syzkaller syzkaller login: [ 13.879356][ T25] kauditd_printk_skb: 43 callbacks suppressed [ 13.879368][ T25] audit: type=1400 audit(1685653118.577:76): avc: denied { transition } for pid=2922 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.883207][ T25] audit: type=1400 audit(1685653118.577:77): avc: denied { noatsecure } for pid=2922 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.885810][ T25] audit: type=1400 audit(1685653118.577:78): avc: denied { write } for pid=2922 comm="sh" path="pipe:[2491]" dev="pipefs" ino=2491 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 13.888811][ T25] audit: type=1400 audit(1685653118.577:79): avc: denied { rlimitinh } for pid=2922 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.891363][ T25] audit: type=1400 audit(1685653118.577:80): avc: denied { siginh } for pid=2922 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.24' (ECDSA) to the list of known hosts. 2023/06/01 20:58:45 fuzzer started 2023/06/01 20:58:45 dialing manager at 10.128.0.163:30015 [ 21.224731][ T25] audit: type=1400 audit(1685653125.917:81): avc: denied { mounton } for pid=3043 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.226072][ T3043] cgroup: Unknown subsys name 'net' [ 21.247434][ T25] audit: type=1400 audit(1685653125.927:82): avc: denied { mount } for pid=3043 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.275380][ T25] audit: type=1400 audit(1685653125.947:83): avc: denied { unmount } for pid=3043 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.446473][ T3043] cgroup: Unknown subsys name 'rlimit' [ 21.455312][ T25] audit: type=1400 audit(1685653126.157:84): avc: denied { read } for pid=2727 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 2023/06/01 20:58:46 syscalls: 2854 2023/06/01 20:58:46 code coverage: enabled 2023/06/01 20:58:46 comparison tracing: enabled 2023/06/01 20:58:46 extra coverage: enabled 2023/06/01 20:58:46 delay kcov mmap: enabled 2023/06/01 20:58:46 setuid sandbox: enabled 2023/06/01 20:58:46 namespace sandbox: enabled 2023/06/01 20:58:46 Android sandbox: enabled 2023/06/01 20:58:46 fault injection: enabled 2023/06/01 20:58:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2023/06/01 20:58:46 net packet injection: enabled 2023/06/01 20:58:46 net device setup: enabled 2023/06/01 20:58:46 concurrency sanitizer: enabled 2023/06/01 20:58:46 devlink PCI setup: PCI device 0000:00:10.0 is not available 2023/06/01 20:58:46 NIC VF setup: PCI device 0000:00:11.0 is not available 2023/06/01 20:58:46 USB emulation: /dev/raw-gadget does not exist 2023/06/01 20:58:46 hci packet injection: /dev/vhci does not exist 2023/06/01 20:58:46 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2023/06/01 20:58:46 802.15.4 emulation: enabled 2023/06/01 20:58:46 suppressing KCSAN reports in functions: 'generic_fillattr' 'ext4_mb_good_group' 2023/06/01 20:58:46 fetching corpus: 0, signal 0/2000 (executing program) [ 21.546123][ T25] audit: type=1400 audit(1685653126.247:85): avc: denied { mounton } for pid=3043 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.570948][ T25] audit: type=1400 audit(1685653126.247:86): avc: denied { mount } for pid=3043 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.594442][ T25] audit: type=1400 audit(1685653126.247:87): avc: denied { create } for pid=3043 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.615215][ T25] audit: type=1400 audit(1685653126.247:88): avc: denied { write } for pid=3043 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.635693][ T25] audit: type=1400 audit(1685653126.247:89): avc: denied { read } for pid=3043 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2023/06/01 20:58:46 fetching corpus: 50, signal 23985/26755 (executing program) 2023/06/01 20:58:46 fetching corpus: 100, signal 34318/37721 (executing program) 2023/06/01 20:58:46 fetching corpus: 150, signal 42326/46017 (executing program) 2023/06/01 20:58:46 fetching corpus: 200, signal 45719/49884 (executing program) 2023/06/01 20:58:47 fetching corpus: 250, signal 50324/54599 (executing program) 2023/06/01 20:58:47 fetching corpus: 300, signal 54548/58792 (executing program) 2023/06/01 20:58:47 fetching corpus: 348, signal 56544/60970 (executing program) 2023/06/01 20:58:47 fetching corpus: 397, signal 59567/63783 (executing program) 2023/06/01 20:58:48 fetching corpus: 447, signal 61906/65976 (executing program) 2023/06/01 20:58:48 fetching corpus: 495, signal 64962/68603 (executing program) 2023/06/01 20:58:48 fetching corpus: 544, signal 67654/70849 (executing program) 2023/06/01 20:58:48 fetching corpus: 594, signal 69731/72501 (executing program) 2023/06/01 20:58:48 fetching corpus: 642, signal 73013/74801 (executing program) 2023/06/01 20:58:49 fetching corpus: 691, signal 75064/76169 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75123/76273 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75123/76375 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75123/76454 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75127/76523 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75127/76614 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75127/76683 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75127/76758 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75127/76843 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75127/76925 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75127/77007 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75127/77086 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75127/77184 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75127/77278 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75163/77394 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75163/77465 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75163/77549 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75163/77623 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75167/77707 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75167/77785 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75167/77875 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75167/77940 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75167/78004 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75167/78087 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75167/78175 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75167/78193 (executing program) 2023/06/01 20:58:49 fetching corpus: 693, signal 75167/78193 (executing program) 2023/06/01 20:58:50 starting 6 fuzzer processes 20:58:50 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000004440)=@base={0x2, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x1}, 0x48) 20:58:50 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x48004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000800)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x8441, 0x0, 0x0, 0x0, 0x9638}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001a40)={0x4, 0x80, 0x9, 0x7, 0x80, 0x0, 0x0, 0x1, 0x40304, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000021, 0x2, @perf_bp={&(0x7f0000000700)}, 0x802, 0x6, 0x0, 0x6, 0x0, 0xbb92, 0x80, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x5, 0x38, 0x1, 0xff, 0x0, 0xe257, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x3}, 0x40, 0x5, 0x9c, 0x4, 0x0, 0x5, 0x3, 0x0, 0x6}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0xfdef) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x1, 0xd3, 0x5, 0x0, 0x7fffffff, 0x2000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa, 0x2, @perf_bp={&(0x7f0000000200), 0xd}, 0x21c0, 0x5, 0x7, 0x0, 0x2, 0x44, 0x3c9e, 0x0, 0x5, 0x0, 0x8}, 0x0, 0x4, r2, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x1ff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x0, 0x40, 0x0, 0x79, 0x0, 0x0, 0x41, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x5, 0x9, 0x6, 0x0, 0x10001}, 0x0, 0xa, r1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000300)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000005c0)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x16\x17\xd6\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x7b, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @broadcast}}}, 0x9c) [ 26.211560][ T3036] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=3036 'syz-fuzzer' [ 26.321990][ T25] audit: type=1400 audit(1685653131.017:90): avc: denied { execmem } for pid=3050 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 26.418882][ T25] audit: type=1400 audit(1685653131.117:91): avc: denied { read } for pid=3057 comm="syz-executor.4" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 26.440285][ T25] audit: type=1400 audit(1685653131.117:92): avc: denied { open } for pid=3057 