac6419ff48767117e3f2b08000000000000003cec8286a40c4efcc56e629207d139681c0cabffb6a4fe57e74343c8306f4d752d49add67e0c611a33ff070000000000002a4a2a1d279536d0cea0714f1374b403609ed964c8a5ef251c7fd92d604d4a9e57eb3fcbe34ac6cb647e54aa5edd89c9ebf85951f1ea8ed53b7725d9dea0af20b0414eb77ee48768427d1ca4d1158bbb0db84bc8be64f639de5a7a499aa3de2f82dcf9409b17dabff996016941fb860001000000000000779756db4649003fad7cc1a0026d30e3daf6e85b7711d7ea4d80f7b032a3025d60065d0000000000000000000000000000002580f8f544d4e167b3a0e469bbf5de438cdaabcdebfb2614451181c1760570cb02eeb86a1936be3e243b9c411d1f9aef6f48ee86b55380ffce569e0f9a36a1e14ba319be6d3c4c9ec931cdfd0fbd4094120b8b4e42f0dbc05a8ed5fbcbad7ca7da2a9bc867e61c657038bc97d3b2604b5d326031d7a212f983627ec16514df881ccb306f932bd5be08d18ab22f1c510000000000000000000000000000a04ecfd3abb51bdf9336b5b0266874243e00002000565611eac5ab6f81c5bef1568c8df17d41f9e4b08e3769f1b8a8ff304e00acf1d40e144eda869c873e8fe877a819140d492cb80e3327e6db47f390cdd8c0c47eb630d25ba5dae218b288f4707ab8d40747a68894e54ed131597a3f792e936713b905ba987fb08dee08f3c90e975234a1d2b227007cc2afc97e8355e9b8b47a0fa080f822000000000000c76c9c03585f317c8d8ef841185beb2f2b726fc78c1ff2de1d45a134fcef2e107c322b45"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$kcm(0x29, 0x7, 0x0) r8 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x800, 0x20000000, @perf_config_ext, 0x1411, 0xc92, 0x3e}, r8, 0x3, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r7, 0x800454d3, &(0x7f0000000400)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)={r7}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNSETVNETLE(r9, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) close(0xffffffffffffffff) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r11, &(0x7f00000000c0), 0xffffff19) close(r10) 12:50:38 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, [], 0x0, 0x0, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000140)=0x3e) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$TUNSETCARRIER(r4, 0x400454e2, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000940)='wlan0:$keyringpro%]]\'}posix_acl_accesskeyringuser\x00') 12:50:38 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0xf, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8916, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2100) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000100)={r4}) 12:50:38 executing program 0: openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0xfffffffffffffee5) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="aa396016d96780fb8001fd927c4e9030cf7f6c921aa8cf547fcfd065795b6a31c024a88c8c18d9a00bf273ae1e28c698de128524afbc0e724d6d029e6b84b625d20260b9f0afbecf7ac6231f1f0bf4180a8f30cd59c7143b9950eb673abfc55f10e9e86b518667fed4fd65f35a21b157186e194038e611eda803c25374412a983061124711f4edc7779ee1a48ee1e9da7cab7b1edc4cda554a85a24c47a92a0aaa00f49291477ac93640aaf35642d14ac9a1d6390a2081e46ebae080dff59f29589d593ee42a500180deb588477a4e9ee916e4966e7a"], 0xd6) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000000000000, 0x9900, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x1f, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x10000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x4280, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(r2, 0x0, 0x100) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) 12:50:38 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0x1000, 0x10}, 0xc) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x9, 0x2, 0x6, 0x4, 0xffffffffffffffff, 0x558c, [], 0x0, 0xffffffffffffff9c, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000900)={r1, &(0x7f0000000880)="4a6f567708e96474a6d2653677a75bf066e39372c9fe99d461bdf06ee18422d8721fe70019e855876c79ef6304093678c6d0add1352ca9de8c7bf7bbded045c8da7a983c5e88e735c7555ef210bd7167154577fd4b720b26dd0cd1c591a0356e7ee2ad8652315d495ced47b23a7c514e18ac07"}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0xffffffffffffffdb}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000580)='ip6_vti1\x00') [ 696.470232][ T24] audit: type=1804 audit(1563195039.107:198): pid=25103 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir988695061/syzkaller.8TMcOE/18/memory.events" dev="sda1" ino=16519 res=1 12:50:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="2e0000001e000500ed0080648c6301737e31d20010003d000000000300f88000f0170050bd000000000000000000", 0x2e}], 0x1}, 0x0) 12:50:39 executing program 4: r0 = socket$kcm(0x29, 0xfffffffffffffffd, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000007ac0)={&(0x7f0000007780)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000079c0)=[{&(0x7f0000007800)=""/130, 0x82}, {&(0x7f00000078c0)}, {&(0x7f0000007900)=""/160, 0xa0}], 0x3, &(0x7f0000007a00)=""/135, 0x87}, 0x140) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0x400000004, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r2, &(0x7f0000000200)="f21c", 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000600)='io.stat\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000480)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000580)=0x7, 0x12) r7 = openat$cgroup_ro(r6, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000100)={r6}) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x83, &(0x7f0000000fc0)=ANY=[@ANYBLOB="7ba8f8c81ba657e373000000f4de26a30000000000000054b3ef0892fdff3fe28307b1cf7fc30c9c8bda2ef9cd489ad4750a8e308921078f886c7c1315729b34f8ced91549c4dbcd026ff7cf02901671beee07659cd458ad168e023e97537c91071797507107d3001911145e1f676a080000000000000072c2e72dbb079ee600ae835d6c99d4525ccde1fc9530490804000000cb875c20698066d27d53e1bf6339066bc77548c64428e6bf32b6828d9b5c981e5f4e20ae903650d12c43c182e7458c04b5e113a7170b2d7800000000eb97308b22273dfcfbb18331e4df2fbdac4009df3c90ef194eea212e5f951c75d9fed156a1c4b3c3be788ec3846beba30bb2da91e2bb1566c132b82a02e508a3147afefe5a2dbbd98e35ddbc4bcf2cbb8ae6f9a8bb9d9f3d400004593122e464c7d6c817e39cf962a05c3dd191bcaf54f5240d4a94abb26ddb6d73acfef71da7a4d866766433dc5ed3d7ebf77dc6a44bab6430d945737fb6a0c3faff05f36a1fb8fd90d9e0238d7d5082e95e437f08efbb14cef872e8975c96721d564b50baf1856f82c083eb795030906b269539512e51084796546c49843fabc53640e2ccc6a59bea63862d76d8ce84c66c6739b1f4664f763dd4f0ad6c97457b33d6b9766b1c3aeac6419ff48767117e3f2b08000000000000003cec8286a40c4efcc56e629207d139681c0cabffb6a4fe57e74343c8306f4d752d49add67e0c611a33ff070000000000002a4a2a1d279536d0cea0714f1374b403609ed964c8a5ef251c7fd92d604d4a9e57eb3fcbe34ac6cb647e54aa5edd89c9ebf85951f1ea8ed53b7725d9dea0af20b0414eb77ee48768427d1ca4d1158bbb0db84bc8be64f639de5a7a499aa3de2f82dcf9409b17dabff996016941fb860001000000000000779756db4649003fad7cc1a0026d30e3daf6e85b7711d7ea4d80f7b032a3025d60065d0000000000000000000000000000002580f8f544d4e167b3a0e469bbf5de438cdaabcdebfb2614451181c1760570cb02eeb86a1936be3e243b9c411d1f9aef6f48ee86b55380ffce569e0f9a36a1e14ba319be6d3c4c9ec931cdfd0fbd4094120b8b4e42f0dbc05a8ed5fbcbad7ca7da2a9bc867e61c657038bc97d3b2604b5d326031d7a212f983627ec16514df881ccb306f932bd5be08d18ab22f1c510000000000000000000000000000a04ecfd3abb51bdf9336b5b0266874243e00002000565611eac5ab6f81c5bef1568c8df17d41f9e4b08e3769f1b8a8ff304e00acf1d40e144eda869c873e8fe877a819140d492cb80e3327e6db47f390cdd8c0c47eb630d25ba5dae218b288f4707ab8d40747a68894e54ed131597a3f792e936713b905ba987fb08dee08f3c90e975234a1d2b227007cc2afc97e8355e9b8b47a0fa080f822000000000000c76c9c03585f317c8d8ef841185beb2f2b726fc78c1ff2de1d45a134fcef2e107c322b45"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$kcm(0x29, 0x7, 0x0) r8 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x800, 0x20000000, @perf_config_ext, 0x1411, 0xc92, 0x3e}, r8, 0x3, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r7, 0x800454d3, &(0x7f0000000400)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)={r7}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNSETVNETLE(r9, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) close(0xffffffffffffffff) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r11, &(0x7f00000000c0), 0xffffff19) close(r10) [ 696.614174][T25121] validate_nla: 4 callbacks suppressed [ 696.614184][T25121] netlink: 'syz-executor.2': attribute type 61 has an invalid length. 12:50:39 executing program 2: gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r2, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000200)={0x0, 0x70, 0x0, 0x5, 0x0, 0x7, 0x0, 0x1f, 0x2000, 0x4, 0x1, 0xfc000000, 0x0, 0x100000000, 0x0, 0x80000000, 0x401, 0x2, 0x100000000, 0x0, 0x8, 0x5, 0x9, 0x100000000, 0x4, 0x1ffc, 0x5, 0x0, 0x9, 0x0, 0x4, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffeff, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x4c3}, 0x0, 0x1, 0x0, 0xf, 0x100000001, 0x9, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) close(r3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000100)={0x3, 0x0, [0x0, 0x0, 0x0]}) [ 697.003817][T25119] device nr0 entered promiscuous mode 12:50:39 executing program 2: gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r2, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000200)={0x0, 0x70, 0x0, 0x5, 0x0, 0x7, 0x0, 0x1f, 0x2000, 0x4, 0x1, 0xfc000000, 0x0, 0x100000000, 0x0, 0x80000000, 0x401, 0x2, 0x100000000, 0x0, 0x8, 0x5, 0x9, 0x100000000, 0x4, 0x1ffc, 0x5, 0x0, 0x9, 0x0, 0x4, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffeff, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x4c3}, 0x0, 0x1, 0x0, 0xf, 0x100000001, 0x9, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) close(r3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000100)={0x3, 0x0, [0x0, 0x0, 0x0]}) 12:50:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00014108410000000a00180e0006001502cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) 12:50:40 executing program 2: gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r2, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000200)={0x0, 0x70, 0x0, 0x5, 0x0, 0x7, 0x0, 0x1f, 0x2000, 0x4, 0x1, 0xfc000000, 0x0, 0x100000000, 0x0, 0x80000000, 0x401, 0x2, 0x100000000, 0x0, 0x8, 0x5, 0x9, 0x100000000, 0x4, 0x1ffc, 0x5, 0x0, 0x9, 0x0, 0x4, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffeff, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x4c3}, 0x0, 0x1, 0x0, 0xf, 0x100000001, 0x9, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) close(r3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000100)={0x3, 0x0, [0x0, 0x0, 0x0]}) 12:50:40 executing program 2: gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r2, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000200)={0x0, 0x70, 0x0, 0x5, 0x0, 0x7, 0x0, 0x1f, 0x2000, 0x4, 0x1, 0xfc000000, 0x0, 0x100000000, 0x0, 0x80000000, 0x401, 0x2, 0x100000000, 0x0, 0x8, 0x5, 0x9, 0x100000000, 0x4, 0x1ffc, 0x5, 0x0, 0x9, 0x0, 0x4, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffeff, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x4c3}, 0x0, 0x1, 0x0, 0xf, 0x100000001, 0x9, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) close(r3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000100)={0x3, 0x0, [0x0, 0x0, 0x0]}) 12:50:40 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0x1000, 0x10}, 0xc) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x9, 0x2, 0x6, 0x4, 0xffffffffffffffff, 0x558c, [], 0x0, 0xffffffffffffff9c, 0x1}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000900)={r1, &(0x7f0000000880)="4a6f567708e96474a6d2653677a75bf066e39372c9fe99d461bdf06ee18422d8721fe70019e855876c79ef6304093678c6d0add1352ca9de8c7bf7bbded045c8da7a983c5e88e735c7555ef210bd7167154577fd4b720b26dd0cd1c591a0356e7ee2ad8652315d495ced47b23a7c514e18ac07"}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0xffffffffffffffdb}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000580)='ip6_vti1\x00') 12:50:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 12:50:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xe, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x5c}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 12:50:40 executing program 4: r0 = socket$kcm(0x29, 0xfffffffffffffffd, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000007ac0)={&(0x7f0000007780)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000079c0)=[{&(0x7f0000007800)=""/130, 0x82}, {&(0x7f00000078c0)}, {&(0x7f0000007900)=""/160, 0xa0}], 0x3, &(0x7f0000007a00)=""/135, 0x87}, 0x140) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0x400000004, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r2, &(0x7f0000000200)="f21c", 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000600)='io.stat\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000480)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000580)=0x7, 0x12) r7 = openat$cgroup_ro(r6, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000100)={r6}) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x83, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$kcm(0x29, 0x7, 0x0) r8 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x800, 0x20000000, @perf_config_ext, 0x1411, 0xc92, 0x3e}, r8, 0x3, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r7, 0x800454d3, &(0x7f0000000400)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)={r7}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNSETVNETLE(r9, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) close(0xffffffffffffffff) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r11, &(0x7f00000000c0), 0xffffff19) close(r10) 12:50:40 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000002700050ad25a80648c63940d0300fc00100003400a000000053582c137153e370900018004001700d1bd", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 12:50:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)="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", 0xcfa}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='io.s\xeb\xba\xa9\xd1', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) recvmsg$kcm(r0, &(0x7f0000009ac0)={0x0, 0x0, 0x0}, 0x0) 12:50:40 executing program 3: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') [ 698.214316][T25166] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 698.263035][T25166] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 12:50:41 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETPERSIST(r0, 0x800454dd, 0x70d000) 12:50:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000002700050ad25a80648c63940d0300fc00100003400a000000053582c137153e370900018004001700d1bd", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 698.460008][T25169] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.2'. [ 698.485802][T25173] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.2'. 12:50:41 executing program 4: r0 = socket$kcm(0x29, 0xfffffffffffffffd, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000007ac0)={&(0x7f0000007780)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000079c0)=[{&(0x7f0000007800)=""/130, 0x82}, {&(0x7f00000078c0)}, {&(0x7f0000007900)=""/160, 0xa0}], 0x3, &(0x7f0000007a00)=""/135, 0x87}, 0x140) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0x400000004, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r2, &(0x7f0000000200)="f21c", 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000600)='io.stat\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000480)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000580)=0x7, 0x12) r7 = openat$cgroup_ro(r6, &(0x7f0000000340)='pids.current\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000100)={r6}) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x83, &(0x7f0000000fc0)=ANY=[@ANYBLOB="7ba8f8c81ba657e373000000f4de26a30000000000000054b3ef0892fdff3fe28307b1cf7fc30c9c8bda2ef9cd489ad4750a8e308921078f886c7c1315729b34f8ced91549c4dbcd026ff7cf02901671beee07659cd458ad168e023e97537c91071797507107d3001911145e1f676a080000000000000072c2e72dbb079ee600ae835d6c99d4525ccde1fc9530490804000000cb875c20698066d27d53e1bf6339066bc77548c64428e6bf32b6828d9b5c981e5f4e20ae903650d12c43c182e7458c04b5e113a7170b2d7800000000eb97308b22273dfcfbb18331e4df2fbdac4009df3c90ef194eea212e5f951c75d9fed156a1c4b3c3be788ec3846beba30bb2da91e2bb1566c132b82a02e508a3147afefe5a2dbbd98e35ddbc4bcf2cbb8ae6f9a8bb9d9f3d400004593122e464c7d6c817e39cf962a05c3dd191bcaf54f5240d4a94abb26ddb6d73acfef71da7a4d866766433dc5ed3d7ebf77dc6a44bab6430d945737fb6a0c3faff05f36a1fb8fd90d9e0238d7d5082e95e437f08efbb14cef872e8975c96721d564b50baf1856f82c083eb795030906b269539512e51084796546c49843fabc53640e2ccc6a59bea63862d76d8ce84c66c6739b1f4664f763dd4f0ad6c97457b33d6b9766b1c3aeac6419ff48767117e3f2b08000000000000003cec8286a40c4efcc56e629207d139681c0cabffb6a4fe57e74343c8306f4d752d49add67e0c611a33ff070000000000002a4a2a1d279536d0cea0714f1374b403609ed964c8a5ef251c7fd92d604d4a9e57eb3fcbe34ac6cb647e54aa5edd89c9ebf85951f1ea8ed53b7725d9dea0af20b0414eb77ee48768427d1ca4d1158bbb0db84bc8be64f639de5a7a499aa3de2f82dcf9409b17dabff996016941fb860001000000000000779756db4649003fad7cc1a0026d30e3daf6e85b7711d7ea4d80f7b032a3025d60065d0000000000000000000000000000002580f8f544d4e167b3a0e469bbf5de438cdaabcdebfb2614451181c1760570cb02eeb86a1936be3e243b9c411d1f9aef6f48ee86b55380ffce569e0f9a36a1e14ba319be6d3c4c9ec931cdfd0fbd4094120b8b4e42f0dbc05a8ed5fbcbad7ca7da2a9bc867e61c657038bc97d3b2604b5d326031d7a212f983627ec16514df881ccb306f932bd5be08d18ab22f1c510000000000000000000000000000a04ecfd3abb51bdf9336b5b0266874243e00002000565611eac5ab6f81c5bef1568c8df17d41f9e4b08e3769f1b8a8ff304e00acf1d40e144eda869c873e8fe877a819140d492cb80e3327e6db47f390cdd8c0c47eb630d25ba5dae218b288f4707ab8d40747a68894e54ed131597a3f792e936713b905ba987fb08dee08f3c90e975234a1d2b227007cc2afc97e8355e9b8b47a0fa080f822000000000000c76c9c03585f317c8d8ef841185beb2f2b726fc78c1ff2de1d45a134fcef2e107c322b45"], 0x0, 0x1, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$kcm(0x29, 0x7, 0x0) r8 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x800, 0x20000000, @perf_config_ext, 0x1411, 0xc92, 0x3e}, r8, 0x3, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r7, 0x800454d3, &(0x7f0000000400)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400), 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)={r7}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TUNSETVNETLE(r9, 0x400454dc, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) close(0xffffffffffffffff) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r11, &(0x7f00000000c0), 0xffffff19) close(r10) [ 698.568816][T25186] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 698.595732][T25186] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 12:50:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x28, &(0x7f0000000040), &(0x7f0000000140)=""/40}, 0x28) 12:50:41 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000000c0)='GPLvmnet1#\x00'}, 0x30) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x101, 0x5, 0x9, 0x5, 0x0, 0xbeb7, 0x10000, 0x1, 0x3, 0x10000, 0x6, 0x100000000, 0xf0a, 0x1000, 0x9, 0x8, 0x5, 0x9, 0x5, 0x4, 0xfffffffffffffffe, 0x100, 0x3b10, 0xffffffffffffe709, 0xfffffffffffffffc, 0x0, 0x6, 0x1000, 0xc, 0xfff, 0x100000000, 0x4, 0x80000001, 0x5, 0x81, 0x9, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x400, 0xffffffffffffff51, 0x101, 0x7, 0x20, 0xfffffffffffffffe, 0x3}, r0, 0x6, 0xffffffffffffffff, 0x5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000300)=').\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r1, r2, 0x0, 0x12, &(0x7f00000002c0)='./cgroup.net/syz1\x00', r3}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x305) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000c200)={&(0x7f000000bcc0)=@hci, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) socket$kcm(0x2b, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x1f, 0x4, 0x7, 0x800, 0x0, 0x9, 0x10800, 0x4, 0x80000001, 0x3f, 0x4, 0x80000000, 0x6, 0x93b6, 0x0, 0x9, 0x9, 0x10000, 0x1000, 0x9, 0x40, 0x7f, 0x6, 0x1, 0x7f20f68a, 0x1, 0x4, 0x2, 0xfffffffffffffffd, 0xfffffffffffffffc, 0x4, 0x0, 0x6, 0x8d, 0x4, 0x4, 0x0, 0x98a, 0x3, @perf_bp={&(0x7f00000003c0), 0xa}, 0x400, 0x5, 0x1, 0x3, 0x3, 0x8, 0x80000001}, r1, 0x6, r2, 0x9) openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r6, &(0x7f0000000280), 0xffffffb3) 12:50:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000002700050ad25a80648c63940d0300fc00100003400a000000053582c137153e370900018004001700d1bd", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 698.855506][T25201] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 698.875553][T25201] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 698.886940][T25200] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 12:50:41 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000002700050ad25a80648c63940d0300fc00100003400a000000053582c137153e370900018004001700d1bd", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 699.014631][T25187] device nr0 entered promiscuous mode [ 699.034266][T25205] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 12:50:41 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000000c0)='GPLvmnet1#\x00'}, 0x30) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x101, 0x5, 0x9, 0x5, 0x0, 0xbeb7, 0x10000, 0x1, 0x3, 0x10000, 0x6, 0x100000000, 0xf0a, 0x1000, 0x9, 0x8, 0x5, 0x9, 0x5, 0x4, 0xfffffffffffffffe, 0x100, 0x3b10, 0xffffffffffffe709, 0xfffffffffffffffc, 0x0, 0x6, 0x1000, 0xc, 0xfff, 0x100000000, 0x4, 0x80000001, 0x5, 0x81, 0x9, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x400, 0xffffffffffffff51, 0x101, 0x7, 0x20, 0xfffffffffffffffe, 0x3}, r0, 0x6, 0xffffffffffffffff, 0x5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000300)=').