comm="syz-executor.4" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 26.525415][ T25] audit: type=1400 audit(1685653131.117:93): avc: denied { mounton } for pid=3057 comm="syz-executor.4" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 26.546991][ T25] audit: type=1400 audit(1685653131.117:94): avc: denied { module_request } for pid=3057 comm="syz-executor.4" kmod="netdev-nr4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 26.569016][ T25] audit: type=1400 audit(1685653131.137:95): avc: denied { sys_module } for pid=3057 comm="syz-executor.4" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 26.653869][ T3057] chnl_net:caif_netlink_parms(): no params data found [ 26.748339][ T3057] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.755464][ T3057] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.762585][ T3057] bridge_slave_0: entered allmulticast mode [ 26.769004][ T3057] bridge_slave_0: entered promiscuous mode [ 26.805817][ T3057] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.813012][ T3057] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.820299][ T3057] bridge_slave_1: entered allmulticast mode [ 26.826740][ T3057] bridge_slave_1: entered promiscuous mode [ 26.853344][ T3057] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.885898][ T3057] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.908751][ T3057] team0: Port device team_slave_0 added [ 26.939567][ T3057] team0: Port device team_slave_1 added [ 26.978673][ T3057] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 26.985655][ T3057] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.011648][ T3057] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.024223][ T3057] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.031198][ T3057] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.057299][ T3057] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.082139][ T3059] chnl_net:caif_netlink_parms(): no params data found [ 27.121112][ T3060] chnl_net:caif_netlink_parms(): no params data found [ 27.142963][ T3057] hsr_slave_0: entered promiscuous mode [ 27.149127][ T3057] hsr_slave_1: entered promiscuous mode [ 27.165416][ T3066] chnl_net:caif_netlink_parms(): no params data found [ 27.191497][ T3068] chnl_net:caif_netlink_parms(): no params data found [ 27.205998][ T3059] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.213033][ T3059] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.220279][ T3059] bridge_slave_0: entered allmulticast mode [ 27.226591][ T3059] bridge_slave_0: entered promiscuous mode [ 27.234995][ T3059] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.242093][ T3059] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.249286][ T3059] bridge_slave_1: entered allmulticast mode [ 27.255545][ T3059] bridge_slave_1: entered promiscuous mode [ 27.263242][ T3075] chnl_net:caif_netlink_parms(): no params data found [ 27.309874][ T3060] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.317115][ T3060] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.324218][ T3060] bridge_slave_0: entered allmulticast mode [ 27.331291][ T25] audit: type=1400 audit(1685653132.037:96): avc: denied { append } for pid=2727 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 27.331814][ T3060] bridge_slave_0: entered promiscuous mode [ 27.353363][ T25] audit: type=1400 audit(1685653132.037:97): avc: denied { open } for pid=2727 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 27.381567][ T25] audit: type=1400 audit(1685653132.037:98): avc: denied { getattr } for pid=2727 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 27.407175][ T3059] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.422169][ T3059] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.439243][ T3060] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.446600][ T3060] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.453762][ T3060] bridge_slave_1: entered allmulticast mode [ 27.460169][ T3060] bridge_slave_1: entered promiscuous mode [ 27.482398][ T3059] team0: Port device team_slave_0 added [ 27.508087][ T3059] team0: Port device team_slave_1 added [ 27.521594][ T3066] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.528737][ T3066] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.535880][ T3066] bridge_slave_0: entered allmulticast mode [ 27.542166][ T3066] bridge_slave_0: entered promiscuous mode [ 27.556103][ T3068] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.563216][ T3068] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.570742][ T3068] bridge_slave_0: entered allmulticast mode [ 27.577156][ T3068] bridge_slave_0: entered promiscuous mode [ 27.591860][ T3060] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.601077][ T3066] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.608125][ T3066] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.615290][ T3066] bridge_slave_1: entered allmulticast mode [ 27.621469][ T3066] bridge_slave_1: entered promiscuous mode [ 27.633235][ T3068] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.640319][ T3068] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.647573][ T3068] bridge_slave_1: entered allmulticast mode [ 27.653718][ T3068] bridge_slave_1: entered promiscuous mode [ 27.668768][ T3060] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.690514][ T3075] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.697948][ T3075] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.705291][ T3075] bridge_slave_0: entered allmulticast mode [ 27.711603][ T3075] bridge_slave_0: entered promiscuous mode [ 27.718048][ T3059] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.724984][ T3059] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.751232][ T3059] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.777760][ T3066] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.791267][ T3075] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.798369][ T3075] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.805485][ T3075] bridge_slave_1: entered allmulticast mode [ 27.811913][ T3075] bridge_slave_1: entered promiscuous mode [ 27.818246][ T3059] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.825236][ T3059] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.851118][ T3059] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.862498][ T3060] team0: Port device team_slave_0 added [ 27.872208][ T3066] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.882113][ T3068] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.904153][ T3060] team0: Port device team_slave_1 added [ 27.924269][ T3068] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.934517][ T3075] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.002176][ T3057] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 28.011328][ T3075] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.025860][ T3066] team0: Port device team_slave_0 added [ 28.036285][ T3060] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.043377][ T3060] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.070074][ T3060] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.080896][ T3057] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 28.094162][ T3068] team0: Port device team_slave_0 added [ 28.100486][ T3066] team0: Port device team_slave_1 added [ 28.108381][ T3059] hsr_slave_0: entered promiscuous mode [ 28.114389][ T3059] hsr_slave_1: entered promiscuous mode [ 28.120304][ T3059] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.127895][ T3059] Cannot create hsr debugfs directory [ 28.133616][ T3060] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.140618][ T3060] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.166604][ T3060] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.181620][ T3057] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 28.190364][ T3068] team0: Port device team_slave_1 added [ 28.205282][ T3075] team0: Port device team_slave_0 added [ 28.210910][ T3057] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 28.229013][ T3066] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.236004][ T3066] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.262077][ T3066] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.273696][ T3075] team0: Port device team_slave_1 added [ 28.289878][ T3068] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.296860][ T3068] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.322937][ T3068] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.334503][ T3066] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.341459][ T3066] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.367394][ T3066] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.391420][ T3068] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.398401][ T3068] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.424355][ T3068] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.445125][ T3075] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.452164][ T3075] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.478072][ T3075] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.503289][ T3075] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.510250][ T3075] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.536321][ T3075] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.551179][ T3060] hsr_slave_0: entered promiscuous mode [ 28.557057][ T3060] hsr_slave_1: entered promiscuous mode [ 28.562892][ T3060] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.570509][ T3060] Cannot create hsr debugfs directory [ 28.594357][ T3066] hsr_slave_0: entered promiscuous mode [ 28.600664][ T3066] hsr_slave_1: entered promiscuous mode [ 28.606497][ T3066] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.614058][ T3066] Cannot create hsr debugfs directory [ 28.637869][ T3068] hsr_slave_0: entered promiscuous mode [ 28.644121][ T3068] hsr_slave_1: entered promiscuous mode [ 28.650051][ T3068] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.657626][ T3068] Cannot create hsr debugfs directory [ 28.688346][ T3075] hsr_slave_0: entered promiscuous mode [ 28.694465][ T3075] hsr_slave_1: entered promiscuous mode [ 28.700422][ T3075] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.708002][ T3075] Cannot create hsr debugfs directory [ 28.718078][ T25] audit: type=1400 audit(1685653133.417:99): avc: denied { remove_name } for pid=2727 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 28.780797][ T3066] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 28.792468][ T3059] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 28.807280][ T3066] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 28.815888][ T3066] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 28.823875][ T3066] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 28.833013][ T3059] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 28.846502][ T3057] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.864146][ T3059] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 28.886828][ T3059] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 28.912822][ T3057] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.925582][ T3060] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 28.935430][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.943021][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.965613][ T3060] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 28.973801][ T3075] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 28.996677][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.005368][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.013598][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.020727][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.028471][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.036907][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.045693][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.052712][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.060565][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 29.069279][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 29.079047][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 29.088811][ T3060] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 29.097527][ T3060] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 29.114449][ T3075] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 29.122702][ T3068] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 29.131209][ T3068] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 29.140533][ T3068] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 29.148822][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 29.157183][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 29.165949][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 29.180877][ T3059] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.188034][ T3075] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 29.196690][ T3075] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 29.205769][ T3068] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 29.229756][ T3060] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.237174][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 29.246324][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 29.279492][ T3057] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.289933][ T3057] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.304508][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.312164][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.320161][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.328564][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.336719][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.345516][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.353537][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.361296][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.371225][ T3060] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.379400][ T3059] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.403449][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 29.424848][ T3066] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.438059][ T3066] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.456322][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.464785][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.473745][ T3149] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.480893][ T3149] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.488693][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.497208][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.505496][ T3149] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.512549][ T3149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.520220][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 29.528796][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 29.537292][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 29.545554][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 29.553856][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.562528][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.571900][ T3149] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.578970][ T3149] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.586672][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.595754][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.604190][ T3149] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.611629][ T3149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.619393][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.627120][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.634506][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 29.641890][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 29.654324][ T3059] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.664761][ T3059] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.685101][ T3068] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.693916][ T3057] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.705435][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 29.713653][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 29.722014][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 29.730269][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 29.738675][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 29.747107][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.755395][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.763835][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.772083][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.780373][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 29.788977][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.797522][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.805939][ T3149] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.812984][ T3149] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.820880][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.829570][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.837829][ T3149] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.844844][ T3149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.852513][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 29.861200][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 29.869895][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 29.878387][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 