\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r1, r2, 0x0, 0x12, &(0x7f00000002c0)='./cgroup.net/syz1\x00', r3}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x305) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000c200)={&(0x7f000000bcc0)=@hci, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) socket$kcm(0x2b, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x1f, 0x4, 0x7, 0x800, 0x0, 0x9, 0x10800, 0x4, 0x80000001, 0x3f, 0x4, 0x80000000, 0x6, 0x93b6, 0x0, 0x9, 0x9, 0x10000, 0x1000, 0x9, 0x40, 0x7f, 0x6, 0x1, 0x7f20f68a, 0x1, 0x4, 0x2, 0xfffffffffffffffd, 0xfffffffffffffffc, 0x4, 0x0, 0x6, 0x8d, 0x4, 0x4, 0x0, 0x98a, 0x3, @perf_bp={&(0x7f00000003c0), 0xa}, 0x400, 0x5, 0x1, 0x3, 0x3, 0x8, 0x80000001}, r1, 0x6, r2, 0x9) openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r6, &(0x7f0000000280), 0xffffffb3) [ 699.140263][T25209] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 12:50:41 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000000c0)='GPLvmnet1#\x00'}, 0x30) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x101, 0x5, 0x9, 0x5, 0x0, 0xbeb7, 0x10000, 0x1, 0x3, 0x10000, 0x6, 0x100000000, 0xf0a, 0x1000, 0x9, 0x8, 0x5, 0x9, 0x5, 0x4, 0xfffffffffffffffe, 0x100, 0x3b10, 0xffffffffffffe709, 0xfffffffffffffffc, 0x0, 0x6, 0x1000, 0xc, 0xfff, 0x100000000, 0x4, 0x80000001, 0x5, 0x81, 0x9, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x400, 0xffffffffffffff51, 0x101, 0x7, 0x20, 0xfffffffffffffffe, 0x3}, r0, 0x6, 0xffffffffffffffff, 0x5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000300)=').\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r1, r2, 0x0, 0x12, &(0x7f00000002c0)='./cgroup.net/syz1\x00', r3}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x305) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000c200)={&(0x7f000000bcc0)=@hci, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) socket$kcm(0x2b, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x1f, 0x4, 0x7, 0x800, 0x0, 0x9, 0x10800, 0x4, 0x80000001, 0x3f, 0x4, 0x80000000, 0x6, 0x93b6, 0x0, 0x9, 0x9, 0x10000, 0x1000, 0x9, 0x40, 0x7f, 0x6, 0x1, 0x7f20f68a, 0x1, 0x4, 0x2, 0xfffffffffffffffd, 0xfffffffffffffffc, 0x4, 0x0, 0x6, 0x8d, 0x4, 0x4, 0x0, 0x98a, 0x3, @perf_bp={&(0x7f00000003c0), 0xa}, 0x400, 0x5, 0x1, 0x3, 0x3, 0x8, 0x80000001}, r1, 0x6, r2, 0x9) openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r6, &(0x7f0000000280), 0xffffffb3) 12:50:42 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000000c0)='GPLvmnet1#\x00'}, 0x30) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x101, 0x5, 0x9, 0x5, 0x0, 0xbeb7, 0x10000, 0x1, 0x3, 0x10000, 0x6, 0x100000000, 0xf0a, 0x1000, 0x9, 0x8, 0x5, 0x9, 0x5, 0x4, 0xfffffffffffffffe, 0x100, 0x3b10, 0xffffffffffffe709, 0xfffffffffffffffc, 0x0, 0x6, 0x1000, 0xc, 0xfff, 0x100000000, 0x4, 0x80000001, 0x5, 0x81, 0x9, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x400, 0xffffffffffffff51, 0x101, 0x7, 0x20, 0xfffffffffffffffe, 0x3}, r0, 0x6, 0xffffffffffffffff, 0x5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000300)=').\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r1, r2, 0x0, 0x12, &(0x7f00000002c0)='./cgroup.net/syz1\x00', r3}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x305) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000c200)={&(0x7f000000bcc0)=@hci, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) socket$kcm(0x2b, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x1f, 0x4, 0x7, 0x800, 0x0, 0x9, 0x10800, 0x4, 0x80000001, 0x3f, 0x4, 0x80000000, 0x6, 0x93b6, 0x0, 0x9, 0x9, 0x10000, 0x1000, 0x9, 0x40, 0x7f, 0x6, 0x1, 0x7f20f68a, 0x1, 0x4, 0x2, 0xfffffffffffffffd, 0xfffffffffffffffc, 0x4, 0x0, 0x6, 0x8d, 0x4, 0x4, 0x0, 0x98a, 0x3, @perf_bp={&(0x7f00000003c0), 0xa}, 0x400, 0x5, 0x1, 0x3, 0x3, 0x8, 0x80000001}, r1, 0x6, r2, 0x9) openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r6, &(0x7f0000000280), 0xffffffb3) [ 699.410525][T25173] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.2'. [ 699.432080][T25207] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.2'. 12:50:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)="fa0c000026008152915a655267d7d137ab2ff96e27bf28b285fe3903a44a6017edcaa3a2b4dade3baee72569b51366463fedf5e787c05b0cb5927a3a7edfb4d078e9ae1504d489e058be9fafaa633705b6d4bf6a01f2cd9ebf19724a1b0b9760612582bccd3983ce4474844c065e914dab8bbd52a45f431678bfe28633bf7c8dc83df809238ed87f1e393883ef750ce79c6f84e5e5de176e2f26024e4e3a3d8fbdaf3254022f265d8ccc5fd7205d9d9c2c407ec58162523082d81a39c43f782332ba8e82b4107a049cb82bba8b5edd80473844291437b8d22edca68047582e6be601e9df5e60a32c7cd202c5a30b8b606e43362739551cbb013b65e238f41cc00d7900140cf06b7bc9030f2563bcf9d4f4b7f48c79ec1a323d06276a0a3f8846b7c62b66f9709cabcaad234c53f3bc9b11165a6321f1db1057f076cfaebf8fbfa033fdc1dc2c3e314b36b3b3dd50425447da8bc5938ff7a17361100ab0b1ffeab7ac487411824224781eb9cdd4edef57ae91cd61f56a56c0599cfc3a491447207610f242da6cd6b030ae5f35e3181c44ae68665a023759b9ef4358db46107edc49194aed72b62600ec0ae4fc9065be059fc010cd6e6c9ea77c666b5e25693fbcf595e3e57113ff3a0e0c63d0604a16ea5adb8b7b54d47d4d8804612fde571863064528a49bf684d8a880a11afd819f186c177c49cac3ba1e9d1aa7ad0ff36b9e36d73c05b8abcaf96df0bacd2c9653f30ec29e1284af8749a9b2803c2727e992a6e65df192e1875c3e6d3553ffb7cb34ffee8f8ac0123c390454b42a0316952cbc9949376d9320ec207f77c2d5eb9e86d720cf8e9008a9a51932b45cd4cab21414c92d1c20f9e15e3fc16c7ce181e9ab19b01b70343934c823b1215e173405dd225233823cd4a604a77f06b14eb05b860e6cf8790335788c43abe9de1598e9952e5c7e6b2f8b17b1788ff3033e7d1635b008834bdf4054e6195e55000827c6202b227dde06f23ae21c00b371bdb6b7ea47b2e78844b52a77f9f0929790dcd7df2752e4af092d539c87c18751a5eb3eb4d38a2a0e070064b4ffaacff0543b115cc89f6c7e78f12147ebfcf1c80bac8f98deb59cbe670adb4cd1882a7e0ca4ba85ae9d445223ffb32301d46c0c9b05a830cbea0f72294ab3b539e4ed7cac2e22b235e8ceedeb643fb90b061a58368e76036ff3c1828d8a4e21288662afb6f2acab00d734db7ffc8373a928571819ce9ea6cb0956a6093b2b1f65662b76bc6ac8a171451714e1d0e4ff7647fe7551d3cf16f37cb5547317e4fef51e4fb471de6ffbb90c2dd4a64266c4c2f75fc62e58ec306fb92212fb262d8b138899a3b53e67cde2f97d94cd2265cc04d32b29edf77e75b1f88372495cb2937f183bfc8604d72efb3af5c1f41b665b25592676b0ad2185478eade7e663e743e0e09cce6224c787ce1d789dc4a9b350bfe3a75f551341b11dd96cdaea17989dad565b16324a69842dc29a0ed16744ea5935598ac8238e146139189927a14d3b2863044b63b468ae75f48fab68ad235c36daffebfe4b468fc9b13198b1a683dcd3b3b4294ba22caddbacf8792d5783bc12e2538e4609e6bb6e9eeab98a06452c252a657f400260458c29fae8879097698c9aba2b2d889fc78f00d0d8271e09e8542b71018be6ff8cb03cb423e79303047d6ce124a00f64461b899bbddc4fe87ff677533391e16c01fa9cd6420bdc856c4c7f057b249ee9817efd6ab2cd02eb887d2631435ef2d5a1c7e57ac046ef615a1285ca89ade18ae69af3b3f8f76ca8aa060e373c0f99424fe1c5fadc72fe145fd2d4e4da4b78597890516857de188fcdaf15e3b0871b346cd39ab772cc25fab49e60c818cde934b137144adfc4fbde3ddbeccce9679f02b66746e822c67b3ed5fdafb4a936a2683b39a002115ecd62220605ca542610a80f2e3530aa89d3ed6ed9c57bbfd5db3a0b62786a608309a355443c616032008f9458b2f10db93e29470192370084e9322c309c9b23333b46d04e79176659503ad4b05deebb3c67d715ee6e84a89002ea6f7f71bf41ad36b42c8ae01c97174dbb641e50641aba60c291a84e906c013087370a5043e07d36fcead378f6c1e6ed3f5ac695124b82b20261cf7c9b82172e09c81d7d39eed72aee5678613a3c671ddd44f2c7c75a3b5d316aa165d56594fccab20903d7f503a08928e76c779918b2463b720ee6367a43e494a1db3ed1a80690e665570c01ce7eb979cdd95d4e1ca51730eb2cd63ffb2a56049601627c9788254945142dce85adbe1eb5997d16cdfe2a3758b13dc6bb121e2206ae64206868c1c5e89a101bc121719ac435dcad093f5f67cefd863cc7c8f3fc8a9dc62a83c115f1ce714b18af067951aa06dd9bb4ed98a820bf4704d156977caa4e6415b2a0df0386e2f6a061bf44abc8a397cf4abdafc51b78ebec9831f3c60fde6e62a1fd082903080aef20ff8de8bc0dced06f627514600539ca7114a088848da4244a85b4cf5b976d3a698c9a568d417e276917baba05d1a02181db2e6cc35986da4ccc63f8cd8e85a4a923dd27e2f499664601fdc44fdf46e2d2880cd5a7ece89c370234c438dcc0043865cc62bad21e9dc37da758cbe01752f02fd9cbfe98630a30a78bb1239e25cdaba3d45d13cd3e7216d9d8070f3ff1a0cd9a0c91f29974c98f2677ba88c1091bde4be0cd37ea5eeb3b9cd59560a00ddd40bbd60ffb8d4daa973ef0977c18dd4b38a605cee957872dca85787c37b6931293eddb77015faf143d1d28d24822d1a5d134799e8175a38b255aaf0e39b68c7f734e2e1e7044626daa84c9113e86d86ef63c863703703ea163319261dcf516c32d49478f7af30d52baa18ea6b0fc286c06b7e4ee019bf3fe74845a652d4a52aaa241a189c411e90e2953863a2bc4124e573607b94cdff19e280731824931a83f056cb5857672619b97ce38081592c0c319ce72e04e9eadce89775cfb5a4b2842663bc79bde565435cbcd46c4d505ceef7dde86512d39d4cb270deb7e79ebf8602bdc0d76c3e833d36ee08be10be634f44056c2f3fd6a328c7cd562e9c96ff7845fc3df81a876bb07f1cc833bed6ca1dc5cf935a4e959db6a4fae6edbc45357d8758faa9cd04cd41eb6efcfbd91658519bf520b90107f767d126854818485e98cb7ef56804de6950bf4e72098a949d14ea0e4e9f2534cf16cac0aeb970fc5c39f37e93910d5c99ac163792260d2280ec5c9a79bf295588ec23f524aae65f800f9c39e338f3d66b1a69e5488e04823eab36ae6ec6a2c5ce133ccd819a2b217b1ab7f4afd1697bb42929b3131358b5421c83f925571934442d0fd0ce3990d4e5d31d8b956f76df3c2f8533e46b892c88692ce009155dd5c7dbe4c86874b95762650f63e4b4aabb41320978b05b80cfe8fa2830904ef6b5c4f7ad46ca5dac151c9077c4d2c6adfe5066a8eb09a9bc6892330ea2b259a53c7137f8498254e1b04bf920c35c5333c4d640b11da60917ae921037b4aedbd6a0fbeeaf88ef6defc830552b4cbe3fe2a844806a48923dd428ea1c8d797bd8e6aabd1d1a8c97c8038b627120a77f4e47fa1f788aa9da268b0ec10fc453cb722685df76547dbf55a16663aa2b2a51e9c52456cccdf682592d1369dd12e3d3cb504e0f2d7004e62c297d5a25d0298045dae8fca8cb795ea57288b85a7e705820087d55ca6c42e920e2aa1174e128622cf64a197fd728cb2949536ba63e8bda8589261f1377caea37302e47228d3708a5666c66ba711d3c0b310a8c47e86d26597299d523c28c90e4feab43e950f398f7b61ccf7e6490d75ba6d8214e2d5ef2d7a088db490e1ebacf4e6eecc896cb1c704f0a8fcdf4ccb5dfa53eaf43d709287f36c10188c19fd59da7d73494de089c1b0a69ee22dcb847001c5317846a876bee1685d11c4db0673ec4c3a12008bb719650525b3c39e2b0469edda93830b3f1bde3e5b0b4637197866bb08c5858cf0d9876e3c7cad54169887bf9c80f9f4be362e1bc8c27f3434e9a918bac355c184bd899b9aebe6be20e70c0c69234342eb8b57aa9ffb7797a32df91cec2bbc90201658ca2297bf1fe68e65363867e1f6ad79b827f363d64fbd3b188d95307d011c4ce5bf4407908c058eeb97ec98dd0ebfdab6b348fa387f2a7573cac25344c983e8fd526c30ee6d59fe99a30c7d7e2864aa22bfa49df5f32da68309cab3ed9c2ce69b6ecb8508ce28a43ebd6c809b8afd07a4606e664965d316f3707a3abee9bcdc32a78031b0171fb565d90c16cd56e5792c0cf618b799715f32538e38f493d4e19ec76fc8a07576a13975706bfc2bb1516c2d18a4385cc37a206eac6c9fb8d073572ba2671d2198abf24fdd0c40d079ae44962c26743b4bf5950ac5ee34c5d7bd60b364ce670958112c37b9829bed7e1327356d6b94af3ba020c2337b2dba37d00af8a128a614390cdde62ce871f948427fb5c187df9a1540a5cc71da1a86144acbfd94bf433f744f0c4f2a675eba3ed251c5b11b08dfefc726c0394a9b75121d88467ed4b2cd69819dfe50693a4a4c8370d3af12f41c0067283bbb5a90044a340fc357a11081a6c13bb9c32d9caa448479fd5f0302b6729ca7233094540b14546d6bcc15771c2686279b34f9c0914f5306d0fabd5979266ea01a17a22507e560dbf904dd62c40e2bccb468710ee4c1caf4e786", 0xcfa}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='io.s\xeb\xba\xa9\xd1', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) recvmsg$kcm(r0, &(0x7f0000009ac0)={0x0, 0x0, 0x0}, 0x0) [ 699.828802][T25226] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.2'. [ 699.952802][T25228] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.2'. 12:50:42 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000000c0)='GPLvmnet1#\x00'}, 0x30) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x101, 0x5, 0x9, 0x5, 0x0, 0xbeb7, 0x10000, 0x1, 0x3, 0x10000, 0x6, 0x100000000, 0xf0a, 0x1000, 0x9, 0x8, 0x5, 0x9, 0x5, 0x4, 0xfffffffffffffffe, 0x100, 0x3b10, 0xffffffffffffe709, 0xfffffffffffffffc, 0x0, 0x6, 0x1000, 0xc, 0xfff, 0x100000000, 0x4, 0x80000001, 0x5, 0x81, 0x9, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x400, 0xffffffffffffff51, 0x101, 0x7, 0x20, 0xfffffffffffffffe, 0x3}, r0, 0x6, 0xffffffffffffffff, 0x5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000300)=').\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r1, r2, 0x0, 0x12, &(0x7f00000002c0)='./cgroup.net/syz1\x00', r3}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x305) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000c200)={&(0x7f000000bcc0)=@hci, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) socket$kcm(0x2b, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x1f, 0x4, 0x7, 0x800, 0x0, 0x9, 0x10800, 0x4, 0x80000001, 0x3f, 0x4, 0x80000000, 0x6, 0x93b6, 0x0, 0x9, 0x9, 0x10000, 0x1000, 0x9, 0x40, 0x7f, 0x6, 0x1, 0x7f20f68a, 0x1, 0x4, 0x2, 0xfffffffffffffffd, 0xfffffffffffffffc, 0x4, 0x0, 0x6, 0x8d, 0x4, 0x4, 0x0, 0x98a, 0x3, @perf_bp={&(0x7f00000003c0), 0xa}, 0x400, 0x5, 0x1, 0x3, 0x3, 0x8, 0x80000001}, r1, 0x6, r2, 0x9) openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r6, &(0x7f0000000280), 0xffffffb3) 12:50:42 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000000c0)='GPLvmnet1#\x00'}, 0x30) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x101, 0x5, 0x9, 0x5, 0x0, 0xbeb7, 0x10000, 0x1, 0x3, 0x10000, 0x6, 0x100000000, 0xf0a, 0x1000, 0x9, 0x8, 0x5, 0x9, 0x5, 0x4, 0xfffffffffffffffe, 0x100, 0x3b10, 0xffffffffffffe709, 0xfffffffffffffffc, 0x0, 0x6, 0x1000, 0xc, 0xfff, 0x100000000, 0x4, 0x80000001, 0x5, 0x81, 0x9, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x400, 0xffffffffffffff51, 0x101, 0x7, 0x20, 0xfffffffffffffffe, 0x3}, r0, 0x6, 0xffffffffffffffff, 0x5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000300)=').\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r1, r2, 0x0, 0x12, &(0x7f00000002c0)='./cgroup.net/syz1\x00', r3}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x305) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000c200)={&(0x7f000000bcc0)=@hci, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) socket$kcm(0x2b, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x1f, 0x4, 0x7, 0x800, 0x0, 0x9, 0x10800, 0x4, 0x80000001, 0x3f, 0x4, 0x80000000, 0x6, 0x93b6, 0x0, 0x9, 0x9, 0x10000, 0x1000, 0x9, 0x40, 0x7f, 0x6, 0x1, 0x7f20f68a, 0x1, 0x4, 0x2, 0xfffffffffffffffd, 0xfffffffffffffffc, 0x4, 0x0, 0x6, 0x8d, 0x4, 0x4, 0x0, 0x98a, 0x3, @perf_bp={&(0x7f00000003c0), 0xa}, 0x400, 0x5, 0x1, 0x3, 0x3, 0x8, 0x80000001}, r1, 0x6, r2, 0x9) openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r6, &(0x7f0000000280), 0xffffffb3) 12:50:42 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000000c0)='GPLvmnet1#\x00'}, 0x30) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x101, 0x5, 0x9, 0x5, 0x0, 0xbeb7, 0x10000, 0x1, 0x3, 0x10000, 0x6, 0x100000000, 0xf0a, 0x1000, 0x9, 0x8, 0x5, 0x9, 0x5, 0x4, 0xfffffffffffffffe, 0x100, 0x3b10, 0xffffffffffffe709, 0xfffffffffffffffc, 0x0, 0x6, 0x1000, 0xc, 0xfff, 0x100000000, 0x4, 0x80000001, 0x5, 0x81, 0x9, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x400, 0xffffffffffffff51, 0x101, 0x7, 0x20, 0xfffffffffffffffe, 0x3}, r0, 0x6, 0xffffffffffffffff, 0x5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000300)=').\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r1, r2, 0x0, 0x12, &(0x7f00000002c0)='./cgroup.net/syz1\x00', r3}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x305) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000c200)={&(0x7f000000bcc0)=@hci, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) socket$kcm(0x2b, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x1f, 0x4, 0x7, 0x800, 0x0, 0x9, 0x10800, 0x4, 0x80000001, 0x3f, 0x4, 0x80000000, 0x6, 0x93b6, 0x0, 0x9, 0x9, 0x10000, 0x1000, 0x9, 0x40, 0x7f, 0x6, 0x1, 0x7f20f68a, 0x1, 0x4, 0x2, 0xfffffffffffffffd, 0xfffffffffffffffc, 0x4, 0x0, 0x6, 0x8d, 0x4, 0x4, 0x0, 0x98a, 0x3, @perf_bp={&(0x7f00000003c0), 0xa}, 0x400, 0x5, 0x1, 0x3, 0x3, 0x8, 0x80000001}, r1, 0x6, r2, 0x9) openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r6, &(0x7f0000000280), 0xffffffb3) 12:50:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)="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", 0xcfa}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='io.s\xeb\xba\xa9\xd1', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) recvmsg$kcm(r0, &(0x7f0000009ac0)={0x0, 0x0, 0x0}, 0x0) 12:50:42 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000000c0)='GPLvmnet1#\x00'}, 0x30) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x101, 0x5, 0x9, 0x5, 0x0, 0xbeb7, 0x10000, 0x1, 0x3, 0x10000, 0x6, 0x100000000, 0xf0a, 0x1000, 0x9, 0x8, 0x5, 0x9, 0x5, 0x4, 0xfffffffffffffffe, 0x100, 0x3b10, 0xffffffffffffe709, 0xfffffffffffffffc, 0x0, 0x6, 0x1000, 0xc, 0xfff, 0x100000000, 0x4, 0x80000001, 0x5, 0x81, 0x9, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x400, 0xffffffffffffff51, 0x101, 0x7, 0x20, 0xfffffffffffffffe, 0x3}, r0, 0x6, 0xffffffffffffffff, 0x5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000300)=').\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r1, r2, 0x0, 0x12, &(0x7f00000002c0)='./cgroup.net/syz1\x00', r3}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x305) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000c200)={&(0x7f000000bcc0)=@hci, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) socket$kcm(0x2b, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x1f, 0x4, 0x7, 0x800, 0x0, 0x9, 0x10800, 0x4, 0x80000001, 0x3f, 0x4, 0x80000000, 0x6, 0x93b6, 0x0, 0x9, 0x9, 0x10000, 0x1000, 0x9, 0x40, 0x7f, 0x6, 0x1, 0x7f20f68a, 0x1, 0x4, 0x2, 0xfffffffffffffffd, 0xfffffffffffffffc, 0x4, 0x0, 0x6, 0x8d, 0x4, 0x4, 0x0, 0x98a, 0x3, @perf_bp={&(0x7f00000003c0), 0xa}, 0x400, 0x5, 0x1, 0x3, 0x3, 0x8, 0x80000001}, r1, 0x6, r2, 0x9) openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r6, &(0x7f0000000280), 0xffffffb3) 12:50:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)="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", 0xcfa}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='io.s\xeb\xba\xa9\xd1', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) recvmsg$kcm(r0, &(0x7f0000009ac0)={0x0, 0x0, 0x0}, 0x0) [ 700.275710][ T21] device hsr_slave_0 left promiscuous mode [ 700.309497][ T21] device hsr_slave_1 left promiscuous mode [ 700.395623][ T21] device bridge_slave_1 left promiscuous mode [ 700.406010][ T21] bridge0: port 2(bridge_slave_1) entered disabled state 12:50:43 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000000c0)='GPLvmnet1#\x00'}, 0x30) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x101, 0x5, 0x9, 0x5, 0x0, 0xbeb7, 0x10000, 0x1, 0x3, 0x10000, 0x6, 0x100000000, 0xf0a, 0x1000, 0x9, 0x8, 0x5, 0x9, 0x5, 0x4, 0xfffffffffffffffe, 0x100, 0x3b10, 0xffffffffffffe709, 0xfffffffffffffffc, 0x0, 0x6, 0x1000, 0xc, 0xfff, 0x100000000, 0x4, 0x80000001, 0x5, 0x81, 0x9, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x400, 0xffffffffffffff51, 0x101, 0x7, 0x20, 0xfffffffffffffffe, 0x3}, r0, 0x6, 0xffffffffffffffff, 0x5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000300)=').\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r1, r2, 0x0, 0x12, &(0x7f00000002c0)='./cgroup.net/syz1\x00', r3}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x305) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000c200)={&(0x7f000000bcc0)=@hci, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) socket$kcm(0x2b, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x1f, 0x4, 0x7, 0x800, 0x0, 0x9, 0x10800, 0x4, 0x80000001, 0x3f, 0x4, 0x80000000, 0x6, 0x93b6, 0x0, 0x9, 0x9, 0x10000, 0x1000, 0x9, 0x40, 0x7f, 0x6, 0x1, 0x7f20f68a, 0x1, 0x4, 0x2, 0xfffffffffffffffd, 0xfffffffffffffffc, 0x4, 0x0, 0x6, 0x8d, 0x4, 0x4, 0x0, 0x98a, 0x3, @perf_bp={&(0x7f00000003c0), 0xa}, 0x400, 0x5, 0x1, 0x3, 0x3, 0x8, 0x80000001}, r1, 0x6, r2, 0x9) openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r6, &(0x7f0000000280), 0xffffffb3) 12:50:43 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000000c0)='GPLvmnet1#\x00'}, 0x30) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x101, 0x5, 0x9, 0x5, 0x0, 0xbeb7, 0x10000, 0x1, 0x3, 0x10000, 0x6, 0x100000000, 0xf0a, 0x1000, 0x9, 0x8, 0x5, 0x9, 0x5, 0x4, 0xfffffffffffffffe, 0x100, 0x3b10, 0xffffffffffffe709, 0xfffffffffffffffc, 0x0, 0x6, 0x1000, 0xc, 0xfff, 0x100000000, 0x4, 0x80000001, 0x5, 0x81, 0x9, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x400, 0xffffffffffffff51, 0x101, 0x7, 0x20, 0xfffffffffffffffe, 0x3}, r0, 0x6, 0xffffffffffffffff, 0x5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000300)=').\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r1, r2, 0x0, 0x12, &(0x7f00000002c0)='./cgroup.net/syz1\x00', r3}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x305) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000c200)={&(0x7f000000bcc0)=@hci, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) socket$kcm(0x2b, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x1f, 0x4, 0x7, 0x800, 0x0, 0x9, 0x10800, 0x4, 0x80000001, 0x3f, 0x4, 0x80000000, 0x6, 0x93b6, 0x0, 0x9, 0x9, 0x10000, 0x1000, 0x9, 0x40, 0x7f, 0x6, 0x1, 0x7f20f68a, 0x1, 0x4, 0x2, 0xfffffffffffffffd, 0xfffffffffffffffc, 0x4, 0x0, 0x6, 0x8d, 0x4, 0x4, 0x0, 0x98a, 0x3, @perf_bp={&(0x7f00000003c0), 0xa}, 0x400, 0x5, 0x1, 0x3, 0x3, 0x8, 0x80000001}, r1, 0x6, r2, 0x9) openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r6, &(0x7f0000000280), 0xffffffb3) [ 700.476326][ T21] device bridge_slave_0 left promiscuous mode [ 700.485866][ T21] bridge0: port 1(bridge_slave_0) entered disabled state 12:50:43 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000000c0)='GPLvmnet1#\x00'}, 0x30) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x101, 0x5, 0x9, 0x5, 0x0, 0xbeb7, 0x10000, 0x1, 0x3, 0x10000, 0x6, 0x100000000, 0xf0a, 0x1000, 0x9, 0x8, 0x5, 0x9, 0x5, 0x4, 0xfffffffffffffffe, 0x100, 0x3b10, 0xffffffffffffe709, 0xfffffffffffffffc, 0x0, 0x6, 0x1000, 0xc, 0xfff, 0x100000000, 0x4, 0x80000001, 0x5, 0x81, 0x9, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x400, 0xffffffffffffff51, 0x101, 0x7, 0x20, 0xfffffffffffffffe, 0x3}, r0, 0x6, 0xffffffffffffffff, 0x5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000300)=').\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r1, r2, 0x0, 0x12, &(0x7f00000002c0)='./cgroup.net/syz1\x00', r3}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x305) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000c200)={&(0x7f000000bcc0)=@hci, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) socket$kcm(0x2b, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x1f, 0x4, 0x7, 0x800, 0x0, 0x9, 0x10800, 0x4, 0x80000001, 0x3f, 0x4, 0x80000000, 0x6, 0x93b6, 0x0, 0x9, 0x9, 0x10000, 0x1000, 0x9, 0x40, 0x7f, 0x6, 0x1, 0x7f20f68a, 0x1, 0x4, 0x2, 0xfffffffffffffffd, 0xfffffffffffffffc, 0x4, 0x0, 0x6, 0x8d, 0x4, 0x4, 0x0, 0x98a, 0x3, @perf_bp={&(0x7f00000003c0), 0xa}, 0x400, 0x5, 0x1, 0x3, 0x3, 0x8, 0x80000001}, r1, 0x6, r2, 0x9) openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r6, &(0x7f0000000280), 0xffffffb3) 12:50:43 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000000c0)='GPLvmnet1#\x00'}, 0x30) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x101, 0x5, 0x9, 0x5, 0x0, 0xbeb7, 0x10000, 0x1, 0x3, 0x10000, 0x6, 0x100000000, 0xf0a, 0x1000, 0x9, 0x8, 0x5, 0x9, 0x5, 0x4, 0xfffffffffffffffe, 0x100, 0x3b10, 0xffffffffffffe709, 0xfffffffffffffffc, 0x0, 0x6, 0x1000, 0xc, 0xfff, 0x100000000, 0x4, 0x80000001, 0x5, 0x81, 0x9, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x400, 0xffffffffffffff51, 0x101, 0x7, 0x20, 0xfffffffffffffffe, 0x3}, r0, 0x6, 0xffffffffffffffff, 0x5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000300)=').\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r1, r2, 0x0, 0x12, &(0x7f00000002c0)='./cgroup.net/syz1\x00', r3}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x305) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000c200)={&(0x7f000000bcc0)=@hci, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) socket$kcm(0x2b, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x1f, 0x4, 0x7, 0x800, 0x0, 0x9, 0x10800, 0x4, 0x80000001, 0x3f, 0x4, 0x80000000, 0x6, 0x93b6, 0x0, 0x9, 0x9, 0x10000, 0x1000, 0x9, 0x40, 0x7f, 0x6, 0x1, 0x7f20f68a, 0x1, 0x4, 0x2, 0xfffffffffffffffd, 0xfffffffffffffffc, 0x4, 0x0, 0x6, 0x8d, 0x4, 0x4, 0x0, 0x98a, 0x3, @perf_bp={&(0x7f00000003c0), 0xa}, 0x400, 0x5, 0x1, 0x3, 0x3, 0x8, 0x80000001}, r1, 0x6, r2, 0x9) openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r6, &(0x7f0000000280), 0xffffffb3) 12:50:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 12:50:43 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'nr0\x01\x00', 0x32}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 12:50:43 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000000c0)='GPLvmnet1#\x00'}, 0x30) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x101, 0x5, 0x9, 0x5, 0x0, 0xbeb7, 0x10000, 0x1, 0x3, 0x10000, 0x6, 0x100000000, 0xf0a, 0x1000, 0x9, 0x8, 0x5, 0x9, 0x5, 0x4, 0xfffffffffffffffe, 0x100, 0x3b10, 0xffffffffffffe709, 0xfffffffffffffffc, 0x0, 0x6, 0x1000, 0xc, 0xfff, 0x100000000, 0x4, 0x80000001, 0x5, 0x81, 0x9, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x400, 0xffffffffffffff51, 0x101, 0x7, 0x20, 0xfffffffffffffffe, 0x3}, r0, 0x6, 0xffffffffffffffff, 0x5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000300)=').\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r1, r2, 0x0, 0x12, &(0x7f00000002c0)='./cgroup.net/syz1\x00', r3}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x305) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000c200)={&(0x7f000000bcc0)=@hci, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) socket$kcm(0x2b, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x1f, 0x4, 0x7, 0x800, 0x0, 0x9, 0x10800, 0x4, 0x80000001, 0x3f, 0x4, 0x80000000, 0x6, 0x93b6, 0x0, 0x9, 0x9, 0x10000, 0x1000, 0x9, 0x40, 0x7f, 0x6, 0x1, 0x7f20f68a, 0x1, 0x4, 0x2, 0xfffffffffffffffd, 0xfffffffffffffffc, 0x4, 0x0, 0x6, 0x8d, 0x4, 0x4, 0x0, 0x98a, 0x3, @perf_bp={&(0x7f00000003c0), 0xa}, 0x400, 0x5, 0x1, 0x3, 0x3, 0x8, 0x80000001}, r1, 0x6, r2, 0x9) openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB='Q'], 0x1) write$cgroup_pid(r6, &(0x7f0000000280), 0xffffffb3) 12:50:43 executing program 5: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) sendmsg$inet(r2, &(0x7f0000000700)={&(0x7f0000000480)={0x2, 0x4e21, @rand_addr=0xffff}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000580)="e06a95b35bf08b03afb3275bf3478a9907b1b7e985e1c2167c1ab954f6bb9e1d84518996eebc048bbb54bf417cc45a6f406a72ae6f049c7df407", 0x3a}], 0x1}, 0x5da257ceb8ae5e15) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={0x0}, 0x10) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x20) openat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xfffffffffffffc29, 0xab, 0x0, &(0x7f0000000280)=""/175}, 0x28) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40000, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, r4, 0x0, 0x2, &(0x7f0000000140)='}\x00'}, 0x30) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x80000001, 0x80000000, 0x5, 0x8, 0x0, 0x0, 0x301, 0x6, 0x2, 0xf38, 0x1, 0x2, 0x2, 0xef5d, 0x7f, 0x4, 0x7f, 0x80, 0x3, 0x9, 0x800, 0x100, 0x6, 0x9, 0x3, 0x6, 0x7, 0x40, 0xffffffffffffffff, 0xfffffffffffffffb, 0x6c8, 0x6f, 0x60de, 0x3, 0x0, 0x8, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x1000, 0x5, 0x3f, 0xf, 0x10000000, 0x4, 0x2}, r8, 0xd, 0xffffffffffffffff, 0x8) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000280)={'veth0_to_bridge\x00', 0x5fc}) r9 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r3) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x890b, &(0x7f0000000000)={r0}) recvmsg(r9, &(0x7f000000a000)={&(0x7f0000008c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f40)=[{&(0x7f0000008cc0)=""/99, 0x63}, {&(0x7f0000008d40)=""/207, 0xcf}, {&(0x7f0000008e40)=""/27, 0x1b}, {&(0x7f0000008e80)=""/4096, 0x1000}, {&(0x7f0000009e80)=""/148, 0x94}], 0x5, &(0x7f0000000380)}, 0x40) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f000000a040)=r10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r5, &(0x7f0000000000), 0x20000200) 12:50:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, 0x0, 0x1a}, 0x20) [ 703.393652][ T21] team0 (unregistering): Port device team_slave_1 removed [ 703.408452][ T21] team0 (unregistering): Port device team_slave_0 removed [ 703.421003][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 703.461178][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 703.540023][ T21] bond0 (unregistering): Released all slaves 12:50:46 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001240)="2e0000002a00810100000000000000cf0500136a5ad31f1b34a6f3cbb30007fff000009a0100000051894d5d1dac", 0x2e}], 0x1}, 0x0) 12:50:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)="fa0c000026008152915a655267d7d137ab2ff96e27bf28b285fe3903a44a6017edcaa3a2b4dade3baee72569b51366463fedf5e787c05b0cb5927a3a7edfb4d078e9ae1504d489e058be9fafaa633705b6d4bf6a01f2cd9ebf19724a1b0b9760612582bccd3983ce4474844c065e914dab8bbd52a45f431678bfe28633bf7c8dc83df809238ed87f1e393883ef750ce79c6f84e5e5de176e2f26024e4e3a3d8fbdaf3254022f265d8ccc5fd7205d9d9c2c407ec58162523082d81a39c43f782332ba8e82b4107a049cb82bba8b5edd80473844291437b8d22edca68047582e6be601e9df5e60a32c7cd202c5a30b8b606e43362739551cbb013b65e238f41cc00d7900140cf06b7bc9030f2563bcf9d4f4b7f48c79ec1a323d06276a0a3f8846b7c62b66f9709cabcaad234c53f3bc9b11165a6321f1db1057f076cfaebf8fbfa033fdc1dc2c3e314b36b3b3dd50425447da8bc5938ff7a17361100ab0b1ffeab7ac487411824224781eb9cdd4edef57ae91cd61f56a56c0599cfc3a491447207610f242da6cd6b030ae5f35e3181c44ae68665a023759b9ef4358db46107edc49194aed72b62600ec0ae4fc9065be059fc010cd6e6c9ea77c666b5e25693fbcf595e3e57113ff3a0e0c63d0604a16ea5adb8b7b54d47d4d8804612fde571863064528a49bf684d8a880a11afd819f186c177c49cac3ba1e9d1aa7ad0ff36b9e36d73c05b8abcaf96df0bacd2c9653f30ec29e1284af8749a9b2803c2727e992a6e65df192e1875c3e6d3553ffb7cb34ffee8f8ac0123c390454b42a0316952cbc9949376d9320ec207f77c2d5eb9e86d720cf8e9008a9a51932b45cd4cab21414c92d1c20f9e15e3fc16c7ce181e9ab19b01b70343934c823b1215e173405dd225233823cd4a604a77f06b14eb05b860e6cf8790335788c43abe9de1598e9952e5c7e6b2f8b17b1788ff3033e7d1635b008834bdf4054e6195e55000827c6202b227dde06f23ae21c00b371bdb6b7ea47b2e78844b52a77f9f0929790dcd7df2752e4af092d539c87c18751a5eb3eb4d38a2a0e070064b4ffaacff0543b115cc89f6c7e78f12147ebfcf1c80bac8f98deb59cbe670adb4cd1882a7e0ca4ba85ae9d445223ffb32301d46c0c9b05a830cbea0f72294ab3b539e4ed7cac2e22b235e8ceedeb643fb90b061a58368e76036ff3c1828d8a4e21288662afb6f2acab00d734db7ffc8373a928571819ce9ea6cb0956a6093b2b1f65662b76bc6ac8a171451714e1d0e4ff7647fe7551d3cf16f37cb5547317e4fef51e4fb471de6ffbb90c2dd4a64266c4c2f75fc62e58ec306fb92212fb262d8b138899a3b53e67cde2f97d94cd2265cc04d32b29edf77e75b1f88372495cb2937f183bfc8604d72efb3af5c1f41b665b25592676b0ad2185478eade7e663e743e0e09cce6224c787ce1d789dc4a9b350bfe3a75f551341b11dd96cdaea17989dad565b16324a69842dc29a0ed16744ea5935598ac8238e146139189927a14d3b2863044b63b468ae75f48fab68ad235c36daffebfe4b468fc9b13198b1a683dcd3b3b4294ba22caddbacf8792d5783bc12e2538e4609e6bb6e9eeab98a06452c252a657f400260458c29fae8879097698c9aba2b2d889fc78f00d0d8271e09e8542b71018be6ff8cb03cb423e79303047d6ce124a00f64461b899bbddc4fe87ff677533391e16c01fa9cd6420bdc856c4c7f057b249ee9817efd6ab2cd02eb887d2631435ef2d5a1c7e57ac046ef615a1285ca89ade18ae69af3b3f8f76ca8aa060e373c0f99424fe1c5fadc72fe145fd2d4e4da4b78597890516857de188fcdaf15e3b0871b346cd39ab772cc25fab49e60c818cde934b137144adfc4fbde3ddbeccce9679f02b66746e822c67b3ed5fdafb4a936a2683b39a002115ecd62220605ca542610a80f2e3530aa89d3ed6ed9c57bbfd5db3a0b62786a608309a355443c616032008f9458b2f10db93e29470192370084e9322c309c9b23333b46d04e79176659503ad4b05deebb3c67d715ee6e84a89002ea6f7f71bf41ad36b42c8ae01c97174dbb641e50641aba60c291a84e906c013087370a5043e07d36fcead378f6c1e6ed3f5ac695124b82b20261cf7c9b82172e09c81d7d39eed72aee5678613a3c671ddd44f2c7c75a3b5d316aa165d56594fccab20903d7f503a08928e76c779918b2463b720ee6367a43e494a1db3ed1a80690e665570c01ce7eb979cdd95d4e1ca51730eb2cd63ffb2a56049601627c9788254945142dce85adbe1eb5997d16cdfe2a3758b13dc6bb121e2206ae64206868c1c5e89a101bc121719ac435dcad093f5f67cefd863cc7c8f3fc8a9dc62a83c115f1ce714b18af067951aa06dd9bb4ed98a820bf4704d156977caa4e6415b2a0df0386e2f6a061bf44abc8a397cf4abdafc51b78ebec9831f3c60fde6e62a1fd082903080aef20ff8de8bc0dced06f627514600539ca7114a088848da4244a85b4cf5b976d3a698c9a568d417e276917baba05d1a02181db2e6cc35986da4ccc63f8cd8e85a4a923dd27e2f499664601fdc44fdf46e2d2880cd5a7ece89c370234c438dcc0043865cc62bad21e9dc37da758cbe01752f02fd9cbfe98630a30a78bb1239e25cdaba3d45d13cd3e7216d9d8070f3ff1a0cd9a0c91f29974c98f2677ba88c1091bde4be0cd37ea5eeb3b9cd59560a00ddd40bbd60ffb8d4daa973ef0977c18dd4b38a605cee957872dca85787c37b6931293eddb77015faf143d1d28d24822d1a5d134799e8175a38b255aaf0e39b68c7f734e2e1e7044626daa84c9113e86d86ef63c863703703ea163319261dcf516c32d49478f7af30d52baa18ea6b0fc286c06b7e4ee019bf3fe74845a652d4a52aaa241a189c411e90e2953863a2bc4124e573607b94cdff19e280731824931a83f056cb5857672619b97ce38081592c0c319ce72e04e9eadce89775cfb5a4b2842663bc79bde565435cbcd46c4d505ceef7dde86512d39d4cb270deb7e79ebf8602bdc0d76c3e833d36ee08be10be634f44056c2f3fd6a328c7cd562e9c96ff7845fc3df81a876bb07f1cc833bed6ca1dc5cf935a4e959db6a4fae6edbc45357d8758faa9cd04cd41eb6efcfbd91658519bf520b90107f767d126854818485e98cb7ef56804de6950bf4e72098a949d14ea0e4e9f2534cf16cac0aeb970fc5c39f37e93910d5c99ac163792260d2280ec5c9a79bf295588ec23f524aae65f800f9c39e338f3d66b1a69e5488e04823eab36ae6ec6a2c5ce133ccd819a2b217b1ab7f4afd1697bb42929b3131358b5421c83f925571934442d0fd0ce3990d4e5d31d8b956f76df3c2f8533e46b892c88692ce009155dd5c7dbe4c86874b95762650f63e4b4aabb41320978b05b80cfe8fa2830904ef6b5c4f7ad46ca5dac151c9077c4d2c6adfe5066a8eb09a9bc6892330ea2b259a53c7137f8498254e1b04bf920c35c5333c4d640b11da60917ae921037b4aedbd6a0fbeeaf88ef6defc830552b4cbe3fe2a844806a48923dd428ea1c8d797bd8e6aabd1d1a8c97c8038b627120a77f4e47fa1f788aa9da268b0ec10fc453cb722685df76547dbf55a16663aa2b2a51e9c52456cccdf682592d1369dd12e3d3cb504e0f2d7004e62c297d5a25d0298045dae8fca8cb795ea57288b85a7e705820087d55ca6c42e920e2aa1174e128622cf64a197fd728cb2949536ba63e8bda8589261f1377caea37302e47228d3708a5666c66ba711d3c0b310a8c47e86d26597299d523c28c90e4feab43e950f398f7b61ccf7e6490d75ba6d8214e2d5ef2d7a088db490e1ebacf4e6eecc896cb1c704f0a8fcdf4ccb5dfa53eaf43d709287f36c10188c19fd59da7d73494de089c1b0a69ee22dcb847001c5317846a876bee1685d11c4db0673ec4c3a12008bb719650525b3c39e2b0469edda93830b3f1bde3e5b0b4637197866bb08c5858cf0d9876e3c7cad54169887bf9c80f9f4be362e1bc8c27f3434e9a918bac355c184bd899b9aebe6be20e70c0c69234342eb8b57aa9ffb7797a32df91cec2bbc90201658ca2297bf1fe68e65363867e1f6ad79b827f363d64fbd3b188d95307d011c4ce5bf4407908c058eeb97ec98dd0ebfdab6b348fa387f2a7573cac25344c983e8fd526c30ee6d59fe99a30c7d7e2864aa22bfa49df5f32da68309cab3ed9c2ce69b6ecb8508ce28a43ebd6c809b8afd07a4606e664965d316f3707a3abee9bcdc32a78031b0171fb565d90c16cd56e5792c0cf618b799715f32538e38f493d4e19ec76fc8a07576a13975706bfc2bb1516c2d18a4385cc37a206eac6c9fb8d073572ba2671d2198abf24fdd0c40d079ae44962c26743b4bf5950ac5ee34c5d7bd60b364ce670958112c37b9829bed7e1327356d6b94af3ba020c2337b2dba37d00af8a128a614390cdde62ce871f948427fb5c187df9a1540a5cc71da1a86144acbfd94bf433f744f0c4f2a675eba3ed251c5b11b08dfefc726c0394a9b75121d88467ed4b2cd69819dfe50693a4a4c8370d3af12f41c0067283bbb5a90044a340fc357a11081a6c13bb9c32d9caa448479fd5f0302b6729ca7233094540b14546d6bcc15771c2686279b34f9c0914f5306d0fabd5979266ea01a17a22507e560dbf904dd62c40e2bccb468710ee4c1caf4e786", 0xcfa}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='io.s\xeb\xba\xa9\xd1', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) recvmsg$kcm(r0, &(0x7f0000009ac0)={0x0, 0x0, 0x0}, 0x0) [ 703.628700][T25239] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. [ 703.640478][T25241] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.2'. [ 703.660168][T25276] device nr0 entered promiscuous mode 12:50:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)="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", 0xcfa}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='io.s\xeb\xba\xa9\xd1', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) recvmsg$kcm(r0, &(0x7f0000009ac0)={0x0, 0x0, 0x0}, 0x0) 12:50:46 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x1060841d}], 0x1, 0x0, 0xf601}, 0x3f00) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000340)) close(r1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) [ 703.767290][T25304] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 12:50:46 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000005020000000000"], 0x0, 0x26}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x6, 0x4, 0x2, 0x5, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x0, 0x1}, 0x3c) 12:50:46 executing program 5: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) sendmsg$inet(r2, &(0x7f0000000700)={&(0x7f0000000480)={0x2, 0x4e21, @rand_addr=0xffff}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000580)="e06a95b35bf08b03afb3275bf3478a9907b1b7e985e1c2167c1ab954f6bb9e1d84518996eebc048bbb54bf417cc45a6f406a72ae6f049c7df407", 0x3a}], 0x1}, 0x5da257ceb8ae5e15) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={0x0}, 0x10) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x20) openat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xfffffffffffffc29, 0xab, 0x0, &(0x7f0000000280)=""/175}, 0x28) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40000, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, r4, 0x0, 0x2, &(0x7f0000000140)='}\x00'}, 0x30) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x80000001, 0x80000000, 0x5, 0x8, 0x0, 0x0, 0x301, 0x6, 0x2, 0xf38, 0x1, 0x2, 0x2, 0xef5d, 0x7f, 0x4, 0x7f, 0x80, 0x3, 0x9, 0x800, 0x100, 0x6, 0x9, 0x3, 0x6, 0x7, 0x40, 0xffffffffffffffff, 0xfffffffffffffffb, 0x6c8, 0x6f, 0x60de, 0x3, 0x0, 0x8, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x1000, 0x5, 0x3f, 0xf, 0x10000000, 0x4, 0x2}, r8, 0xd, 0xffffffffffffffff, 0x8) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000280)={'veth0_to_bridge\x00', 0x5fc}) r9 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r3) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x890b, &(0x7f0000000000)={r0}) recvmsg(r9, &(0x7f000000a000)={&(0x7f0000008c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f40)=[{&(0x7f0000008cc0)=""/99, 0x63}, {&(0x7f0000008d40)=""/207, 0xcf}, {&(0x7f0000008e40)=""/27, 0x1b}, {&(0x7f0000008e80)=""/4096, 0x1000}, {&(0x7f0000009e80)=""/148, 0x94}], 0x5, &(0x7f0000000380)}, 0x40) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f000000a040)=r10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r5, &(0x7f0000000000), 0x20000200) 12:50:46 executing program 2: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) sendmsg$inet(r2, &(0x7f0000000700)={&(0x7f0000000480)={0x2, 0x4e21, @rand_addr=0xffff}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000580)="e06a95b35bf08b03afb3275bf3478a9907b1b7e985e1c2167c1ab954f6bb9e1d84518996eebc048bbb54bf417cc45a6f406a72ae6f049c7df407", 0x3a}], 0x1}, 0x5da257ceb8ae5e15) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={0x0}, 0x10) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x20) openat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xfffffffffffffc29, 0xab, 0x0, &(0x7f0000000280)=""/175}, 0x28) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40000, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, r4, 0x0, 0x2, &(0x7f0000000140)='}\x00'}, 0x30) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x80000001, 0x80000000, 0x5, 0x8, 0x0, 0x0, 0x301, 0x6, 0x2, 0xf38, 0x1, 0x2, 0x2, 0xef5d, 0x7f, 0x4, 0x7f, 0x80, 0x3, 0x9, 0x800, 0x100, 0x6, 0x9, 0x3, 0x6, 0x7, 0x40, 0xffffffffffffffff, 0xfffffffffffffffb, 0x6c8, 0x6f, 0x60de, 0x3, 0x0, 0x8, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x1000, 0x5, 0x3f, 0xf, 0x10000000, 0x4, 0x2}, r8, 0xd, 0xffffffffffffffff, 0x8) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000280)={'veth0_to_bridge\x00', 0x5fc}) r9 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r3) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x890b, &(0x7f0000000000)={r0}) recvmsg(r9, &(0x7f000000a000)={&(0x7f0000008c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f40)=[{&(0x7f0000008cc0)=""/99, 0x63}, {&(0x7f0000008d40)=""/207, 0xcf}, {&(0x7f0000008e40)=""/27, 0x1b}, {&(0x7f0000008e80)=""/4096, 0x1000}, {&(0x7f0000009e80)=""/148, 0x94}], 0x5, &(0x7f0000000380)}, 0x40) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f000000a040)=r10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r5, &(0x7f0000000000), 0x20000200) [ 704.165949][T25310] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. [ 704.190930][T25313] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. 