29.886801][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 29.908989][ T3068] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.919833][ T3060] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.930447][ T3060] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.942844][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 29.950784][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 29.959167][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 29.967735][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 29.977282][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 29.986916][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 29.996276][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 30.004676][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.012731][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.021000][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.030919][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.039756][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.048344][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.059597][ T3075] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.074840][ T3075] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.085198][ T3059] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.093749][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 30.102630][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 30.110546][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 30.119169][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 30.127960][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.136313][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.144492][ T3149] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.151679][ T3149] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.159589][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.168148][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.176505][ T3149] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.183529][ T3149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.191383][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 30.200042][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 30.208983][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.216541][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.224269][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 30.232724][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 30.241273][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 30.248737][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 30.262414][ T3068] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 30.273262][ T3068] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.291206][ T3066] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 30.301673][ T3066] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.318735][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 30.326940][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 30.341804][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 30.350180][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 30.358592][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.366817][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.375338][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.383833][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.392338][ T3157] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.399364][ T3157] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.407159][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.415456][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.423762][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.432345][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.440726][ T3157] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.447809][ T3157] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.455554][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.463734][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.472378][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.480701][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.488882][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.497444][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.522274][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 30.532975][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 30.557135][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 30.564879][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.573484][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.582067][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 30.590851][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 30.599375][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 30.607647][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 30.616160][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 30.624885][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 30.636822][ T3075] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 30.647672][ T3075] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.670860][ T3060] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.691694][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 30.703025][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.711842][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.720304][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.728693][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.736720][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 30.744045][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 30.751653][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 30.759189][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 30.767937][ T3066] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.783996][ T3068] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.805147][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 30.813049][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 30.821259][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 30.829085][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.837765][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.850480][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.859459][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.872203][ T3059] veth0_vlan: entered promiscuous mode [ 30.882826][ T3057] veth0_vlan: entered promiscuous mode [ 30.896239][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.904279][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.919587][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.927907][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.936726][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 30.944212][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 30.951943][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.960525][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.969204][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.977707][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.987989][ T3075] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.995575][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.003541][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.018322][ T3059] veth1_vlan: entered promiscuous mode [ 31.031112][ T3060] veth0_vlan: entered promiscuous mode [ 31.038200][ T3057] veth1_vlan: entered promiscuous mode [ 31.045167][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.053407][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.067442][ T3060] veth1_vlan: entered promiscuous mode [ 31.075487][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.083379][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.091284][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 31.099459][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 31.113510][ T3057] veth0_macvtap: entered promiscuous mode [ 31.122633][ T3059] veth0_macvtap: entered promiscuous mode [ 31.140942][ T3060] veth0_macvtap: entered promiscuous mode [ 31.152167][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.161004][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.169430][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.178084][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.186463][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.194930][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.203675][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.212337][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.221764][ T3057] veth1_macvtap: entered promiscuous mode [ 31.229231][ T3059] veth1_macvtap: entered promiscuous mode [ 31.236613][ T3060] veth1_macvtap: entered promiscuous mode [ 31.245605][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 31.253707][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.261726][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 31.269935][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.277740][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 31.286368][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.294354][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.302567][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.317249][ T3057] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.325920][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.333788][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.341863][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.350661][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.359941][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.370329][ T3165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.380572][ T3068] veth0_vlan: entered promiscuous mode [ 31.389329][ T3060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.399819][ T3060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.410510][ T3060] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.419949][ T3059] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.430725][ T3059] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.440591][ T3059] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.451238][ T3059] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.463526][ T3059] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.472775][ T3057] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.486243][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.493909][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.501715][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.510162][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.518791][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.527179][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.536028][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.544473][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.558305][ T3068] veth1_vlan: entered promiscuous mode [ 31.565301][ T3060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.575750][ T3060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.587471][ T3060] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.594839][ T3066] veth0_vlan: entered promiscuous mode [ 31.608858][ T3068] veth0_macvtap: entered promiscuous mode [ 31.615223][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 31.623090][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 31.631299][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.639685][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.648969][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.657370][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.666526][ T3059] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.677120][ T3059] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.687357][ T3059] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.697774][ T3059] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.708503][ T3059] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.718114][ T3057] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.726952][ T3057] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.735768][ T3057] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.745184][ T3057] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.763729][ T3066] veth1_vlan: entered promiscuous mode [ 31.769893][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 31.778323][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 31.786390][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.794777][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.803749][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.812126][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.821683][ T3060] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.830425][ T3060] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.839204][ T3060] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.847967][ T3060] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.859512][ T3075] veth0_vlan: entered promiscuous mode [ 31.866079][ T3059] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.876815][ T3059] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.886266][ T3059] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.894927][ T3059] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.910277][ T3068] veth1_macvtap: entered promiscuous mode [ 31.917227][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 31.925497][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.933117][ T3158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.950966][ T25] kauditd_printk_skb: 2 callbacks suppressed [ 31.950977][ T25] audit: type=1400 audit(1685653136.647:102): avc: denied { mounton } for pid=3057 comm="syz-executor.4" path="/dev/binderfs" dev="devtmpfs" ino=452 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 31.954254][ T3068] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.990727][ T3068] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.000540][ T3068] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.010961][ T3068] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.020863][ T3068] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.031563][ T3068] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.043427][ T3068] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.053134][ T3075] veth1_vlan: entered promiscuous mode [ 32.062795][ T3159] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 32.071017][ T3159] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 32.079068][ T3159] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.087566][ T3159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.099252][ T25] audit: type=1400 audit(1685653136.797:103): avc: denied { read write } for pid=3057 comm="syz-executor.4" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 32.139454][ T3068] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.148945][ T3238] xt_CT: No such helper "netbios-ns" [ 32.149944][ T3068] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.161341][ T25] audit: type=1400 audit(1685653136.797:104): avc: denied { open } for pid=3057 comm="syz-executor.4" path="/dev/loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 32.164986][ T3068] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.189144][ T25] audit: type=1400 audit(1685653136.797:105): avc: denied { ioctl } for pid=3057 comm="syz-executor.4" path="/dev/loop4" dev="devtmpfs" ino=104 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 32.199589][ T3068] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 20:58:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x8, 0x3, 0x2c8, 0x18, 0x5, 0x148, 0x158, 0x0, 0x230, 0x2a8, 0x2a8, 0x230, 0x2a8, 0x3, 0x0, {[{{@ip={@remote, @loopback, 0x0, 0x0, 'wg0\x00', 'nr0\x00', {}, {}, 0x6}, 0x0, 0x130, 0x158, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'bond_slave_1\x00', {0x0, 0x0, 0xffffe0e8, 0x0, 0x0, 0x20000003, 0x80000001}}}, @common=@unspec=@physdev={{0x68}, {'veth0_to_hsr\x00', {}, 'ip6tnl0\x00', {}, 0x0, 0x6}}]}, @common=@inet=@SYNPROXY={0x28}}, {{@ip={@local, @multicast2, 0x0, 0x0, 'xfrm0\x00', 'team0\x00', {}, {}, 0x10}, 0x10, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x328) [ 32.199600][ T3068] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.225994][ T25] audit: type=1400 audit(1685653136.827:106): avc: denied { create } for pid=3237 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 32.235767][ T3068] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.249221][ T3068] batman_adv: batadv0: Interface activated: batadv_slave_1 20:58:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x8, 0x3, 0x2c8, 0x18, 0x5, 0x148, 0x158, 0x0, 0x230, 0x2a8, 0x2a8, 0x230, 0x2a8, 0x3, 0x0, {[{{@ip={@remote, @loopback, 0x0, 0x0, 'wg0\x00', 'nr0\x00', {}, {}, 0x6}, 0x0, 0x130, 0x158, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'bond_slave_1\x00', {0x0, 0x0, 0xffffe0e8, 0x0, 0x0, 0x20000003, 0x80000001}}}, @common=@unspec=@physdev={{0x68}, {'veth0_to_hsr\x00', {}, 'ip6tnl0\x00', {}, 0x0, 0x6}}]}, @common=@inet=@SYNPROXY={0x28}}, {{@ip={@local, @multicast2, 0x0, 0x0, 'xfrm0\x00', 'team0\x00', {}, {}, 0x10}, 0x10, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x328) [ 32.267398][ T25] audit: type=1400 audit(1685653136.827:107): avc: denied { setopt } for pid=3237 comm="syz-executor.4" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 32.289938][ T3243] xt_CT: No such helper "netbios-ns" [ 32.315585][ T882] ================================================================== [ 