12:50:46 executing program 3: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) sendmsg$inet(r2, &(0x7f0000000700)={&(0x7f0000000480)={0x2, 0x4e21, @rand_addr=0xffff}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000580)="e06a95b35bf08b03afb3275bf3478a9907b1b7e985e1c2167c1ab954f6bb9e1d84518996eebc048bbb54bf417cc45a6f406a72ae6f049c7df407", 0x3a}], 0x1}, 0x5da257ceb8ae5e15) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={0x0}, 0x10) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x20) openat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xfffffffffffffc29, 0xab, 0x0, &(0x7f0000000280)=""/175}, 0x28) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40000, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, r4, 0x0, 0x2, &(0x7f0000000140)='}\x00'}, 0x30) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x80000001, 0x80000000, 0x5, 0x8, 0x0, 0x0, 0x301, 0x6, 0x2, 0xf38, 0x1, 0x2, 0x2, 0xef5d, 0x7f, 0x4, 0x7f, 0x80, 0x3, 0x9, 0x800, 0x100, 0x6, 0x9, 0x3, 0x6, 0x7, 0x40, 0xffffffffffffffff, 0xfffffffffffffffb, 0x6c8, 0x6f, 0x60de, 0x3, 0x0, 0x8, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x1000, 0x5, 0x3f, 0xf, 0x10000000, 0x4, 0x2}, r8, 0xd, 0xffffffffffffffff, 0x8) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000280)={'veth0_to_bridge\x00', 0x5fc}) r9 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r3) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x890b, &(0x7f0000000000)={r0}) recvmsg(r9, &(0x7f000000a000)={&(0x7f0000008c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f40)=[{&(0x7f0000008cc0)=""/99, 0x63}, {&(0x7f0000008d40)=""/207, 0xcf}, {&(0x7f0000008e40)=""/27, 0x1b}, {&(0x7f0000008e80)=""/4096, 0x1000}, {&(0x7f0000009e80)=""/148, 0x94}], 0x5, &(0x7f0000000380)}, 0x40) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f000000a040)=r10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r5, &(0x7f0000000000), 0x20000200) 12:50:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x18, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 12:50:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)="fa0c000026008152915a655267d7d137ab2ff96e27bf28b285fe3903a44a6017edcaa3a2b4dade3baee72569b51366463fedf5e787c05b0cb5927a3a7edfb4d078e9ae1504d489e058be9fafaa633705b6d4bf6a01f2cd9ebf19724a1b0b9760612582bccd3983ce4474844c065e914dab8bbd52a45f431678bfe28633bf7c8dc83df809238ed87f1e393883ef750ce79c6f84e5e5de176e2f26024e4e3a3d8fbdaf3254022f265d8ccc5fd7205d9d9c2c407ec58162523082d81a39c43f782332ba8e82b4107a049cb82bba8b5edd80473844291437b8d22edca68047582e6be601e9df5e60a32c7cd202c5a30b8b606e43362739551cbb013b65e238f41cc00d7900140cf06b7bc9030f2563bcf9d4f4b7f48c79ec1a323d06276a0a3f8846b7c62b66f9709cabcaad234c53f3bc9b11165a6321f1db1057f076cfaebf8fbfa033fdc1dc2c3e314b36b3b3dd50425447da8bc5938ff7a17361100ab0b1ffeab7ac487411824224781eb9cdd4edef57ae91cd61f56a56c0599cfc3a491447207610f242da6cd6b030ae5f35e3181c44ae68665a023759b9ef4358db46107edc49194aed72b62600ec0ae4fc9065be059fc010cd6e6c9ea77c666b5e25693fbcf595e3e57113ff3a0e0c63d0604a16ea5adb8b7b54d47d4d8804612fde571863064528a49bf684d8a880a11afd819f186c177c49cac3ba1e9d1aa7ad0ff36b9e36d73c05b8abcaf96df0bacd2c9653f30ec29e1284af8749a9b2803c2727e992a6e65df192e1875c3e6d3553ffb7cb34ffee8f8ac0123c390454b42a0316952cbc9949376d9320ec207f77c2d5eb9e86d720cf8e9008a9a51932b45cd4cab21414c92d1c20f9e15e3fc16c7ce181e9ab19b01b70343934c823b1215e173405dd225233823cd4a604a77f06b14eb05b860e6cf8790335788c43abe9de1598e9952e5c7e6b2f8b17b1788ff3033e7d1635b008834bdf4054e6195e55000827c6202b227dde06f23ae21c00b371bdb6b7ea47b2e78844b52a77f9f0929790dcd7df2752e4af092d539c87c18751a5eb3eb4d38a2a0e070064b4ffaacff0543b115cc89f6c7e78f12147ebfcf1c80bac8f98deb59cbe670adb4cd1882a7e0ca4ba85ae9d445223ffb32301d46c0c9b05a830cbea0f72294ab3b539e4ed7cac2e22b235e8ceedeb643fb90b061a58368e76036ff3c1828d8a4e21288662afb6f2acab00d734db7ffc8373a928571819ce9ea6cb0956a6093b2b1f65662b76bc6ac8a171451714e1d0e4ff7647fe7551d3cf16f37cb5547317e4fef51e4fb471de6ffbb90c2dd4a64266c4c2f75fc62e58ec306fb92212fb262d8b138899a3b53e67cde2f97d94cd2265cc04d32b29edf77e75b1f88372495cb2937f183bfc8604d72efb3af5c1f41b665b25592676b0ad2185478eade7e663e743e0e09cce6224c787ce1d789dc4a9b350bfe3a75f551341b11dd96cdaea17989dad565b16324a69842dc29a0ed16744ea5935598ac8238e146139189927a14d3b2863044b63b468ae75f48fab68ad235c36daffebfe4b468fc9b13198b1a683dcd3b3b4294ba22caddbacf8792d5783bc12e2538e4609e6bb6e9eeab98a06452c252a657f400260458c29fae8879097698c9aba2b2d889fc78f00d0d8271e09e8542b71018be6ff8cb03cb423e79303047d6ce124a00f64461b899bbddc4fe87ff677533391e16c01fa9cd6420bdc856c4c7f057b249ee9817efd6ab2cd02eb887d2631435ef2d5a1c7e57ac046ef615a1285ca89ade18ae69af3b3f8f76ca8aa060e373c0f99424fe1c5fadc72fe145fd2d4e4da4b78597890516857de188fcdaf15e3b0871b346cd39ab772cc25fab49e60c818cde934b137144adfc4fbde3ddbeccce9679f02b66746e822c67b3ed5fdafb4a936a2683b39a002115ecd62220605ca542610a80f2e3530aa89d3ed6ed9c57bbfd5db3a0b62786a608309a355443c616032008f9458b2f10db93e29470192370084e9322c309c9b23333b46d04e79176659503ad4b05deebb3c67d715ee6e84a89002ea6f7f71bf41ad36b42c8ae01c97174dbb641e50641aba60c291a84e906c013087370a5043e07d36fcead378f6c1e6ed3f5ac695124b82b20261cf7c9b82172e09c81d7d39eed72aee5678613a3c671ddd44f2c7c75a3b5d316aa165d56594fccab20903d7f503a08928e76c779918b2463b720ee6367a43e494a1db3ed1a80690e665570c01ce7eb979cdd95d4e1ca51730eb2cd63ffb2a56049601627c9788254945142dce85adbe1eb5997d16cdfe2a3758b13dc6bb121e2206ae64206868c1c5e89a101bc121719ac435dcad093f5f67cefd863cc7c8f3fc8a9dc62a83c115f1ce714b18af067951aa06dd9bb4ed98a820bf4704d156977caa4e6415b2a0df0386e2f6a061bf44abc8a397cf4abdafc51b78ebec9831f3c60fde6e62a1fd082903080aef20ff8de8bc0dced06f627514600539ca7114a088848da4244a85b4cf5b976d3a698c9a568d417e276917baba05d1a02181db2e6cc35986da4ccc63f8cd8e85a4a923dd27e2f499664601fdc44fdf46e2d2880cd5a7ece89c370234c438dcc0043865cc62bad21e9dc37da758cbe01752f02fd9cbfe98630a30a78bb1239e25cdaba3d45d13cd3e7216d9d8070f3ff1a0cd9a0c91f29974c98f2677ba88c1091bde4be0cd37ea5eeb3b9cd59560a00ddd40bbd60ffb8d4daa973ef0977c18dd4b38a605cee957872dca85787c37b6931293eddb77015faf143d1d28d24822d1a5d134799e8175a38b255aaf0e39b68c7f734e2e1e7044626daa84c9113e86d86ef63c863703703ea163319261dcf516c32d49478f7af30d52baa18ea6b0fc286c06b7e4ee019bf3fe74845a652d4a52aaa241a189c411e90e2953863a2bc4124e573607b94cdff19e280731824931a83f056cb5857672619b97ce38081592c0c319ce72e04e9eadce89775cfb5a4b2842663bc79bde565435cbcd46c4d505ceef7dde86512d39d4cb270deb7e79ebf8602bdc0d76c3e833d36ee08be10be634f44056c2f3fd6a328c7cd562e9c96ff7845fc3df81a876bb07f1cc833bed6ca1dc5cf935a4e959db6a4fae6edbc45357d8758faa9cd04cd41eb6efcfbd91658519bf520b90107f767d126854818485e98cb7ef56804de6950bf4e72098a949d14ea0e4e9f2534cf16cac0aeb970fc5c39f37e93910d5c99ac163792260d2280ec5c9a79bf295588ec23f524aae65f800f9c39e338f3d66b1a69e5488e04823eab36ae6ec6a2c5ce133ccd819a2b217b1ab7f4afd1697bb42929b3131358b5421c83f925571934442d0fd0ce3990d4e5d31d8b956f76df3c2f8533e46b892c88692ce009155dd5c7dbe4c86874b95762650f63e4b4aabb41320978b05b80cfe8fa2830904ef6b5c4f7ad46ca5dac151c9077c4d2c6adfe5066a8eb09a9bc6892330ea2b259a53c7137f8498254e1b04bf920c35c5333c4d640b11da60917ae921037b4aedbd6a0fbeeaf88ef6defc830552b4cbe3fe2a844806a48923dd428ea1c8d797bd8e6aabd1d1a8c97c8038b627120a77f4e47fa1f788aa9da268b0ec10fc453cb722685df76547dbf55a16663aa2b2a51e9c52456cccdf682592d1369dd12e3d3cb504e0f2d7004e62c297d5a25d0298045dae8fca8cb795ea57288b85a7e705820087d55ca6c42e920e2aa1174e128622cf64a197fd728cb2949536ba63e8bda8589261f1377caea37302e47228d3708a5666c66ba711d3c0b310a8c47e86d26597299d523c28c90e4feab43e950f398f7b61ccf7e6490d75ba6d8214e2d5ef2d7a088db490e1ebacf4e6eecc896cb1c704f0a8fcdf4ccb5dfa53eaf43d709287f36c10188c19fd59da7d73494de089c1b0a69ee22dcb847001c5317846a876bee1685d11c4db0673ec4c3a12008bb719650525b3c39e2b0469edda93830b3f1bde3e5b0b4637197866bb08c5858cf0d9876e3c7cad54169887bf9c80f9f4be362e1bc8c27f3434e9a918bac355c184bd899b9aebe6be20e70c0c69234342eb8b57aa9ffb7797a32df91cec2bbc90201658ca2297bf1fe68e65363867e1f6ad79b827f363d64fbd3b188d95307d011c4ce5bf4407908c058eeb97ec98dd0ebfdab6b348fa387f2a7573cac25344c983e8fd526c30ee6d59fe99a30c7d7e2864aa22bfa49df5f32da68309cab3ed9c2ce69b6ecb8508ce28a43ebd6c809b8afd07a4606e664965d316f3707a3abee9bcdc32a78031b0171fb565d90c16cd56e5792c0cf618b799715f32538e38f493d4e19ec76fc8a07576a13975706bfc2bb1516c2d18a4385cc37a206eac6c9fb8d073572ba2671d2198abf24fdd0c40d079ae44962c26743b4bf5950ac5ee34c5d7bd60b364ce670958112c37b9829bed7e1327356d6b94af3ba020c2337b2dba37d00af8a128a614390cdde62ce871f948427fb5c187df9a1540a5cc71da1a86144acbfd94bf433f744f0c4f2a675eba3ed251c5b11b08dfefc726c0394a9b75121d88467ed4b2cd69819dfe50693a4a4c8370d3af12f41c0067283bbb5a90044a340fc357a11081a6c13bb9c32d9caa448479fd5f0302b6729ca7233094540b14546d6bcc15771c2686279b34f9c0914f5306d0fabd5979266ea01a17a22507e560dbf904dd62c40e2bccb468710ee4c1caf4e786", 0xcfa}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='io.s\xeb\xba\xa9\xd1', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) recvmsg$kcm(r0, &(0x7f0000009ac0)={0x0, 0x0, 0x0}, 0x0) 12:50:47 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r5 = gettid() write$cgroup_pid(r4, &(0x7f0000000500)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x89f) write$cgroup_int(r7, 0x0, 0x0) [ 704.696438][T25338] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. [ 704.797929][T25342] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. 12:50:47 executing program 2: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) sendmsg$inet(r2, &(0x7f0000000700)={&(0x7f0000000480)={0x2, 0x4e21, @rand_addr=0xffff}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000580)="e06a95b35bf08b03afb3275bf3478a9907b1b7e985e1c2167c1ab954f6bb9e1d84518996eebc048bbb54bf417cc45a6f406a72ae6f049c7df407", 0x3a}], 0x1}, 0x5da257ceb8ae5e15) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={0x0}, 0x10) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x20) openat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xfffffffffffffc29, 0xab, 0x0, &(0x7f0000000280)=""/175}, 0x28) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40000, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, r4, 0x0, 0x2, &(0x7f0000000140)='}\x00'}, 0x30) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x80000001, 0x80000000, 0x5, 0x8, 0x0, 0x0, 0x301, 0x6, 0x2, 0xf38, 0x1, 0x2, 0x2, 0xef5d, 0x7f, 0x4, 0x7f, 0x80, 0x3, 0x9, 0x800, 0x100, 0x6, 0x9, 0x3, 0x6, 0x7, 0x40, 0xffffffffffffffff, 0xfffffffffffffffb, 0x6c8, 0x6f, 0x60de, 0x3, 0x0, 0x8, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x1000, 0x5, 0x3f, 0xf, 0x10000000, 0x4, 0x2}, r8, 0xd, 0xffffffffffffffff, 0x8) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000280)={'veth0_to_bridge\x00', 0x5fc}) r9 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r3) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x890b, &(0x7f0000000000)={r0}) recvmsg(r9, &(0x7f000000a000)={&(0x7f0000008c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f40)=[{&(0x7f0000008cc0)=""/99, 0x63}, {&(0x7f0000008d40)=""/207, 0xcf}, {&(0x7f0000008e40)=""/27, 0x1b}, {&(0x7f0000008e80)=""/4096, 0x1000}, {&(0x7f0000009e80)=""/148, 0x94}], 0x5, &(0x7f0000000380)}, 0x40) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f000000a040)=r10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r5, &(0x7f0000000000), 0x20000200) 12:50:47 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) openat$cgroup_subtree(r0, &(0x7f0000002b80)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000100)='veth0\x00', 0xffffffffffffffff}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) sendmsg(r0, &(0x7f0000006300)={0x0, 0x0, &(0x7f0000004e80)=[{&(0x7f0000004dc0)}], 0x1}, 0x20000000) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 12:50:47 executing program 5: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) sendmsg$inet(r2, &(0x7f0000000700)={&(0x7f0000000480)={0x2, 0x4e21, @rand_addr=0xffff}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000580)="e06a95b35bf08b03afb3275bf3478a9907b1b7e985e1c2167c1ab954f6bb9e1d84518996eebc048bbb54bf417cc45a6f406a72ae6f049c7df407", 0x3a}], 0x1}, 0x5da257ceb8ae5e15) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={0x0}, 0x10) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x20) openat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xfffffffffffffc29, 0xab, 0x0, &(0x7f0000000280)=""/175}, 0x28) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40000, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, r4, 0x0, 0x2, &(0x7f0000000140)='}\x00'}, 0x30) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x80000001, 0x80000000, 0x5, 0x8, 0x0, 0x0, 0x301, 0x6, 0x2, 0xf38, 0x1, 0x2, 0x2, 0xef5d, 0x7f, 0x4, 0x7f, 0x80, 0x3, 0x9, 0x800, 0x100, 0x6, 0x9, 0x3, 0x6, 0x7, 0x40, 0xffffffffffffffff, 0xfffffffffffffffb, 0x6c8, 0x6f, 0x60de, 0x3, 0x0, 0x8, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x1000, 0x5, 0x3f, 0xf, 0x10000000, 0x4, 0x2}, r8, 0xd, 0xffffffffffffffff, 0x8) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000280)={'veth0_to_bridge\x00', 0x5fc}) r9 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r3) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x890b, &(0x7f0000000000)={r0}) recvmsg(r9, &(0x7f000000a000)={&(0x7f0000008c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f40)=[{&(0x7f0000008cc0)=""/99, 0x63}, {&(0x7f0000008d40)=""/207, 0xcf}, {&(0x7f0000008e40)=""/27, 0x1b}, {&(0x7f0000008e80)=""/4096, 0x1000}, {&(0x7f0000009e80)=""/148, 0x94}], 0x5, &(0x7f0000000380)}, 0x40) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f000000a040)=r10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r5, &(0x7f0000000000), 0x20000200) 12:50:47 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x1060841d}], 0x1, 0x0, 0xf601}, 0x3f00) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000340)) close(r1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) 12:50:47 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) openat$cgroup_subtree(r0, &(0x7f0000002b80)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000100)='veth0\x00', 0xffffffffffffffff}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) sendmsg(r0, &(0x7f0000006300)={0x0, 0x0, &(0x7f0000004e80)=[{&(0x7f0000004dc0)}], 0x1}, 0x20000000) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 12:50:47 executing program 3: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) sendmsg$inet(r2, &(0x7f0000000700)={&(0x7f0000000480)={0x2, 0x4e21, @rand_addr=0xffff}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000580)="e06a95b35bf08b03afb3275bf3478a9907b1b7e985e1c2167c1ab954f6bb9e1d84518996eebc048bbb54bf417cc45a6f406a72ae6f049c7df407", 0x3a}], 0x1}, 0x5da257ceb8ae5e15) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={0x0}, 0x10) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x20) openat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xfffffffffffffc29, 0xab, 0x0, &(0x7f0000000280)=""/175}, 0x28) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40000, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, r4, 0x0, 0x2, &(0x7f0000000140)='}\x00'}, 0x30) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x80000001, 0x80000000, 0x5, 0x8, 0x0, 0x0, 0x301, 0x6, 0x2, 0xf38, 0x1, 0x2, 0x2, 0xef5d, 0x7f, 0x4, 0x7f, 0x80, 0x3, 0x9, 0x800, 0x100, 0x6, 0x9, 0x3, 0x6, 0x7, 0x40, 0xffffffffffffffff, 0xfffffffffffffffb, 0x6c8, 0x6f, 0x60de, 0x3, 0x0, 0x8, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x1000, 0x5, 0x3f, 0xf, 0x10000000, 0x4, 0x2}, r8, 0xd, 0xffffffffffffffff, 0x8) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000280)={'veth0_to_bridge\x00', 0x5fc}) r9 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r3) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x890b, &(0x7f0000000000)={r0}) recvmsg(r9, &(0x7f000000a000)={&(0x7f0000008c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f40)=[{&(0x7f0000008cc0)=""/99, 0x63}, {&(0x7f0000008d40)=""/207, 0xcf}, {&(0x7f0000008e40)=""/27, 0x1b}, {&(0x7f0000008e80)=""/4096, 0x1000}, {&(0x7f0000009e80)=""/148, 0x94}], 0x5, &(0x7f0000000380)}, 0x40) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f000000a040)=r10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r5, &(0x7f0000000000), 0x20000200) [ 705.382162][T25346] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 705.463417][T25346] CPU: 0 PID: 25346 Comm: syz-executor.4 Not tainted 5.2.0+ #40 [ 705.471142][T25346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.481849][T25346] Call Trace: [ 705.485169][T25346] dump_stack+0x172/0x1f0 [ 705.489649][T25346] dump_header+0x10f/0xd33 [ 705.494117][T25346] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 705.499986][T25346] ? ___ratelimit+0x60/0x595 [ 705.504609][T25346] ? do_raw_spin_unlock+0x57/0x270 [ 705.510198][T25346] oom_kill_process.cold+0x10/0x15 [ 705.515446][T25346] out_of_memory+0x7f5/0x12e0 [ 705.520266][T25346] ? __sched_text_start+0x8/0x8 [ 705.525143][T25346] ? oom_killer_disable+0x280/0x280 [ 705.530384][T25346] mem_cgroup_out_of_memory+0x1ca/0x230 [ 705.535972][T25346] ? memcg_event_wake+0x230/0x230 [ 705.541034][T25346] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 705.546901][T25346] ? cgroup_file_notify+0x140/0x1b0 [ 705.552146][T25346] memory_max_write+0x22f/0x390 [ 705.557308][T25346] ? find_held_lock+0x35/0x130 [ 705.562099][T25346] ? mem_cgroup_write+0x360/0x360 [ 705.567434][T25346] ? lock_acquire+0x16f/0x3f0 [ 705.572195][T25346] ? kernfs_fop_write+0x227/0x480 [ 705.577275][T25346] cgroup_file_write+0x241/0x790 [ 705.582261][T25346] ? mem_cgroup_write+0x360/0x360 [ 705.587340][T25346] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 705.593055][T25346] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 705.598736][T25346] kernfs_fop_write+0x2b8/0x480 [ 705.603619][T25346] __vfs_write+0x8a/0x110 [ 705.608061][T25346] ? kernfs_fop_open+0xd80/0xd80 [ 705.613034][T25346] vfs_write+0x20c/0x580 [ 705.617318][T25346] ksys_write+0x14f/0x290 [ 705.621737][T25346] ? __ia32_sys_read+0xb0/0xb0 [ 705.626562][T25346] ? do_syscall_64+0x26/0x680 [ 705.631272][T25346] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.637361][T25346] ? do_syscall_64+0x26/0x680 [ 705.642158][T25346] __x64_sys_write+0x73/0xb0 [ 705.646782][T25346] do_syscall_64+0xfd/0x680 [ 705.651403][T25346] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.657310][T25346] RIP: 0033:0x459819 12:50:48 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) openat$cgroup_subtree(r0, &(0x7f0000002b80)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000100)='veth0\x00', 0xffffffffffffffff}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) sendmsg(r0, &(0x7f0000006300)={0x0, 0x0, &(0x7f0000004e80)=[{&(0x7f0000004dc0)}], 0x1}, 0x20000000) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) [ 705.661227][T25346] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 705.680850][T25346] RSP: 002b:00007fd741699c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 705.680867][T25346] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 705.680874][T25346] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 705.680881][T25346] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 705.680888][T25346] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd74169a6d4 [ 705.680895][T25346] R13: 00000000004c9774 R14: 00000000004e0ba8 R15: 00000000ffffffff 12:50:48 executing program 2: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) sendmsg$inet(r2, &(0x7f0000000700)={&(0x7f0000000480)={0x2, 0x4e21, @rand_addr=0xffff}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000580)="e06a95b35bf08b03afb3275bf3478a9907b1b7e985e1c2167c1ab954f6bb9e1d84518996eebc048bbb54bf417cc45a6f406a72ae6f049c7df407", 0x3a}], 0x1}, 0x5da257ceb8ae5e15) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={0x0}, 0x10) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x20) openat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xfffffffffffffc29, 0xab, 0x0, &(0x7f0000000280)=""/175}, 0x28) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40000, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, r4, 0x0, 0x2, &(0x7f0000000140)='}\x00'}, 0x30) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x80000001, 0x80000000, 0x5, 0x8, 0x0, 0x0, 0x301, 0x6, 0x2, 0xf38, 0x1, 0x2, 0x2, 0xef5d, 0x7f, 0x4, 0x7f, 0x80, 0x3, 0x9, 0x800, 0x100, 0x6, 0x9, 0x3, 0x6, 