32.323692][ T882] BUG: KCSAN: data-race in __mod_timer / __mod_timer [ 32.330406][ T882] [ 32.332994][ T882] write to 0xffff888124c79d70 of 8 bytes by task 3159 on cpu 1: [ 32.341146][ T882] __mod_timer+0x7a3/0x860 [ 32.346516][ T882] mod_timer+0x1f/0x30 [ 32.350574][ T882] wg_timers_any_authenticated_packet_traversal+0xc4/0xf0 [ 32.357684][ T882] wg_packet_tx_worker+0xeb/0x320 [ 32.363157][ T882] process_one_work+0x3e6/0x750 [ 32.368436][ T882] worker_thread+0x5f2/0xa10 [ 32.373124][ T882] kthread+0x1d7/0x210 [ 32.377297][ T882] ret_from_fork+0x1f/0x30 [ 32.381888][ T882] [ 32.384635][ T882] read to 0xffff888124c79d70 of 8 bytes by task 882 on cpu 0: [ 32.392079][ T882] __mod_timer+0x6e/0x860 [ 32.396412][ T882] mod_timer+0x1f/0x30 [ 32.400574][ T882] wg_timers_any_authenticated_packet_traversal+0xc4/0xf0 [ 32.407961][ T882] wg_packet_handshake_receive_worker+0x4ce/0x5d0 [ 32.414548][ T882] process_one_work+0x3e6/0x750 [ 32.419484][ T882] worker_thread+0x5f2/0xa10 [ 32.424069][ T882] kthread+0x1d7/0x210 [ 32.428128][ T882] ret_from_fork+0x1f/0x30 [ 32.432538][ T882] [ 32.434847][ T882] value changed: 0x00000000ffff9a03 -> 0x00000000ffff9a04 [ 32.441937][ T882] [ 32.444244][ T882] Reported by Kernel Concurrency Sanitizer on: [ 32.450376][ T882] CPU: 0 PID: 882 Comm: kworker/0:2 Not tainted 6.4.0-rc4-syzkaller-00078-g929ed21dfdb6 #0 [ 32.460341][ T882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 [ 32.470386][ T882] Workqueue: wg-kex-wg1 wg_packet_handshake_receive_worker [ 32.477582][ T882] ================================================================== 20:58:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x8, 0x3, 0x2c8, 0x18, 0x5, 0x148, 0x158, 0x0, 0x230, 0x2a8, 0x2a8, 0x230, 0x2a8, 0x3, 0x0, {[{{@ip={@remote, @loopback, 0x0, 0x0, 'wg0\x00', 'nr0\x00', {}, {}, 0x6}, 0x0, 0x130, 0x158, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'bond_slave_1\x00', {0x0, 0x0, 0xffffe0e8, 0x0, 0x0, 0x20000003, 0x80000001}}}, @common=@unspec=@physdev={{0x68}, {'veth0_to_hsr\x00', {}, 'ip6tnl0\x00', {}, 0x0, 0x6}}]}, @common=@inet=@SYNPROXY={0x28}}, {{@ip={@local, @multicast2, 0x0, 0x0, 'xfrm0\x00', 'team0\x00', {}, {}, 0x10}, 0x10, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x328) [ 32.500331][ T3066] veth0_macvtap: entered promiscuous mode [ 32.503455][ T3246] xt_CT: No such helper "netbios-ns" [ 32.515270][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.526061][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.540687][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 20:58:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) getsockname$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)=@newqdisc={0x4c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c}}]}, 0x4c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=@delchain={0x24, 0x2a, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) [ 32.550446][ T3157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.554876][ T3251] xt_CT: No such helper "netbios-ns" [ 32.560299][ T3068] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.573069][ T3068] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.582746][ T3068] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.591467][ T3068] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.602911][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 32.614769][ T3066] veth1_macvtap: entered promiscuous mode [ 32.642813][ T3066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 20:58:57 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) copy_file_range(r0, &(0x7f00000001c0), r1, 0x0, 0x0, 0x0) 20:58:57 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000000)={{0xc8}}) [ 32.653389][ T3066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.663253][ T3066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.677333][ T3066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.687164][ T3066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.697701][ T3066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.707534][ T3066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.718057][ T3066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.729452][ T3066] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.738652][ T3075] veth0_macvtap: entered promiscuous mode [ 32.745295][ T3159] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 32.753568][ T3159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.762453][ T3159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.772574][ T3159] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.781749][ T3159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.790745][ T3259] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 32.800612][ T3159] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 32.817654][ T3066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.828137][ T3066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.838011][ T3066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.848425][ T3066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.858283][ T3066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.869041][ T3066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.878893][ T3066] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.889383][ T3066] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.900589][ T3066] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.916252][ T3075] veth1_macvtap: entered promiscuous mode [ 32.923255][ T3235] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 32.932433][ T3235] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.941717][ T3235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.952665][ T3066] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.961468][ T3066] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.970195][ T3066] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.978923][ T3066] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.995952][ T3075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.006474][ T3075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.016397][ T3075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.026808][ T3075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.036764][ T3075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.047448][ T3075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.057252][ T3075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.067694][ T3075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.077511][ T3075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.087927][ T3075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.099196][ T3075] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.111435][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 33.120961][ T3155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.134001][ T3075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.144504][ T3075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.154334][ T3075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.164819][ T3075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.174628][ T3075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.185101][ T3075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.194901][ T3075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.205400][ T3075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.215266][ T3075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.225753][ T3075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.236805][ T3075] batman_adv: batadv0: Interface activated: batadv_slave_1 20:58:57 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000004440)=@base={0x2, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x1}, 0x48) [ 33.255073][ T3235] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 33.263082][ T25] audit: type=1400 audit(1685653137.957:108): avc: denied { bpf } for pid=3266 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 33.284747][ T25] audit: type=1400 audit(1685653137.957:109): avc: denied { map_create } for pid=3266 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 33.287183][ T3235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.304214][ T25] audit: type=1400 audit(1685653137.957:110): avc: denied { perfmon } for pid=3266 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 33.336238][ T3075] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.345112][ T3075] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.354184][ T3075] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.363225][ T3075] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.439034][ T25] audit: type=1400 audit(1685653138.137:111): avc: denied { open } for pid=3272 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 