0x7, 0x40, 0xffffffffffffffff, 0xfffffffffffffffb, 0x6c8, 0x6f, 0x60de, 0x3, 0x0, 0x8, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x1000, 0x5, 0x3f, 0xf, 0x10000000, 0x4, 0x2}, r8, 0xd, 0xffffffffffffffff, 0x8) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000280)={'veth0_to_bridge\x00', 0x5fc}) r9 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r3) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x890b, &(0x7f0000000000)={r0}) recvmsg(r9, &(0x7f000000a000)={&(0x7f0000008c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f40)=[{&(0x7f0000008cc0)=""/99, 0x63}, {&(0x7f0000008d40)=""/207, 0xcf}, {&(0x7f0000008e40)=""/27, 0x1b}, {&(0x7f0000008e80)=""/4096, 0x1000}, {&(0x7f0000009e80)=""/148, 0x94}], 0x5, &(0x7f0000000380)}, 0x40) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f000000a040)=r10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r5, &(0x7f0000000000), 0x20000200) 12:50:48 executing program 5: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) sendmsg$inet(r2, &(0x7f0000000700)={&(0x7f0000000480)={0x2, 0x4e21, @rand_addr=0xffff}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000580)="e06a95b35bf08b03afb3275bf3478a9907b1b7e985e1c2167c1ab954f6bb9e1d84518996eebc048bbb54bf417cc45a6f406a72ae6f049c7df407", 0x3a}], 0x1}, 0x5da257ceb8ae5e15) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={0x0}, 0x10) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x20) openat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xfffffffffffffc29, 0xab, 0x0, &(0x7f0000000280)=""/175}, 0x28) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40000, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, r4, 0x0, 0x2, &(0x7f0000000140)='}\x00'}, 0x30) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x80000001, 0x80000000, 0x5, 0x8, 0x0, 0x0, 0x301, 0x6, 0x2, 0xf38, 0x1, 0x2, 0x2, 0xef5d, 0x7f, 0x4, 0x7f, 0x80, 0x3, 0x9, 0x800, 0x100, 0x6, 0x9, 0x3, 0x6, 0x7, 0x40, 0xffffffffffffffff, 0xfffffffffffffffb, 0x6c8, 0x6f, 0x60de, 0x3, 0x0, 0x8, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x1000, 0x5, 0x3f, 0xf, 0x10000000, 0x4, 0x2}, r8, 0xd, 0xffffffffffffffff, 0x8) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000280)={'veth0_to_bridge\x00', 0x5fc}) r9 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r3) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x890b, &(0x7f0000000000)={r0}) recvmsg(r9, &(0x7f000000a000)={&(0x7f0000008c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f40)=[{&(0x7f0000008cc0)=""/99, 0x63}, {&(0x7f0000008d40)=""/207, 0xcf}, {&(0x7f0000008e40)=""/27, 0x1b}, {&(0x7f0000008e80)=""/4096, 0x1000}, {&(0x7f0000009e80)=""/148, 0x94}], 0x5, &(0x7f0000000380)}, 0x40) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f000000a040)=r10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r5, &(0x7f0000000000), 0x20000200) [ 705.822854][T25346] memory: usage 7240kB, limit 0kB, failcnt 49960 [ 705.859361][T25346] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 12:50:48 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) openat$cgroup_subtree(r0, &(0x7f0000002b80)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000100)='veth0\x00', 0xffffffffffffffff}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) sendmsg(r0, &(0x7f0000006300)={0x0, 0x0, &(0x7f0000004e80)=[{&(0x7f0000004dc0)}], 0x1}, 0x20000000) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 12:50:48 executing program 3: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x0, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) sendmsg$inet(r2, &(0x7f0000000700)={&(0x7f0000000480)={0x2, 0x4e21, @rand_addr=0xffff}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000580)="e06a95b35bf08b03afb3275bf3478a9907b1b7e985e1c2167c1ab954f6bb9e1d84518996eebc048bbb54bf417cc45a6f406a72ae6f049c7df407", 0x3a}], 0x1}, 0x5da257ceb8ae5e15) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={0x0}, 0x10) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x20) openat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44a95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xfffffffffffffc29, 0xab, 0x0, &(0x7f0000000280)=""/175}, 0x28) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40000, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, r4, 0x0, 0x2, &(0x7f0000000140)='}\x00'}, 0x30) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x80000001, 0x80000000, 0x5, 0x8, 0x0, 0x0, 0x301, 0x6, 0x2, 0xf38, 0x1, 0x2, 0x2, 0xef5d, 0x7f, 0x4, 0x7f, 0x80, 0x3, 0x9, 0x800, 0x100, 0x6, 0x9, 0x3, 0x6, 0x7, 0x40, 0xffffffffffffffff, 0xfffffffffffffffb, 0x6c8, 0x6f, 0x60de, 0x3, 0x0, 0x8, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x1000, 0x5, 0x3f, 0xf, 0x10000000, 0x4, 0x2}, r8, 0xd, 0xffffffffffffffff, 0x8) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000280)={'veth0_to_bridge\x00', 0x5fc}) r9 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r3) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x890b, &(0x7f0000000000)={r0}) recvmsg(r9, &(0x7f000000a000)={&(0x7f0000008c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000009f40)=[{&(0x7f0000008cc0)=""/99, 0x63}, {&(0x7f0000008d40)=""/207, 0xcf}, {&(0x7f0000008e40)=""/27, 0x1b}, {&(0x7f0000008e80)=""/4096, 0x1000}, {&(0x7f0000009e80)=""/148, 0x94}], 0x5, &(0x7f0000000380)}, 0x40) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f000000a040)=r10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r5, &(0x7f0000000000), 0x20000200) [ 706.405436][T25346] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 706.412548][T25346] Memory cgroup stats for /syz4: cache:0KB rss:2208KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2208KB inactive_file:0KB active_file:0KB unevictable:0KB [ 706.605234][T25346] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=25345,uid=0 [ 706.670059][T25346] Memory cgroup out of memory: Killed process 25345 (syz-executor.4) total-vm:72836kB, anon-rss:2152kB, file-rss:34816kB, shmem-rss:0kB 12:50:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x8, 0x3a4, 0x8000000001}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fff8, 0x0, 0x820004, 0x0, 0x2}, 0x2c) 12:50:49 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) openat$cgroup_subtree(r0, &(0x7f0000002b80)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000100)='veth0\x00', 0xffffffffffffffff}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) sendmsg(r0, &(0x7f0000006300)={0x0, 0x0, &(0x7f0000004e80)=[{&(0x7f0000004dc0)}], 0x1}, 0x20000000) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 12:50:49 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2000000000000245, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x5c, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x590, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x800000005, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0x0) 12:50:49 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x1060841d}], 0x1, 0x0, 0xf601}, 0x3f00) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000340)) close(r1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) 12:50:49 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r5 = gettid() write$cgroup_pid(r4, &(0x7f0000000500)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x89f) write$cgroup_int(r7, 0x0, 0x0) [ 706.723980][ T1050] oom_reaper: reaped process 25345 (syz-executor.4), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 12:50:49 executing program 3: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.stat\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x7fffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x10000, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000380)={r1}) sendmsg(r1, &(0x7f0000001f40)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x2, 0x2, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x20}, 0xce5a}}}, 0x80, &(0x7f0000000980)=[{&(0x7f00000008c0)="3baf4a5bef9319866e056dbe2ea97978de214e3f06a5d46804e945482a78397f1cac1e2dc868a804611f15311754c85945a99871671079ac81425367390e5ff46750291c39bb71f60b4ac52b4ca05fd23cf1a6eb6747e6b6c7ce36e19ab4299074aab889b2f5fbb4586d92fdbcbbb1da7c92373acf645e6e9a1d9b6f7bd9f051e2563fb80f80acc1ed57ce94c807fb048e670eb9e4a9710436e835804e5b0ec1f826d4e107aed0512d5d434601f5a189d1", 0xb1}], 0x1}, 0x4000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x11, 0x80a, 0xfffffffffffffff7, &(0x7f0000000280)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xa, 0x100000001, 0x2a8}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r6, &(0x7f0000000100)=',', 0x0}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000100)={'rose0\x00', 0x400}) recvmsg(r1, &(0x7f0000004740)={&(0x7f0000003f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004640)=[{&(0x7f0000004000)=""/203, 0xcb}, {&(0x7f0000004100)=""/170, 0xaa}, {&(0x7f00000041c0)=""/222, 0xde}, {&(0x7f00000042c0)=""/5, 0x5}, {&(0x7f0000004300)=""/238, 0xee}, {&(0x7f0000004400)=""/146, 0x92}, {&(0x7f00000044c0)=""/84, 0x54}, {&(0x7f0000004540)=""/224, 0xe0}], 0x8, &(0x7f00000046c0)=""/122, 0x7a}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004780)={0x18, 0x0, 0x100, 0x5c, 0x100, 0x1, 0x0, [], r7, r0, 0x5, 0x4}, 0x3c) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000003c0)={r1, r3, 0x1, 0x3}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1c, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x8916, &(0x7f0000000000)={r8}) [ 706.863835][T18842] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 706.921556][T18842] CPU: 0 PID: 18842 Comm: syz-executor.4 Not tainted 5.2.0+ #40 [ 706.929291][T18842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.939390][T18842] Call Trace: [ 706.942709][T18842] dump_stack+0x172/0x1f0 [ 706.947130][T18842] dump_header+0x10f/0xd33 [ 706.952516][T18842] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 706.958355][T18842] ? ___ratelimit+0x60/0x595 [ 706.962970][T18842] ? do_raw_spin_unlock+0x57/0x270 12:50:49 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) openat$cgroup_subtree(r0, &(0x7f0000002b80)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000100)='veth0\x00', 0xffffffffffffffff}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) sendmsg(r0, &(0x7f0000006300)={0x0, 0x0, &(0x7f0000004e80)=[{&(0x7f0000004dc0)}], 0x1}, 0x20000000) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) [ 706.968114][T18842] oom_kill_process.cold+0x10/0x15 [ 706.973257][T18842] out_of_memory+0x7f5/0x12e0 [ 706.977972][T18842] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 706.984146][T18842] ? oom_killer_disable+0x280/0x280 [ 706.989387][T18842] mem_cgroup_out_of_memory+0x1ca/0x230 [ 706.989404][T18842] ? memcg_event_wake+0x230/0x230 [ 706.989424][T18842] ? do_raw_spin_unlock+0x57/0x270 [ 706.989445][T18842] ? _raw_spin_unlock+0x2d/0x50 [ 706.989460][T18842] try_charge+0x1042/0x1410 [ 706.989480][T18842] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 12:50:49 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r5 = gettid() write$cgroup_pid(r4, &(0x7f0000000500)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x89f) write$cgroup_int(r7, 0x0, 0x0) [ 706.989501][T18842] ? find_held_lock+0x35/0x130 [ 707.025345][T18842] ? get_mem_cgroup_from_mm+0x139/0x320 [ 707.031020][T18842] ? lock_downgrade+0x920/0x920 [ 707.035908][T18842] ? percpu_ref_tryget_live+0x111/0x290 [ 707.041610][T18842] __memcg_kmem_charge_memcg+0x7c/0x130 [ 707.047245][T18842] ? memcg_kmem_put_cache+0xb0/0xb0 [ 707.047264][T18842] ? get_mem_cgroup_from_mm+0x156/0x320 [ 707.047281][T18842] __memcg_kmem_charge+0x136/0x370 [ 707.047299][T18842] __alloc_pages_nodemask+0x4bd/0x8d0 12:50:49 executing program 5: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x8d, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0xfc) [ 707.047319][T18842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.047336][T18842] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 707.047359][T18842] ? copy_process+0x46d0/0x6b00 [ 707.081078][T18842] ? lockdep_hardirqs_on+0x418/0x5d0 [ 707.091247][T18842] ? trace_hardirqs_on+0x67/0x220 [ 707.097330][T18842] ? kasan_check_read+0x11/0x20 [ 707.102304][T18842] copy_process+0x3f9/0x6b00 [ 707.106930][T18842] ? __lock_acquire+0x537/0x4af0 [ 707.112087][T18842] ? _raw_spin_unlock+0x2d/0x50 [ 707.117029][T18842] ? __cleanup_sighand+0x60/0x60 [ 707.121997][T18842] ? find_held_lock+0x35/0x130 [ 707.126803][T18842] _do_fork+0x146/0xf70 [ 707.131028][T18842] ? copy_init_mm+0x20/0x20 [ 707.135584][T18842] ? kasan_check_read+0x11/0x20 [ 707.140574][T18842] ? _copy_to_user+0xc9/0x120 [ 707.145287][T18842] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 707.151734][T18842] ? put_timespec64+0xda/0x140 [ 707.151756][T18842] __x64_sys_clone+0x186/0x250 [ 707.151774][T18842] ? __ia32_sys_vfork+0xc0/0xc0 [ 707.151796][T18842] ? lockdep_hardirqs_on+0x418/0x5d0 [ 707.151813][T18842] ? trace_hardirqs_on+0x67/0x220 [ 707.151836][T18842] do_syscall_64+0xfd/0x680 [ 707.181115][T18842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 707.187203][T18842] RIP: 0033:0x457dea [ 707.191120][T18842] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 707.210741][T18842] RSP: 002b:00007ffc3687e5b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 707.210756][T18842] RAX: ffffffffffffffda RBX: 00007ffc3687e5b0 RCX: 0000000000457dea [ 707.210763][T18842] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 707.210769][T18842] RBP: 00007ffc3687e5f0 R08: 0000000000000001 R09: 00005555568d7940 [ 707.210777][T18842] R10: 00005555568d7c10 R11: 0000000000000246 R12: 0000000000000001 [ 707.210784][T18842] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffc3687e640 12:50:50 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) openat$cgroup_subtree(r0, &(0x7f0000002b80)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000100)='veth0\x00', 0xffffffffffffffff}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) sendmsg(r0, &(0x7f0000006300)={0x0, 0x0, &(0x7f0000004e80)=[{&(0x7f0000004dc0)}], 0x1}, 0x20000000) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 12:50:50 executing program 3: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.stat\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x7fffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x10000, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000380)={r1}) sendmsg(r1, &(0x7f0000001f40)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x2, 0x2, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x20}, 0xce5a}}}, 0x80, &(0x7f0000000980)=[{&(0x7f00000008c0)="3baf4a5bef9319866e056dbe2ea97978de214e3f06a5d46804e945482a78397f1cac1e2dc868a804611f15311754c85945a99871671079ac81425367390e5ff46750291c39bb71f60b4ac52b4ca05fd23cf1a6eb6747e6b6c7ce36e19ab4299074aab889b2f5fbb4586d92fdbcbbb1da7c92373acf645e6e9a1d9b6f7bd9f051e2563fb80f80acc1ed57ce94c807fb048e670eb9e4a9710436e835804e5b0ec1f826d4e107aed0512d5d434601f5a189d1", 0xb1}], 0x1}, 0x4000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x11, 0x80a, 0xfffffffffffffff7, &(0x7f0000000280)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xa, 0x100000001, 0x2a8}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r6, &(0x7f0000000100)=',', 0x0}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000100)={'rose0\x00', 0x400}) recvmsg(r1, &(0x7f0000004740)={&(0x7f0000003f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004640)=[{&(0x7f0000004000)=""/203, 0xcb}, {&(0x7f0000004100)=""/170, 0xaa}, {&(0x7f00000041c0)=""/222, 0xde}, {&(0x7f00000042c0)=""/5, 0x5}, {&(0x7f0000004300)=""/238, 0xee}, {&(0x7f0000004400)=""/146, 0x92}, {&(0x7f00000044c0)=""/84, 0x54}, {&(0x7f0000004540)=""/224, 0xe0}], 0x8, &(0x7f00000046c0)=""/122, 0x7a}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004780)={0x18, 0x0, 0x100, 0x5c, 0x100, 0x1, 0x0, [], r7, r0, 0x5, 0x4}, 0x3c) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000003c0)={r1, r3, 0x1, 0x3}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1c, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x8916, &(0x7f0000000000)={r8}) [ 707.605273][T18842] memory: usage 4724kB, limit 0kB, failcnt 49969 [ 707.622147][T18842] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 12:50:50 executing program 5: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x8d, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0xfc) [ 707.692195][T18842] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 12:50:50 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x8d, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0xfc) 12:50:50 executing program 3: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.stat\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x7fffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x10000, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000380)={r1}) sendmsg(r1, &(0x7f0000001f40)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x2, 0x2, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x20}, 0xce5a}}}, 0x80, &(0x7f0000000980)=[{&(0x7f00000008c0)="3baf4a5bef9319866e056dbe2ea97978de214e3f06a5d46804e945482a78397f1cac1e2dc868a804611f15311754c85945a99871671079ac81425367390e5ff46750291c39bb71f60b4ac52b4ca05fd23cf1a6eb6747e6b6c7ce36e19ab4299074aab889b2f5fbb4586d92fdbcbbb1da7c92373acf645e6e9a1d9b6f7bd9f051e2563fb80f80acc1ed57ce94c807fb048e670eb9e4a9710436e835804e5b0ec1f826d4e107aed0512d5d434601f5a189d1", 0xb1}], 0x1}, 0x4000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x11, 0x80a, 0xfffffffffffffff7, &(0x7f0000000280)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xa, 0x100000001, 0x2a8}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r6, &(0x7f0000000100)=',', 0x0}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000100)={'rose0\x00', 0x400}) recvmsg(r1, &(0x7f0000004740)={&(0x7f0000003f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004640)=[{&(0x7f0000004000)=""/203, 0xcb}, {&(0x7f0000004100)=""/170, 0xaa}, {&(0x7f00000041c0)=""/222, 0xde}, {&(0x7f00000042c0)=""/5, 0x5}, {&(0x7f0000004300)=""/238, 0xee}, {&(0x7f0000004400)=""/146, 0x92}, {&(0x7f00000044c0)=""/84, 0x54}, {&(0x7f0000004540)=""/224, 0xe0}], 0x8, &(0x7f00000046c0)=""/122, 0x7a}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004780)={0x18, 0x0, 0x100, 0x5c, 0x100, 0x1, 0x0, [], r7, r0, 0x5, 0x4}, 0x3c) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000003c0)={r1, r3, 0x1, 0x3}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1c, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x8916, &(0x7f0000000000)={r8}) 12:50:50 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x1060841d}], 0x1, 0x0, 0xf601}, 0x3f00) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000340)) close(r1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) 12:50:50 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r5 = gettid() write$cgroup_pid(r4, &(0x7f0000000500)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x89f) write$cgroup_int(r7, 0x0, 0x0) [ 708.195728][T18842] Memory cgroup stats for /syz4: cache:0KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:56KB inactive_file:0KB active_file:0KB unevictable:0KB [ 708.285218][T18842] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=18842,uid=0 [ 708.335410][T18842] Memory cgroup out of memory: Killed process 18842 (syz-executor.4) total-vm:72440kB, anon-rss:104kB, file-rss:35776kB, shmem-rss:0kB [ 708.359029][ T1050] oom_reaper: reaped process 18842 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 708.373084][ T9557] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 708.413462][ T9557] CPU: 1 PID: 9557 Comm: syz-executor.2 Not tainted 5.2.0+ #40 [ 708.421067][ T9557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.431165][ T9557] Call Trace: [ 708.434473][ T9557] dump_stack+0x172/0x1f0 [ 708.438820][ T9557] dump_header+0x10f/0xd33 [ 708.443440][ T9557] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 708.449265][ T9557] ? ___ratelimit+0x60/0x595 [ 708.453878][ T9557] ? do_raw_spin_unlock+0x57/0x270 [ 708.459027][ T9557] oom_kill_process.cold+0x10/0x15 [ 708.464162][ T9557] out_of_memory+0x7f5/0x12e0 [ 708.468869][ T9557] ? oom_killer_disable+0x280/0x280 [ 708.474112][ T9557] mem_cgroup_out_of_memory+0x1ca/0x230 [ 708.479678][ T9557] ? memcg_event_wake+0x230/0x230 [ 708.484726][ T9557] ? do_raw_spin_unlock+0x57/0x270 [ 708.489884][ T9557] ? _raw_spin_unlock+0x2d/0x50 [ 708.494759][ T9557] try_charge+0x1042/0x1410 [ 708.499386][ T9557] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 708.505097][ T9557] ? find_held_lock+0x35/0x130 [ 708.509881][ T9557] ? get_mem_cgroup_from_mm+0x139/0x320 [ 708.515467][ T9557] ? lock_downgrade+0x920/0x920 [ 708.520331][ T9557] ? percpu_ref_tryget_live+0x111/0x290 [ 708.526674][ T9557] __memcg_kmem_charge_memcg+0x7c/0x130 [ 708.532276][ T9557] ? memcg_kmem_put_cache+0xb0/0xb0 [ 708.537514][ T9557] ? get_mem_cgroup_from_mm+0x156/0x320 [ 708.543079][ T9557] __memcg_kmem_charge+0x136/0x370 [ 708.548229][ T9557] __alloc_pages_nodemask+0x4bd/0x8d0 [ 708.553636][ T9557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 708.559905][ T9557] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 708.565641][ T9557] ? copy_process+0x46d0/0x6b00 [ 708.570509][ T9557] ? lockdep_hardirqs_on+0x418/0x5d0 [ 708.575839][ T9557] ? trace_hardirqs_on+0x67/0x220 [ 708.580909][ T9557] ? kasan_check_read+0x11/0x20 [ 708.585778][ T9557] copy_process+0x3f9/0x6b00 [ 708.590391][ T9557] ? __lock_acquire+0x537/0x4af0 [ 708.595363][ T9557] ? _raw_spin_unlock+0x2d/0x50 [ 708.600234][ T9557] ? __cleanup_sighand+0x60/0x60 [ 708.605184][ T9557] ? find_held_lock+0x35/0x130 [ 708.609979][ T9557] _do_fork+0x146/0xf70 [ 708.614146][ T9557] ? copy_init_mm+0x20/0x20 [ 708.618663][ T9557] ? kasan_check_read+0x11/0x20 [ 708.624487][ T9557] ? _copy_to_user+0xc9/0x120 [ 708.629187][ T9557] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 708.635470][ T9557] ? put_timespec64+0xda/0x140 [ 708.640256][ T9557] __x64_sys_clone+0x186/0x250 [ 708.645044][ T9557] ? __ia32_sys_vfork+0xc0/0xc0 [ 708.649942][ T9557] ? lockdep_hardirqs_on+0x418/0x5d0 [ 708.655245][ T9557] ? trace_hardirqs_on+0x67/0x220 [ 708.660305][ T9557] do_syscall_64+0xfd/0x680 [ 708.664841][ T9557] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.670744][ T9557] RIP: 0033:0x457dea [ 708.674650][ T9557] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 708.694832][ T9557] RSP: 002b:00007fff4e636ec0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 708.703262][ T9557] RAX: ffffffffffffffda RBX: 00007fff4e636ec0 RCX: 0000000000457dea [ 708.711251][ T9557] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 708.719237][ T9557] RBP: 00007fff4e636f00 R08: 0000000000000001 R09: 0000555555640940 [ 708.727216][ T9557] R10: 0000555555640c10 R11: 0000000000000246 R12: 0000000000000001 [ 708.735205][ T9557] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff4e636f50 [ 708.746371][ T9557] memory: usage 4604kB, limit 0kB, failcnt 72 [ 708.759851][ T9557] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 708.790978][ T9557] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 708.812868][ T9557] Memory cgroup stats for /syz2: cache:12KB rss:60KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:4KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:60KB inactive_file:0KB active_file:12KB unevictable:0KB [ 708.880362][ T9557] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=9557,uid=0 [ 708.905665][ T9557] Memory cgroup out of memory: Killed process 9557 (syz-executor.2) total-vm:72440kB, anon-rss:108kB, file-rss:35776kB, shmem-rss:0kB [ 708.940390][ T1050] oom_reaper: reaped process 9557 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 12:50:52 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r5 = gettid() write$cgroup_pid(r4, &(0x7f0000000500)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x89f) write$cgroup_int(r7, 0x0, 0x0) 12:50:52 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x8d, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0xfc) 12:50:52 executing program 5: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x8d, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0xfc) 12:50:52 executing program 1: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_int(r0, &(0x7f0000000040), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000080)) 12:50:52 executing program 3: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.stat\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x7fffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x10000, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='cpu&5\n\n\n\x00\x06\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000380)={r1}) sendmsg(r1, &(0x7f0000001f40)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x2, 0x2, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x20}, 0xce5a}}}, 0x80, &(0x7f0000000980)=[{&(0x7f00000008c0)="3baf4a5bef9319866e056dbe2ea97978de214e3f06a5d46804e945482a78397f1cac1e2dc868a804611f15311754c85945a99871671079ac81425367390e5ff46750291c39bb71f60b4ac52b4ca05fd23cf1a6eb6747e6b6c7ce36e19ab4299074aab889b2f5fbb4586d92fdbcbbb1da7c92373acf645e6e9a1d9b6f7bd9f051e2563fb80f80acc1ed57ce94c807fb048e670eb9e4a9710436e835804e5b0ec1f826d4e107aed0512d5d434601f5a189d1", 0xb1}], 0x1}, 0x4000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x11, 0x80a, 0xfffffffffffffff7, &(0x7f0000000280)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xa, 0x100000001, 0x2a8}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r6, &(0x7f0000000100)=',', 0x0}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000100)={'rose0\x00', 0x400}) recvmsg(r1, &(0x7f0000004740)={&(0x7f0000003f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004640)=[{&(0x7f0000004000)=""/203, 0xcb}, {&(0x7f0000004100)=""/170, 0xaa}, {&(0x7f00000041c0)=""/222, 0xde}, {&(0x7f00000042c0)=""/5, 0x5}, {&(0x7f0000004300)=""/238, 0xee}, {&(0x7f0000004400)=""/146, 0x92}, {&(0x7f00000044c0)=""/84, 0x54}, {&(0x7f0000004540)=""/224, 0xe0}], 0x8, &(0x7f00000046c0)=""/122, 0x7a}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004780)={0x18, 0x0, 0x100, 0x5c, 0x100, 0x1, 0x0, [], r7, r0, 0x5, 0x4}, 0x3c) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000003c0)={r1, r3, 0x1, 0x3}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1c, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x588}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x8916, &(0x7f0000000000)={r8}) 12:50:52 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r5 = gettid() write$cgroup_pid(r4, &(0x7f0000000500)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x89f) write$cgroup_int(r7, 0x0, 0x0) 12:50:52 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x0, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r5 = gettid() write$cgroup_pid(r4, &(0x7f0000000500)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x89f) write$cgroup_int(r7, 0x0, 0x0) 12:50:52 executing program 2: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) setsockopt$sock_attach_bpf(r0, 0x10f, 0xb, 0x0, 0x0) 12:50:52 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x8d, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0xfc) 12:50:52 executing program 5: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x3, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x8d, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0xfc) 12:50:52 executing program 3: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 12:50:52 executing program 1: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_int(r0, &(0x7f0000000040), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000080)) 12:50:53 executing program 3: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 12:50:53 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000140)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x16, 0x0, 0x7}], 0x18}, 0x0) 12:50:53 executing program 3: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 12:50:53 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 12:50:53 executing program 0: socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000380)=r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xfd}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r4, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={r5, 0x7, 0x18}, 0xc) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x3, &(0x7f0000346fc8)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000240)=r6, 0x4) 12:50:53 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) recvmsg(r1, 0x0, 0x0) sendmsg$sock(r2, &(0x7f00000008c0)={&(0x7f0000000640)=@nl, 0x80, &(0x7f0000000800)=[{&(0x7f0000000700)}], 0x1}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) close(r0) socket$kcm(0x29, 0x0, 0x0) recvmsg(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/173, 0xad}, {&(0x7f00000003c0)=""/137, 0x89}, {&(0x7f0000000480)=""/51, 0x33}, {0x0}], 0x4, &(0x7f0000000540)=""/184, 0xb8}, 0x102) [ 710.875713][T25497] device nr0 entered promiscuous mode [ 711.538388][T25495] device nr0 entered promiscuous mode [ 711.812479][T25508] IPVS: ftp: loaded support on port[0] = 21 [ 712.200457][T25508] chnl_net:caif_netlink_parms(): no params data found [ 712.222079][T25512] IPVS: ftp: loaded support on port[0] = 21 [ 712.250336][T25508] bridge0: port 1(bridge_slave_0) entered blocking state [ 712.257818][T25508] bridge0: port 1(bridge_slave_0) entered disabled state [ 712.266021][T25508] device bridge_slave_0 entered promiscuous mode [ 712.406638][T25508] bridge0: port 2(bridge_slave_1) entered blocking state [ 712.413761][T25508] bridge0: port 2(bridge_slave_1) entered disabled state [ 712.421899][T25508] device bridge_slave_1 entered promiscuous mode [ 712.571057][T25508] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 712.584864][T25508] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 712.612555][T25508] team0: Port device team_slave_0 added [ 712.620159][T25508] team0: Port device team_slave_1 added [ 712.808056][T25508] device hsr_slave_0 entered promiscuous mode [ 712.845715][T25508] device hsr_slave_1 entered promiscuous mode [ 713.041208][T25512] chnl_net:caif_netlink_parms(): no params data found [ 713.090556][T25512] bridge0: port 1(bridge_slave_0) entered blocking state [ 713.099719][T25512] bridge0: port 1(bridge_slave_0) entered disabled state [ 713.109477][T25512] device bridge_slave_0 entered promiscuous mode [ 713.118405][T25512] bridge0: port 2(bridge_slave_1) entered blocking state [ 713.125700][T25512] bridge0: port 2(bridge_slave_1) entered disabled state [ 713.133798][T25512] device bridge_slave_1 entered promiscuous mode [ 713.219411][T25512] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 713.231505][T25512] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 713.254826][T25512] team0: Port device team_slave_0 added [ 713.263587][T25512] team0: Port device team_slave_1 added [ 713.367116][T25512] device hsr_slave_0 entered promiscuous mode [ 713.415652][T25512] device hsr_slave_1 entered promiscuous mode [ 713.633618][T25508] 8021q: adding VLAN 0 to HW filter on device bond0 [ 713.648862][ T9508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 713.659488][ T9508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 713.733716][T25512] 8021q: adding VLAN 0 to HW filter on device bond0 [ 713.745493][T25508] 8021q: adding VLAN 0 to HW filter on device team0 [ 713.760715][T24650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 713.770600][T24650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 713.779267][T24650] bridge0: port 1(bridge_slave_0) entered blocking state [ 713.786403][T24650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 713.794162][T24650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 713.802189][T24650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 713.858999][T25512] 8021q: adding VLAN 0 to HW filter on device team0 [ 713.868744][ T9508] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 713.877036][ T9508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 713.885975][ T9508] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 713.894332][ T9508] bridge0: port 2(bridge_slave_1) entered blocking state [ 713.901483][ T9508] bridge0: port 2(bridge_slave_1) entered forwarding state [ 713.980700][T24650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 713.990832][T24650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 713.999778][T24650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 714.008788][T24650] bridge0: port 1(bridge_slave_0) entered blocking state [ 714.015935][T24650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 714.024396][T24650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 714.033880][T24650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 714.042422][T24650] bridge0: port 2(bridge_slave_1) entered blocking state [ 714.049615][T24650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 714.059436][T24650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 714.067771][T24650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 714.088824][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 714.098714][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 714.107748][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 714.117849][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 714.127055][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 714.151109][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 714.160293][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 714.169238][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 714.178234][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 714.187371][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 714.196879][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 714.205525][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 714.213911][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 714.222443][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 714.230801][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 714.239309][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 714.247714][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 714.333353][T25508] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 714.345314][T25508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 714.360536][T25512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 714.370327][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 714.380764][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 714.390421][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 714.464863][T25512] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 714.476202][T25508] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 714.790900][T25528] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 714.808175][T25528] CPU: 0 PID: 25528 Comm: syz-executor.4 Not tainted 5.2.0+ #40 [ 714.815842][T25528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.815849][T25528] Call Trace: [ 714.815873][T25528] dump_stack+0x172/0x1f0 [ 714.815895][T25528] dump_header+0x10f/0xd33 [ 714.815922][T25528] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 714.815945][T25528] ? ___ratelimit+0x60/0x595 [ 714.838036][T25528] ? do_raw_spin_unlock+0x57/0x270 [ 714.838068][T25528] oom_kill_process.cold+0x10/0x15 [ 714.838091][T25528] out_of_memory+0x7f5/0x12e0 [ 714.863574][T25528] ? __sched_text_start+0x8/0x8 [ 714.868435][T25528] ? oom_killer_disable+0x280/0x280 [ 714.873661][T25528] mem_cgroup_out_of_memory+0x1ca/0x230 [ 714.879737][T25528] ? memcg_event_wake+0x230/0x230 [ 714.884783][T25528] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 714.890591][T25528] ? cgroup_file_notify+0x140/0x1b0 [ 714.895812][T25528] memory_max_write+0x22f/0x390 [ 714.900654][T25528] ? find_held_lock+0x35/0x130 [ 714.905414][T25528] ? mem_cgroup_write+0x360/0x360 [ 714.910439][T25528] ? lock_acquire+0x16f/0x3f0 [ 714.917170][T25528] ? kernfs_fop_write+0x227/0x480 [ 714.926697][T25528] cgroup_file_write+0x241/0x790 [ 714.931628][T25528] ? mem_cgroup_write+0x360/0x360 [ 714.936645][T25528] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 714.942277][T25528] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 714.947988][T25528] kernfs_fop_write+0x2b8/0x480 [ 714.952828][T25528] __vfs_write+0x8a/0x110 [ 714.957147][T25528] ? kernfs_fop_open+0xd80/0xd80 [ 714.962080][T25528] vfs_write+0x20c/0x580 [ 714.966313][T25528] ksys_write+0x14f/0x290 [ 714.970634][T25528] ? __ia32_sys_read+0xb0/0xb0 [ 714.975390][T25528] ? do_syscall_64+0x26/0x680 [ 714.980302][T25528] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 714.986353][T25528] ? do_syscall_64+0x26/0x680 [ 714.991027][T25528] __x64_sys_write+0x73/0xb0 [ 714.996237][T25528] do_syscall_64+0xfd/0x680 [ 715.000892][T25528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.006787][T25528] RIP: 0033:0x459819 [ 715.010681][T25528] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 715.030278][T25528] RSP: 002b:00007fd96bf86c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 715.038772][T25528] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 715.046745][T25528] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 715.055183][T25528] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 715.063163][T25528] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd96bf876d4 [ 715.071502][T25528] R13: 00000000004c9774 R14: 00000000004e0ba8 R15: 00000000ffffffff [ 715.093695][T25528] memory: usage 6308kB, limit 0kB, failcnt 49972 [ 715.101348][T25528] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 715.116869][T25528] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 715.124012][T25528] Memory cgroup stats for /syz4: cache:0KB rss:2172KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2168KB inactive_file:0KB active_file:0KB unevictable:0KB [ 715.145648][T25528] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=25527,uid=0 [ 715.168933][T25528] Memory cgroup out of memory: Killed process 25527 (syz-executor.4) total-vm:72576kB, anon-rss:2184kB, file-rss:35832kB, shmem-rss:0kB [ 715.186089][ T1050] oom_reaper: reaped process 25527 (syz-executor.4), now anon-rss:0kB, file-rss:34872kB, shmem-rss:0kB 12:50:58 executing program 4: socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000380)=r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xfd}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r4, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={r5, 0x7, 0x18}, 0xc) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x3, &(0x7f0000346fc8)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000240)=r6, 0x4) 12:50:58 executing program 3: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)='c', 0x1}], 0x1}, 0x0) 12:50:58 executing program 1: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_int(r0, &(0x7f0000000040), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000080)) 12:50:58 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) recvmsg(r1, 0x0, 0x0) sendmsg$sock(r2, &(0x7f00000008c0)={&(0x7f0000000640)=@nl, 0x80, &(0x7f0000000800)=[{&(0x7f0000000700)}], 0x1}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) close(r0) socket$kcm(0x29, 0x0, 0x0) recvmsg(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/173, 0xad}, {&(0x7f00000003c0)=""/137, 0x89}, {&(0x7f0000000480)=""/51, 0x33}, {0x0}], 0x4, &(0x7f0000000540)=""/184, 0xb8}, 0x102) 12:50:58 executing program 0: socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000380)=r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xfd}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r4, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={r5, 0x7, 0x18}, 0xc) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x3, &(0x7f0000346fc8)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000240)=r6, 0x4) 12:50:58 executing program 2: socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000380)=r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xfd}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r4, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={r5, 0x7, 0x18}, 0xc) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x3, &(0x7f0000346fc8)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000240)=r6, 0x4) [ 715.381082][T25508] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 715.426582][T25508] CPU: 0 PID: 25508 Comm: syz-executor.4 Not tainted 5.2.0+ #40 [ 715.434270][T25508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.444338][T25508] Call Trace: [ 715.447673][T25508] dump_stack+0x172/0x1f0 [ 715.452025][T25508] dump_header+0x10f/0xd33 [ 715.456458][T25508] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 715.462282][T25508] ? ___ratelimit+0x60/0x595 [ 715.466889][T25508] ? do_raw_spin_unlock+0x57/0x270 [ 715.472044][T25508] oom_kill_process.cold+0x10/0x15 [ 715.477351][T25508] out_of_memory+0x7f5/0x12e0 [ 715.482038][T25508] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 715.487989][T25508] ? oom_killer_disable+0x280/0x280 [ 715.493565][T25508] mem_cgroup_out_of_memory+0x1ca/0x230 [ 715.499160][T25508] ? memcg_event_wake+0x230/0x230 [ 715.504296][T25508] ? do_raw_spin_unlock+0x57/0x270 [ 715.509424][T25508] ? _raw_spin_unlock+0x2d/0x50 [ 715.514294][T25508] try_charge+0x1042/0x1410 [ 715.518819][T25508] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 715.524385][T25508] ? percpu_ref_tryget_live+0x111/0x290 [ 715.529984][T25508] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.536268][T25508] ? kasan_check_read+0x11/0x20 [ 715.541157][T25508] ? get_mem_cgroup_from_mm+0x156/0x320 [ 715.546720][T25508] mem_cgroup_try_charge+0x259/0x6b0 [ 715.552042][T25508] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 715.557867][T25508] wp_page_copy+0x416/0x1770 [ 715.562506][T25508] ? find_held_lock+0x35/0x130 [ 715.567324][T25508] ? pmd_pfn+0x1d0/0x1d0 [ 715.571628][T25508] ? lock_downgrade+0x920/0x920 12:50:58 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) recvmsg(r1, 0x0, 0x0) sendmsg$sock(r2, &(0x7f00000008c0)={&(0x7f0000000640)=@nl, 0x80, &(0x7f0000000800)=[{&(0x7f0000000700)}], 0x1}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) close(r0) socket$kcm(0x29, 0x0, 0x0) recvmsg(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/173, 0xad}, {&(0x7f00000003c0)=""/137, 0x89}, {&(0x7f0000000480)=""/51, 0x33}, {0x0}], 0x4, &(0x7f0000000540)=""/184, 0xb8}, 0x102) [ 715.576498][T25508] ? swp_swapcount+0x540/0x540 [ 715.581358][T25508] ? kasan_check_read+0x11/0x20 [ 715.586325][T25508] ? do_raw_spin_unlock+0x57/0x270 [ 715.591453][T25508] do_wp_page+0x5d8/0x16c0 [ 715.595894][T25508] ? finish_mkwrite_fault+0x540/0x540 [ 715.601328][T25508] __handle_mm_fault+0x22e3/0x3eb0 [ 715.606463][T25508] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 715.612131][T25508] ? kasan_check_read+0x11/0x20 [ 715.617045][T25508] handle_mm_fault+0x1b5/0x6b0 [ 715.621829][T25508] __do_page_fault+0x5f4/0xdb0 [ 715.626650][T25508] do_page_fault+0x71/0x57d [ 715.631317][T25508] ? page_fault+0x8/0x30 [ 715.635592][T25508] page_fault+0x1e/0x30 [ 715.639767][T25508] RIP: 0033:0x4308f6 [ 715.643699][T25508] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 6c 46 64 00 85 c0 0f 84 [ 715.663445][T25508] RSP: 002b:00007ffc8b1c97c0 EFLAGS: 00010206 [ 715.669530][T25508] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 12:50:58 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) r1 = socket$kcm(0x29, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000480)={r1}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, 0x0, 0x10000) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x80000001, 0x8, 0x1f, 0x0, 0x0, 0x4, 0x10000, 0x8, 0x3, 0x5, 0x1, 0x1, 0x2, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x1fe00000000, 0x401, 0xfffffffffffffffe, 0x8, 0x400, 0x3, 0x0, 0x2, 0x3, 0x0, 0x9, 0x1, 0x79, 0x3, 0x5, 0x0, 0x100000000, 0x9, 0x1, 0x0, 0x8001, 0x4, @perf_bp={0x0}, 0x10, 0x1ffc0000000, 0x7, 0x3, 0x2, 0x8}, 0x0, 0xc, r2, 0xb) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='procsecuritytrusted\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x101) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4c}, [@ldst={0x3, 0x0, 0x6}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x67dc0000, 'memory'}]}, 0xfdef) [ 715.677529][T25508] RDX: 000055555656a930 RSI: 0000555556572970 RDI: 0000000000000003 [ 715.685542][T25508] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556569940 [ 715.693551][T25508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 [ 715.701542][T25508] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 715.735257][T25508] memory: usage 3664kB, limit 0kB, failcnt 49980 [ 715.742964][T25508] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 715.770318][T25508] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 715.840457][T25508] Memory cgroup stats for /syz4: cache:0KB rss:40KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB 12:50:58 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) recvmsg(r1, 0x0, 0x0) sendmsg$sock(r2, &(0x7f00000008c0)={&(0x7f0000000640)=@nl, 0x80, &(0x7f0000000800)=[{&(0x7f0000000700)}], 0x1}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) close(r0) socket$kcm(0x29, 0x0, 0x0) recvmsg(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/173, 0xad}, {&(0x7f00000003c0)=""/137, 0x89}, {&(0x7f0000000480)=""/51, 0x33}, {0x0}], 0x4, &(0x7f0000000540)=""/184, 0xb8}, 0x102) [ 715.916005][T25508] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=25508,uid=0 [ 716.017138][T25508] Memory cgroup out of memory: Killed process 25508 (syz-executor.4) total-vm:72444kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB 12:50:58 executing program 1: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_int(r0, &(0x7f0000000040), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000080)) [ 716.067410][T25555] device nr0 entered promiscuous mode [ 716.148225][T25542] device nr0 entered promiscuous mode 12:50:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f00000002c0)=0x1) 12:50:59 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) r1 = socket$kcm(0x29, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000480)={r1}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, 0x0, 0x10000) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x80000001, 0x8, 0x1f, 0x0, 0x0, 0x4, 0x10000, 0x8, 0x3, 0x5, 0x1, 0x1, 0x2, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x1fe00000000, 0x401, 0xfffffffffffffffe, 0x8, 0x400, 0x3, 0x0, 0x2, 0x3, 0x0, 0x9, 0x1, 0x79, 0x3, 0x5, 0x0, 0x100000000, 0x9, 0x1, 0x0, 0x8001, 0x4, @perf_bp={0x0}, 0x10, 0x1ffc0000000, 0x7, 0x3, 0x2, 0x8}, 0x0, 0xc, r2, 0xb) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='procsecuritytrusted\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x101) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4c}, [@ldst={0x3, 0x0, 0x6}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x67dc0000, 'memory'}]}, 0xfdef) [ 716.835174][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 716.837067][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 716.841119][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 716.847287][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:50:59 executing program 4: socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000380)=r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xfd}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r4, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={r5, 0x7, 0x18}, 0xc) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x3, &(0x7f0000346fc8)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000240)=r6, 0x4) 12:50:59 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000002b008151e00f80ecdb4cb904044865160b000100050a0000000009000e0007001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) 12:50:59 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) r1 = socket$kcm(0x29, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000480)={r1}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, 0x0, 0x10000) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x80000001, 0x8, 0x1f, 0x0, 0x0, 0x4, 0x10000, 0x8, 0x3, 0x5, 0x1, 0x1, 0x2, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x1fe00000000, 0x401, 0xfffffffffffffffe, 0x8, 0x400, 0x3, 0x0, 0x2, 0x3, 0x0, 0x9, 0x1, 0x79, 0x3, 0x5, 0x0, 0x100000000, 0x9, 0x1, 0x0, 0x8001, 0x4, @perf_bp={0x0}, 0x10, 0x1ffc0000000, 0x7, 0x3, 0x2, 0x8}, 0x0, 0xc, r2, 0xb) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='procsecuritytrusted\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x101) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4c}, [@ldst={0x3, 0x0, 0x6}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x67dc0000, 'memory'}]}, 0xfdef) 12:50:59 executing program 0: socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000380)=r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xfd}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r4, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={r5, 0x7, 0x18}, 0xc) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x3, &(0x7f0000346fc8)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000240)=r6, 0x4) 12:50:59 executing program 2: socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000380)=r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xfd}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r4, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={r5, 0x7, 0x18}, 0xc) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x3, &(0x7f0000346fc8)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000240)=r6, 0x4) [ 717.408328][T25593] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.1'. 12:51:00 executing program 4: socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000380)=r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xfd}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r4, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={r5, 0x7, 0x18}, 0xc) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x3, &(0x7f0000346fc8)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000240)=r6, 0x4) 12:51:00 executing program 1: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xf, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x401}, [@jmp={0x5, 0x903, 0x0, 0xb, 0x4, 0xffffffffffffffff, 0xffffffffffffffff}, @jmp={0x5, 0xb10, 0xf, 0x7, 0x1, 0x1, 0x8}, @ldst={0x3, 0x1, 0x2, 0xf, 0x6, 0x82, 0x10}, @jmp={0x5, 0xffffffffffffff79, 0xe, 0xe, 0xf, 0xfffffffffffffff8, 0x4}, @generic={0x80, 0x7f3, 0x9, 0xea1, 0xffffffff}, @alu={0x7, 0x1f, 0x7, 0xe, 0x9, 0x6, 0xffffffffffffffff}, @generic={0x2864, 0xffff, 0x0, 0x3ff, 0x4}]}, &(0x7f0000000100)='GPL\x00', 0x80000001, 0x40, &(0x7f0000000140)=""/64, 0x41f00, 0x1, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, &(0x7f0000000200)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x9, 0x3ff, 0x1}, 0x10}, 0x70) r2 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(r2, 0x6, 0x8, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x52bea8667efb538c) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000040)={'ifb0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xfd, 0x8}, 0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000240)=r5, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000400)={r0, r1, 0xf, 0x1}, 0x10) r6 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r6, 0x400454d1, &(0x7f0000000440)={0x1, 0x1, [@random="f6de9f170175"]}) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x4) [ 717.475260][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 717.481218][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 717.487151][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 717.493001][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:51:00 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000002980)="230000006600015bbfa9d345e7eb8d99c1ffffff0e00000043050c000000000000e2d7", 0x23}], 0x1}, 0x0) [ 717.715739][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 717.721650][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 717.769852][T25599] device nr0 entered promiscuous mode [ 717.790062][T25598] device nr0 entered promiscuous mode 12:51:00 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) r1 = socket$kcm(0x29, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000480)={r1}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, 0x0, 0x10000) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x80000001, 0x8, 0x1f, 0x0, 0x0, 0x4, 0x10000, 0x8, 0x3, 0x5, 0x1, 0x1, 0x2, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x1fe00000000, 0x401, 0xfffffffffffffffe, 0x8, 0x400, 0x3, 0x0, 0x2, 0x3, 0x0, 0x9, 0x1, 0x79, 0x3, 0x5, 0x0, 0x100000000, 0x9, 0x1, 0x0, 0x8001, 0x4, @perf_bp={0x0}, 0x10, 0x1ffc0000000, 0x7, 0x3, 0x2, 0x8}, 0x0, 0xc, r2, 0xb) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='procsecuritytrusted\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000240)=0x101) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4c}, [@ldst={0x3, 0x0, 0x6}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x67dc0000, 'memory'}]}, 0xfdef) 12:51:01 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001780)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000200)=[{0x10, 0x29, 0x5}], 0x10}, 0x0) 12:51:01 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x9, 0x40000000004, 0x201, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x400}, 0x8c) [ 718.689789][T25607] device nr0 entered promiscuous mode 12:51:01 executing program 2: socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000380)=r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xfd}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r4, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={r5, 0x7, 0x18}, 0xc) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x3, &(0x7f0000346fc8)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000240)=r6, 0x4) 12:51:01 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 12:51:01 executing program 0: socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000380)=r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xfd}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r4, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={r5, 0x7, 0x18}, 0xc) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x3, &(0x7f0000346fc8)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000240)=r6, 0x4) 12:51:01 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x28}, 0x10) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f00000002c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) write$cgroup_int(r4, 0x0, 0x0) 12:51:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x5, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001500), 0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="04ec0000000000150004000030b4f39c"]) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x38, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x16, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0xfc) [ 719.345664][T25652] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 719.381713][T25647] device nr0 entered promiscuous mode 12:51:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x5, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001500), 0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="04ec0000000000150004000030b4f39c"]) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x38, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x16, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0xfc) [ 719.396761][T25652] CPU: 0 PID: 25652 Comm: syz-executor.3 Not tainted 5.2.0+ #40 [ 719.404778][T25652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.414876][T25652] Call Trace: [ 719.418221][T25652] dump_stack+0x172/0x1f0 [ 719.422753][T25652] dump_header+0x10f/0xd33 [ 719.427233][T25652] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 719.427248][T25652] ? ___ratelimit+0x60/0x595 [ 719.427260][T25652] ? do_raw_spin_unlock+0x57/0x270 [ 719.427290][T25652] oom_kill_process.cold+0x10/0x15 [ 719.448267][T25652] out_of_memory+0x7f5/0x12e0 [ 719.448288][T25652] ? __sched_text_start+0x8/0x8 [ 719.448305][T25652] ? oom_killer_disable+0x280/0x280 [ 719.448332][T25652] mem_cgroup_out_of_memory+0x1ca/0x230 [ 719.448354][T25652] ? memcg_event_wake+0x230/0x230 [ 719.475794][T25652] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 719.481810][T25652] ? cgroup_file_notify+0x140/0x1b0 [ 719.487040][T25652] memory_max_write+0x22f/0x390 [ 719.491990][T25652] ? find_held_lock+0x35/0x130 [ 719.496774][T25652] ? mem_cgroup_write+0x360/0x360 [ 719.501811][T25652] ? lock_acquire+0x16f/0x3f0 [ 719.506501][T25652] ? kernfs_fop_write+0x227/0x480 [ 719.511527][T25652] cgroup_file_write+0x241/0x790 [ 719.516468][T25652] ? mem_cgroup_write+0x360/0x360 [ 719.521536][T25652] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 719.527217][T25652] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 719.532869][T25652] kernfs_fop_write+0x2b8/0x480 [ 719.537766][T25652] __vfs_write+0x8a/0x110 [ 719.542127][T25652] ? kernfs_fop_open+0xd80/0xd80 [ 719.547155][T25652] vfs_write+0x20c/0x580 [ 719.551404][T25652] ksys_write+0x14f/0x290 [ 719.555835][T25652] ? __ia32_sys_read+0xb0/0xb0 [ 719.560848][T25652] ? do_syscall_64+0x26/0x680 [ 719.565763][T25652] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.571866][T25652] ? do_syscall_64+0x26/0x680 [ 719.576593][T25652] __x64_sys_write+0x73/0xb0 [ 719.581219][T25652] do_syscall_64+0xfd/0x680 [ 719.585754][T25652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.591854][T25652] RIP: 0033:0x459819 [ 719.595790][T25652] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 719.615412][T25652] RSP: 002b:00007fb031294c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 719.623949][T25652] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 719.631955][T25652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 719.640114][T25652] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 719.648084][T25652] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb0312956d4 [ 719.656087][T25652] R13: 00000000004c9774 R14: 00000000004e0ba8 R15: 00000000ffffffff [ 719.665982][T25652] memory: usage 7684kB, limit 0kB, failcnt 61429 [ 719.672605][T25652] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 719.680581][T25652] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 719.687703][T25652] Memory cgroup stats for /syz3: cache:4KB rss:2220KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2220KB inactive_file:4KB active_file:0KB unevictable:0KB [ 719.730415][T25652] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=25641,uid=0 [ 719.746423][T25652] Memory cgroup out of memory: Killed process 25641 (syz-executor.3) total-vm:72704kB, anon-rss:2160kB, file-rss:34816kB, shmem-rss:0kB [ 719.766760][ T1050] oom_reaper: reaped process 25641 (syz-executor.3), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB [ 719.830491][T25645] device nr0 entered promiscuous mode [ 719.885722][T25653] IPVS: ftp: loaded support on port[0] = 21 [ 720.524002][T25653] chnl_net:caif_netlink_parms(): no params data found [ 720.556044][T25653] bridge0: port 1(bridge_slave_0) entered blocking state [ 720.563302][T25653] bridge0: port 1(bridge_slave_0) entered disabled state [ 720.571556][T25653] device bridge_slave_0 entered promiscuous mode [ 720.580945][T25653] bridge0: port 2(bridge_slave_1) entered blocking state [ 720.588288][T25653] bridge0: port 2(bridge_slave_1) entered disabled state [ 720.596569][T25653] device bridge_slave_1 entered promiscuous mode [ 720.668578][T25653] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 720.680510][T25653] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 720.750949][T25653] team0: Port device team_slave_0 added [ 720.759176][T25653] team0: Port device team_slave_1 added [ 720.818250][T25653] device hsr_slave_0 entered promiscuous mode [ 720.875713][T25653] device hsr_slave_1 entered promiscuous mode [ 720.980429][T25653] bridge0: port 2(bridge_slave_1) entered blocking state [ 720.987671][T25653] bridge0: port 2(bridge_slave_1) entered forwarding state [ 720.994996][T25653] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.002170][T25653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 721.081743][T25653] 8021q: adding VLAN 0 to HW filter on device bond0 [ 721.094752][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 721.106848][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 721.114873][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 721.178872][T25653] 8021q: adding VLAN 0 to HW filter on device team0 [ 721.189883][ T9508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 721.199531][ T9508] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 721.208165][ T9508] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.215312][ T9508] bridge0: port 1(bridge_slave_0) entered forwarding state [ 721.254750][T24650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 721.263665][T24650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 721.272320][T24650] bridge0: port 2(bridge_slave_1) entered blocking state [ 721.279574][T24650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 721.291095][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 721.304837][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 721.322859][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 721.332608][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 721.341494][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 