33.470726][ T3273] lo: entered allmulticast mode [ 33.482320][ T3273] lo: entered promiscuous mode 20:58:58 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x48004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000800)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x8441, 0x0, 0x0, 0x0, 0x9638}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001a40)={0x4, 0x80, 0x9, 0x7, 0x80, 0x0, 0x0, 0x1, 0x40304, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000021, 0x2, @perf_bp={&(0x7f0000000700)}, 0x802, 0x6, 0x0, 0x6, 0x0, 0xbb92, 0x80, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x5, 0x38, 0x1, 0xff, 0x0, 0xe257, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x3}, 0x40, 0x5, 0x9c, 0x4, 0x0, 0x5, 0x3, 0x0, 0x6}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000980)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000000580fe3b0007aa4d1bb486ae19127127bfa7b09303960e2f4cafdc172e42c9cfc8e523a125b8f7f5fb8df6b62629869d7fbdfdb68a5d5c7d79e60375e0231832a00d19fbd6ed939464a2436937cb5c3e9c6a946caedb5f22dfc58e83afc35e24ce6af4ab37f0dfbc6de4e9237229b32ee7e5d450c3e6e4b3e47de32229ecefb47f36c56a34cc11bafd3bf1d4737a21ff7b2fbbe8dbeb609601e90ef0c3657036d8b25097443d352763d900d9bee079146ced2ef256e7050ed1701ecf139bb5c1e984421f262f1cbf3a03b0efd22d6f28500a02a79bf47387fc91e5513b2d0ac6ae1b353da327df7156ca62cc67033c42e97d7bfa2579991e356d0d153cad167a8c8a7736c2347c60a52e405bbfcf448212369e6ae227f8db04000000f73b31367fe4d0c830ca1e93ab1e8e086d6018054991e07617c720c105393f6493c51c87e82bbfa1d0a846d4da85f0d3964d9bc21afd3309c278c9439748f8d4820d1427af18655220589a0fbf24e0a36834e5f0f0d83f212bd6cab5b76969b4a57fc04c41a6ba63ac64ec2384bc993b78b125ef73f853ca7ee26498fe5f3c0e4a9cb08364d088"], 0xfdef) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x1, 0xd3, 0x5, 0x0, 0x7fffffff, 0x2000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa, 0x2, @perf_bp={&(0x7f0000000200), 0xd}, 0x21c0, 0x5, 0x7, 0x0, 0x2, 0x44, 0x3c9e, 0x0, 0x5, 0x0, 0x8}, 0x0, 0x4, r2, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x1ff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x0, 0x40, 0x0, 0x79, 0x0, 0x0, 0x41, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x5, 0x9, 0x6, 0x0, 0x10001}, 0x0, 0xa, r1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000300)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000005c0)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x16\x17\xd6\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)=@newqdisc={0x4c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c}}]}, 0x4c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=@delchain={0x24, 0x2a, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) [ 33.487248][ T3273] lo: left allmulticast mode [ 33.513730][ T3283] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 33.543070][ T3285] lo: left promiscuous mode [ 33.547755][ T3285] lo: entered allmulticast mode [ 33.561779][ T3285] lo: entered promiscuous mode [ 33.566766][ T3285] lo: left allmulticast mode 20:58:58 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @local, 0x5}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x7b, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @broadcast}}}, 0x9c) 20:58:58 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000004440)=@base={0x2, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x1}, 0x48) 20:58:58 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) copy_file_range(r0, &(0x7f00000001c0), r1, 0x0, 0x0, 0x0) 20:58:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r1) getsockname$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)=@newqdisc={0x4c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c}}]}, 0x4c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=@delchain={0x24, 0x2a, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 20:58:58 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140), 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000000)={{0xc8}}) 20:58:58 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x48004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000800)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x8441, 0x0, 0x0, 0x0, 0x9638}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001a40)={0x4, 0x80, 0x9, 0x7, 0x80, 0x0, 0x0, 0x1, 0x40304, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000021, 0x2, @perf_bp={&(0x7f0000000700)}, 0x802, 0x6, 0x0, 0x6, 0x0, 0xbb92, 0x80, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x5, 0x38, 0x1, 0xff, 0x0, 0xe257, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x3}, 0x40, 0x5, 0x9c, 0x4, 0x0, 0x5, 0x3, 0x0, 0x6}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0xfdef) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x1, 0xd3, 0x5, 0x0, 0x7fffffff, 0x2000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa, 0x2, @perf_bp={&(0x7f0000000200), 0xd}, 0x21c0, 0x5, 0x7, 0x0, 0x2, 0x44, 0x3c9e, 0x0, 0x5, 0x0, 0x8}, 0x0, 0x4, r2, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x1ff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x0, 0x40, 0x0, 0x79, 0x0, 0x0, 0x41, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x5, 0x9, 0x6, 0x0, 0x10001}, 0x0, 0xa, r1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000300)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000005c0)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x16\x17\xd6\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x7b, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @broadcast}}}, 0x9c) 20:58:59 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000004440)=@base={0x2, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x1}, 0x48) 20:58:59 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x48004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000800)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x8441, 0x0, 0x0, 0x0, 0x9638}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001a40)={0x4, 0x80, 0x9, 0x7, 0x80, 0x0, 0x0, 0x1, 0x40304, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000021, 0x2, @perf_bp={&(0x7f0000000700)}, 0x802, 0x6, 0x0, 0x6, 0x0, 0xbb92, 0x80, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x5, 0x38, 0x1, 0xff, 0x0, 0xe257, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x3}, 0x40, 0x5, 0x9c, 0x4, 0x0, 0x5, 0x3, 0x0, 0x6}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0xfdef) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x1, 0xd3, 0x5, 0x0, 0x7fffffff, 0x2000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa, 0x2, @perf_bp={&(0x7f0000000200), 0xd}, 0x21c0, 0x5, 0x7, 0x0, 0x2, 0x44, 0x3c9e, 0x0, 0x5, 0x0, 0x8}, 0x0, 0x4, r2, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x1ff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x0, 0x40, 0x0, 0x79, 0x0, 0x0, 0x41, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x5, 0x9, 0x6, 0x0, 0x10001}, 0x0, 0xa, r1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000300)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000005c0)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x16\x17\xd6\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0xfdef) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x1, 0xd3, 0x5, 0x0, 0x7fffffff, 0x2000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa, 0x2, @perf_bp={&(0x7f0000000200), 0xd}, 0x21c0, 0x5, 0x7, 0x0, 0x2, 0x44, 0x3c9e, 0x0, 0x5, 0x0, 0x8}, 0x0, 0x4, r2, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x1ff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x0, 0x40, 0x0, 0x79, 0x0, 0x0, 0x41, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x5, 0x9, 0x6, 0x0, 0x10001}, 0x0, 0xa, r1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000300)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000005c0)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x16\x17\xd6\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)=@newqdisc={0x4c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c}}]}, 0x4c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=@delchain={0x24, 0x2a, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 20:58:59 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x48004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000800)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x8441, 0x0, 0x0, 0x0, 0x9638}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001a40)={0x4, 0x80, 0x9, 0x7, 0x80, 0x0, 0x0, 0x1, 0x40304, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000021, 0x2, @perf_bp={&(0x7f0000000700)}, 0x802, 0x6, 0x0, 0x6, 0x0, 0xbb92, 0x80, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x5, 0x38, 0x1, 0xff, 0x0, 0xe257, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x3}, 0x40, 0x5, 0x9c, 0x4, 0x0, 0x5, 0x3, 0x0, 0x6}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0xfdef) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x1, 