721.351044][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 721.360624][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 721.424607][T25653] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 721.436764][T25653] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 721.450010][ T9506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 721.458538][ T9506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 721.467758][ T9506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 721.478398][ T9506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 721.550350][ T9506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 721.573997][T25653] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 721.883439][T25670] device nr0 entered promiscuous mode 12:51:04 executing program 2: r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x8, 0x209e20, 0x8000000001}, 0x2c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r0, r1, 0x0, 0x8, &(0x7f00000000c0)='syz_tun\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={r0, 0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000500)='syz_tun\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r0, r2, 0x0, 0x8, &(0x7f0000000200)='syz_tun\x00', r3}, 0x30) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r4, 0x10, &(0x7f0000000480)={&(0x7f00000003c0)=""/129, 0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x167) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r4, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0xbf, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000240)=0x8260, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)}}, 0x10) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000740)=0x2) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x80000001, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000040)={'syz_tun\x00', 0x600}) perf_event_open(&(0x7f00000017c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x4, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 12:51:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xc0ffffff, 0x7c}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0x44e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe64}, 0x48) 12:51:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x5, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001500), 0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="04ec0000000000150004000030b4f39c"]) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x38, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x16, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0xfc) 12:51:04 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000001a40)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) gettid() sendmsg(0xffffffffffffffff, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0xc072}}, 0x0, 0x3f, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x1, 0x1, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r3, 0x28}, 0x10) r4 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x89a2, &(0x7f0000000080)={'bridge0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f00000002c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) write$cgroup_int(r4, 0x0, 0x0) 12:51:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e1810000000e8bd6efb120009000e000100400000ff050005001204", 0x2e}], 0x1}, 0x0) 12:51:04 executing program 4: r0 = socket$kcm(0x10, 0x100000003, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) setsockopt$sock_attach_bpf(r1, 0x84, 0x79, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000500)="2e0000001c00810ee00f80ecdb4cb9f207066b00000000000013000afb120002001208da1b40d805000300c50083", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) [ 722.087353][T14233] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 722.150751][T14233] CPU: 0 PID: 14233 Comm: syz-executor.3 Not tainted 5.2.0+ #40 [ 722.158441][T14233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.168519][T14233] Call Trace: [ 722.171835][T14233] dump_stack+0x172/0x1f0 [ 722.176202][T14233] dump_header+0x10f/0xd33 [ 722.180655][T14233] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 722.186503][T14233] ? ___ratelimit+0x60/0x595 [ 722.191210][T14233] ? do_raw_spin_unlock+0x57/0x270 [ 722.196354][T14233] oom_kill_process.cold+0x10/0x15 [ 722.201542][T14233] out_of_memory+0x7f5/0x12e0 [ 722.206255][T14233] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 722.212090][T14233] ? oom_killer_disable+0x280/0x280 [ 722.217345][T14233] mem_cgroup_out_of_memory+0x1ca/0x230 [ 722.223029][T14233] ? memcg_event_wake+0x230/0x230 [ 722.228111][T14233] ? do_raw_spin_unlock+0x57/0x270 [ 722.233262][T14233] ? _raw_spin_unlock+0x2d/0x50 [ 722.238147][T14233] try_charge+0x1042/0x1410 [ 722.242684][T14233] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 722.248277][T14233] ? find_held_lock+0x35/0x130 [ 722.253066][T14233] ? get_mem_cgroup_from_mm+0x139/0x320 [ 722.258643][T14233] ? lock_downgrade+0x920/0x920 [ 722.263656][T14233] ? percpu_ref_tryget_live+0x111/0x290 [ 722.269275][T14233] __memcg_kmem_charge_memcg+0x7c/0x130 [ 722.274843][T14233] ? memcg_kmem_put_cache+0xb0/0xb0 [ 722.280067][T14233] ? get_mem_cgroup_from_mm+0x156/0x320 [ 722.285659][T14233] __memcg_kmem_charge+0x136/0x370 [ 722.290809][T14233] __alloc_pages_nodemask+0x4bd/0x8d0 [ 722.296221][T14233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.302494][T14233] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 722.308333][T14233] ? copy_process+0x46d0/0x6b00 [ 722.313231][T14233] ? lockdep_hardirqs_on+0x418/0x5d0 [ 722.318576][T14233] ? trace_hardirqs_on+0x67/0x220 [ 722.323613][T14233] ? kasan_check_read+0x11/0x20 [ 722.328503][T14233] copy_process+0x3f9/0x6b00 [ 722.333123][T14233] ? __lock_acquire+0x537/0x4af0 [ 722.338095][T14233] ? _raw_spin_unlock+0x2d/0x50 [ 722.342981][T14233] ? __cleanup_sighand+0x60/0x60 [ 722.347950][T14233] ? find_held_lock+0x35/0x130 [ 722.352854][T14233] _do_fork+0x146/0xf70 [ 722.357075][T14233] ? copy_init_mm+0x20/0x20 [ 722.361608][T14233] ? kasan_check_read+0x11/0x20 [ 722.366472][T14233] ? _copy_to_user+0xc9/0x120 [ 722.371189][T14233] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 722.377460][T14233] ? put_timespec64+0xda/0x140 [ 722.382284][T14233] __x64_sys_clone+0x186/0x250 [ 722.387076][T14233] ? __ia32_sys_vfork+0xc0/0xc0 [ 722.391962][T14233] ? lockdep_hardirqs_on+0x418/0x5d0 [ 722.397272][T14233] ? trace_hardirqs_on+0x67/0x220 [ 722.402428][T14233] do_syscall_64+0xfd/0x680 [ 722.407050][T14233] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.412972][T14233] RIP: 0033:0x457dea [ 722.416886][T14233] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 722.436706][T14233] RSP: 002b:00007fff9dd2b240 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 722.445139][T14233] RAX: ffffffffffffffda RBX: 00007fff9dd2b240 RCX: 0000000000457dea [ 722.453160][T14233] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 722.461159][T14233] RBP: 00007fff9dd2b280 R08: 0000000000000001 R09: 000055555635a940 [ 722.469152][T14233] R10: 000055555635ac10 R11: 0000000000000246 R12: 0000000000000001 [ 722.477140][T14233] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff9dd2b2d0 [ 722.559133][T14233] memory: usage 5256kB, limit 0kB, failcnt 61437 [ 722.565941][T14233] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 722.573790][T14233] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 722.582100][T14233] Memory cgroup stats for /syz3: cache:4KB rss:68KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:68KB inactive_file:4KB active_file:0KB unevictable:0KB 12:51:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x3, &(0x7f0000000040)=@framed={{0x15, 0xa, 0x0, 0x0, 0x0, 0x61, 0x10, 0x28}}, &(0x7f0000000400)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1D\x90Cy\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00qV\xf5\x9d~\v\xd0\x01\xddnDc\x81\xce\x98pay\xfeE!W\xc6\x9e\x8d~\x98\xd1\x11\xee\xf9\x87\x15\x04\xd4\a\x05\x8dr\xdb\x06\xc4\\\x10\xb5PQ\xdb\xa8^\x13[\x15y^\xd1\xffq\xaaO!\xe1IB\x16\x94\xd7\xe7(<}r\x97\xc3,=\xf2\x7f\xe9F\xd6\b!\xb8H\x90c-\x9c\xa57\xc0\xb2vm\x18\xb5\xf9>\x10\xfb\xf3\xa3\xe9\xcd\xca\xc2\xfe\xcfh\x86\x99}\xeen\x1f\xaf\x9c\xf4_\f\x91\xc0\x89\x82<\x8bS|\\t\x16\xda.\x85\x88\xaf\xfe\x8a\'-\xdc\xcaZ\xc4\xd2\xc6\x12\x98\xa5\xdc\xcb\xdc\xe4\x84\xd7\xe9i_\xeb\xa0|\xda@e\xcd\xb8\x12s\xe59z\x81P0\xab\xf4$4\xb4\xc1yI\xc6eU\x92L\x94\xbdG_+\t\xcfp\x11\xa8\xabt\xad\x89\xef\xa9y\xe0\x89', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x14) [ 722.649748][T25684] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. [ 722.688153][T14233] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=14233,uid=0 12:51:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x5, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001500), 0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="04ec0000000000150004000030b4f39c"]) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x38, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x16, &(0x7f0000000180)=[{0x20, 0x84, 0x8}], 0x20}, 0xfc) 12:51:05 executing program 2: r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x8, 0x209e20, 0x8000000001}, 0x2c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r0, r1, 0x0, 0x8, &(0x7f00000000c0)='syz_tun\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={r0, 0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000500)='syz_tun\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r0, r2, 0x0, 0x8, &(0x7f0000000200)='syz_tun\x00', r3}, 0x30) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r4, 0x10, &(0x7f0000000480)={&(0x7f00000003c0)=""/129, 0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x167) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r4, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0xbf, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000240)=0x8260, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)}}, 0x10) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000740)=0x2) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x80000001, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000040)={'syz_tun\x00', 0x600}) perf_event_open(&(0x7f00000017c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x4, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 722.756740][T25686] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.4'. [ 722.794994][T14233] Memory cgroup out of memory: Killed process 14233 (syz-executor.3) total-vm:72440kB, anon-rss:112kB, file-rss:35776kB, shmem-rss:0kB 12:51:05 executing program 4: r0 = socket$kcm(0x10, 0x100000003, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) setsockopt$sock_attach_bpf(r1, 0x84, 0x79, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000500)="2e0000001c00810ee00f80ecdb4cb9f207066b00000000000013000afb120002001208da1b40d805000300c50083", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) 12:51:05 executing program 0: r0 = socket$kcm(0x10, 0x100000003, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) setsockopt$sock_attach_bpf(r1, 0x84, 0x79, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000500)="2e0000001c00810ee00f80ecdb4cb9f207066b00000000000013000afb120002001208da1b40d805000300c50083", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) 12:51:05 executing program 1: r0 = socket$kcm(0x10, 0x100000003, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) setsockopt$sock_attach_bpf(r1, 0x84, 0x79, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000500)="2e0000001c00810ee00f80ecdb4cb9f207066b00000000000013000afb120002001208da1b40d805000300c50083", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) [ 723.018993][ T21] device hsr_slave_0 left promiscuous mode [ 723.075647][ T21] device hsr_slave_1 left promiscuous mode [ 723.145530][ T21] device bridge_slave_1 left promiscuous mode [ 723.151824][ T21] bridge0: port 2(bridge_slave_1) entered disabled state 12:51:05 executing program 5: r0 = socket$kcm(0x10, 0x100000003, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) setsockopt$sock_attach_bpf(r1, 0x84, 0x79, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000500)="2e0000001c00810ee00f80ecdb4cb9f207066b00000000000013000afb120002001208da1b40d805000300c50083", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) 12:51:05 executing program 2: r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x8, 0x209e20, 0x8000000001}, 0x2c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r0, r1, 0x0, 0x8, &(0x7f00000000c0)='syz_tun\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={r0, 0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000500)='syz_tun\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r0, r2, 0x0, 0x8, &(0x7f0000000200)='syz_tun\x00', r3}, 0x30) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r4, 0x10, &(0x7f0000000480)={&(0x7f00000003c0)=""/129, 0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x167) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r4, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0xbf, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000240)=0x8260, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)}}, 0x10) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000740)=0x2) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x80000001, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000040)={'syz_tun\x00', 0x600}) perf_event_open(&(0x7f00000017c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x4, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 723.236917][ T21] device bridge_slave_0 left promiscuous mode [ 723.243420][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 723.341540][ T21] device hsr_slave_0 left promiscuous mode [ 723.369851][ T21] device hsr_slave_1 left promiscuous mode [ 723.395322][ C0] kasan: CONFIG_KASAN_INLINE enabled [ 723.400945][ C0] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 723.409199][ C0] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 723.416323][ C0] CPU: 0 PID: 25715 Comm: syz-executor.2 Not tainted 5.2.0+ #40 [ 723.423943][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.434281][ C0] RIP: 0010:send_hsr_supervision_frame+0x38/0xf20 [ 723.440861][ C0] Code: 89 fd 41 54 53 48 83 ec 50 89 75 bc e8 11 07 54 fa 49 8d 45 10 48 89 c2 48 89 45 d0 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 dc 0c 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 723.460466][ C0] RSP: 0018:ffff8880ae809c58 EFLAGS: 00010202 [ 723.466543][ C0] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff871d8677 [ 723.474502][ C0] RDX: 0000000000000002 RSI: ffffffff871d732f RDI: 0000000000000000 [ 723.482476][ C0] RBP: ffff8880ae809cd0 R08: ffff88806c920080 R09: ffffed1015d06c84 [ 723.490441][ C0] R10: ffffed1015d06c83 R11: ffff8880ae83641b R12: ffff888095302d40 [ 723.498446][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000 [ 723.506444][ C0] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 723.515363][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 723.521944][ C0] CR2: 0000001b2e228000 CR3: 0000000008c6d000 CR4: 00000000001406f0 [ 723.531608][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 723.539669][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 723.547647][ C0] Call Trace: [ 723.550919][ C0] [ 723.553759][ C0] ? lock_acquire+0x16f/0x3f0 [ 723.558435][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.564697][ C0] ? kasan_check_read+0x11/0x20 [ 723.569558][ C0] hsr_announce+0x12f/0x3b0 [ 723.574079][ C0] call_timer_fn+0x193/0x720 [ 723.578677][ C0] ? hsr_dev_open+0x380/0x380 [ 723.583356][ C0] ? process_timeout+0x40/0x40 [ 723.588131][ C0] ? run_timer_softirq+0x65d/0x1740 [ 723.593325][ C0] ? trace_hardirqs_on+0x67/0x220 [ 723.598336][ C0] ? kasan_check_read+0x11/0x20 [ 723.603202][ C0] ? hsr_dev_open+0x380/0x380 [ 723.607869][ C0] run_timer_softirq+0x66f/0x1740 [ 723.613101][ C0] ? add_timer+0x930/0x930 [ 723.617536][ C0] __do_softirq+0x25e/0x913 [ 723.622059][ C0] ? sched_clock_cpu+0x1b/0x1b0 [ 723.626913][ C0] irq_exit+0x180/0x1d0 [ 723.631060][ C0] smp_apic_timer_interrupt+0x171/0x5a0 [ 723.636634][ C0] apic_timer_interrupt+0xf/0x20 [ 723.641555][ C0] [ 723.644493][ C0] RIP: 0010:rcu_dynticks_curr_cpu_in_eqs+0x38/0xb0 [ 723.650990][ C0] Code: 48 83 ec 08 e8 99 5d d8 01 48 ba 00 00 00 00 00 fc ff df 89 c0 48 8d 3c c5 00 21 97 88 48 89 f9 48 c1 e9 03 80 3c 11 00 75 63 <48> 03 1c c5 00 21 97 88 be 04 00 00 00 4c 8d a3 d8 00 00 00 4c 89 [ 723.670584][ C0] RSP: 0018:ffff88808e87f8c0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 723.679009][ C0] RAX: 0000000000000000 RBX: 0000000000036340 RCX: 1ffffffff112e420 [ 723.686992][ C0] RDX: dffffc0000000000 RSI: ffffffff8337bf3c RDI: ffffffff88972100 [ 723.695050][ C0] RBP: ffff88808e87f8d8 R08: ffff88806c920080 R09: ffffffff89a28e70 [ 723.703054][ C0] R10: ffff88806c920938 R11: ffff88806c920080 R12: ffffea00019760c0 [ 723.711040][ C0] R13: ffffea00019760c8 R14: 0000000000000000 R15: dead000000000100 [ 723.719315][ C0] ? debug_smp_processor_id+0x3c/0x214 [ 723.724780][ C0] rcu_is_watching+0x10/0x30 [ 723.729391][ C0] lock_page_memcg+0x13d/0x240 [ 723.734163][ C0] ? __pte_alloc_kernel+0x220/0x220 [ 723.739400][ C0] page_remove_rmap+0x53d/0x1090 [ 723.744332][ C0] ? __tlb_remove_page_size+0x138/0x4a0 [ 723.749876][ C0] unmap_page_range+0xd3b/0x22f0 [ 723.756890][ C0] ? vm_normal_page_pmd+0x400/0x400 [ 723.762104][ C0] ? __kasan_slab_free+0x102/0x150 [ 723.767213][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 723.773558][ C0] ? uprobe_munmap+0xad/0x2b0 [ 723.778230][ C0] ? mmput+0x3e8/0x4c0 [ 723.782296][ C0] unmap_single_vma+0x19d/0x300 [ 723.787162][ C0] unmap_vmas+0x135/0x280 [ 723.791500][ C0] ? zap_vma_ptes+0x110/0x110 [ 723.796233][ C0] ? kasan_check_write+0x14/0x20 [ 723.801311][ C0] exit_mmap+0x2ad/0x510 [ 723.805663][ C0] ? __ia32_sys_munmap+0x80/0x80 [ 723.810720][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 723.816982][ C0] ? __khugepaged_exit+0xcf/0x400 [ 723.822018][ C0] mmput+0x15f/0x4c0 [ 723.825927][ C0] do_exit+0x816/0x2ef0 [ 723.830101][ C0] ? __sched_text_start+0x8/0x8 [ 723.834959][ C0] ? mm_update_next_owner+0x640/0x640 [ 723.840358][ C0] ? preempt_schedule_common+0x4f/0xd0 [ 723.845871][ C0] ? preempt_schedule+0x4b/0x60 [ 723.850933][ C0] ? ___preempt_schedule+0x16/0x18 [ 723.856045][ C0] do_group_exit+0x135/0x370 [ 723.860638][ C0] __x64_sys_exit_group+0x44/0x50 [ 723.865683][ C0] do_syscall_64+0xfd/0x680 [ 723.870226][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.876138][ C0] RIP: 0033:0x459819 [ 723.880044][ C0] Code: Bad RIP value. [ 723.884125][ C0] RSP: 002b:00007ffcfb7da018 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 723.892900][ C0] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 0000000000459819 [ 723.900980][ C0] RDX: 0000000000413501 RSI: fffffffffffffff7 RDI: 0000000000000000 [ 723.909077][ C0] RBP: 0000000000000000 R08: 000000004c11cc81 R09: 00007ffcfb7da070 [ 723.917200][ C0] R10: ffffffff8100a33d R11: 0000000000000246 R12: 0000000000000000 [ 723.925185][ C0] R13: 00007ffcfb7da070 R14: 0000000000000000 R15: 00007ffcfb7da080 [ 723.933194][ C0] ? do_syscall_64+0x3bd/0x680 [ 723.937975][ C0] Modules linked in: [ 723.942007][ C0] ---[ end trace 0e25ed39539fabf2 ]--- [ 723.947576][ C0] RIP: 0010:send_hsr_supervision_frame+0x38/0xf20 [ 723.954199][ C0] Code: 89 fd 41 54 53 48 83 ec 50 89 75 bc e8 11 07 54 fa 49 8d 45 10 48 89 c2 48 89 45 d0 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 dc 0c 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 723.974033][ C0] RSP: 0018:ffff8880ae809c58 EFLAGS: 00010202 [ 723.980149][ C0] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff871d8677 [ 723.988164][ C0] RDX: 0000000000000002 RSI: ffffffff871d732f RDI: 0000000000000000 [ 723.996210][ C0] RBP: ffff8880ae809cd0 R08: ffff88806c920080 R09: ffffed1015d06c84 [ 724.004227][ C0] R10: ffffed1015d06c83 R11: ffff8880ae83641b R12: ffff888095302d40 [ 724.012265][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: dffffc0000000000 [ 724.021148][ C0] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 724.030500][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 724.037308][ C0] CR2: 00000000004597ef CR3: 0000000008c6d000 CR4: 00000000001406f0 [ 724.045891][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 724.054055][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 724.062074][ C0] Kernel panic - not syncing: Fatal exception in interrupt [ 724.070751][ C0] Kernel Offset: disabled [ 724.075089][ C0] Rebooting in 86400 seconds..