0xd3, 0x5, 0x0, 0x7fffffff, 0x2000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa, 0x2, @perf_bp={&(0x7f0000000200), 0xd}, 0x21c0, 0x5, 0x7, 0x0, 0x2, 0x44, 0x3c9e, 0x0, 0x5, 0x0, 0x8}, 0x0, 0x4, r2, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x1ff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x0, 0x40, 0x0, 0x79, 0x0, 0x0, 0x41, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x5, 0x9, 0x6, 0x0, 0x10001}, 0x0, 0xa, r1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000300)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000005c0)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x16\x17\xd6\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x7b, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @broadcast}}}, 0x9c) 20:58:59 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x48004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000800)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x8441, 0x0, 0x0, 0x0, 0x9638}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001a40)={0x4, 0x80, 0x9, 0x7, 0x80, 0x0, 0x0, 0x1, 0x40304, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000021, 0x2, @perf_bp={&(0x7f0000000700)}, 0x802, 0x6, 0x0, 0x6, 0x0, 0xbb92, 0x80, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x5, 0x38, 0x1, 0xff, 0x0, 0xe257, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x3}, 0x40, 0x5, 0x9c, 0x4, 0x0, 0x5, 0x3, 0x0, 0x6}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0xfdef) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x1, 0xd3, 0x5, 0x0, 0x7fffffff, 0x2000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa, 0x2, @perf_bp={&(0x7f0000000200), 0xd}, 0x21c0, 0x5, 0x7, 0x0, 0x2, 0x44, 0x3c9e, 0x0, 0x5, 0x0, 0x8}, 0x0, 0x4, r2, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x1ff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x0, 0x40, 0x0, 0x79, 0x0, 0x0, 0x41, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x5, 0x9, 0x6, 0x0, 0x10001}, 0x0, 0xa, r1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000300)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000005c0)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x16\x17\xd6\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0xfdef) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x1, 0xd3, 0x5, 0x0, 0x7fffffff, 0x2000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa, 0x2, @perf_bp={&(0x7f0000000200), 0xd}, 0x21c0, 0x5, 0x7, 0x0, 0x2, 0x44, 0x3c9e, 0x0, 0x5, 0x0, 0x8}, 0x0, 0x4, r2, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x1ff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x0, 0x40, 0x0, 0x79, 0x0, 0x0, 0x41, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x5, 0x9, 0x6, 0x0, 0x10001}, 0x0, 0xa, r1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000300)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000005c0)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x16\x17\xd6\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0xfdef) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x1, 0xd3, 0x5, 0x0, 0x7fffffff, 0x2000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa, 0x2, @perf_bp={&(0x7f0000000200), 0xd}, 0x21c0, 0x5, 0x7, 0x0, 0x2, 0x44, 0x3c9e, 0x0, 0x5, 0x0, 0x8}, 0x0, 0x4, r2, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x1ff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x0, 0x40, 0x0, 0x79, 0x0, 0x0, 0x41, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x5, 0x9, 0x6, 0x0, 0x10001}, 0x0, 0xa, r1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000300)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000005c0)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x16\x17\xd6\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0xfdef) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x1, 0xd3, 0x5, 0x0, 0x7fffffff, 0x2000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa, 0x2, @perf_bp={&(0x7f0000000200), 0xd}, 0x21c0, 0x5, 0x7, 0x0, 0x2, 0x44, 0x3c9e, 0x0, 0x5, 0x0, 0x8}, 0x0, 0x4, r2, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x1ff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x0, 0x40, 0x0, 0x79, 0x0, 0x0, 0x41, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x5, 0x9, 0x6, 0x0, 0x10001}, 0x0, 0xa, r1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000300)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000005c0)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x16\x17\xd6\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x7b, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @broadcast}}}, 0x9c) [ 35.216910][ T3320] lo: left promiscuous mode [ 35.221510][ T3320] lo: entered allmulticast mode [ 35.235958][ T3323] lo: left promiscuous mode [ 35.240580][ T3323] lo: entered allmulticast mode [ 35.258295][ T3322] lo: entered allmulticast mode 20:59:00 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x48004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000800)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x8441, 0x0, 0x0, 0x0, 0x9638}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001a40)={0x4, 0x80, 0x9, 0x7, 0x80, 0x0, 0x0, 0x1, 0x40304, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000021, 0x2, @perf_bp={&(0x7f0000000700)}, 0x802, 0x6, 0x0, 0x6, 0x0, 0xbb92, 0x80, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x5, 0x38, 0x1, 0xff, 0x0, 0xe257, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x3}, 0x40, 0x5, 0x9c, 0x4, 0x0, 0x5, 0x3, 0x0, 0x6}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0xfdef) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x1, 0xd3, 0x5, 0x0, 0x7fffffff, 0x2000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa, 0x2, @perf_bp={&(0x7f0000000200), 0xd}, 0x21c0, 0x5, 0x7, 0x0, 0x2, 0x44, 0x3c9e, 0x0, 0x5, 0x0, 0x8}, 0x0, 0x4, r2, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x1ff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x0, 0x40, 0x0, 0x79, 0x0, 0x0, 0x41, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x5, 0x9, 0x6, 0x0, 0x10001}, 0x0, 0xa, r1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000300)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000005c0)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x16\x17\xd6\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0xfdef) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x1, 0xd3, 0x5, 0x0, 0x7fffffff, 0x2000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa, 0x2, @perf_bp={&(0x7f0000000200), 0xd}, 0x21c0, 0x5, 0x7, 0x0, 0x2, 0x44, 0x3c9e, 0x0, 0x5, 0x0, 0x8}, 0x0, 0x4, r2, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x1ff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x0, 0x40, 0x0, 0x79, 0x0, 0x0, 0x41, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x5, 0x9, 0x6, 0x0, 0x10001}, 0x0, 0xa, r1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000300)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000005c0)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x16\x17\xd6\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0xfdef) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x1, 0xd3, 0x5, 0x0, 0x7fffffff, 0x2000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa, 0x2, @perf_bp={&(0x7f0000000200), 0xd}, 0x21c0, 0x5, 0x7, 0x0, 0x2, 0x44, 0x3c9e, 0x0, 0x5, 0x0, 0x8}, 0x0, 0x4, r2, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x1ff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x0, 0x40, 0x0, 0x79, 0x0, 0x0, 0x41, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x5, 0x9, 0x6, 0x0, 0x10001}, 0x0, 0xa, r1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000300)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000005c0)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x16\x17\xd6\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0xfdef) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x1, 0xd3, 0x5, 0x0, 0x7fffffff, 0x2000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa, 0x2, @perf_bp={&(0x7f0000000200), 0xd}, 0x21c0, 0x5, 0x7, 0x0, 0x2, 0x44, 0x3c9e, 0x0, 0x5, 0x0, 0x8}, 0x0, 0x4, r2, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x1ff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x0, 0x40, 0x0, 0x79, 0x0, 0x0, 0x41, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x5, 0x9, 0x6, 0x0, 0x10001}, 0x0, 0xa, r1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000300)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000005c0)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x16\x17\xd6\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0xfdef) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x1, 0xd3, 0x5, 0x0, 0x7fffffff, 0x2000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa, 0x2, @perf_bp={&(0x7f0000000200), 0xd}, 0x21c0, 0x5, 0x7, 0x0, 0x2, 0x44, 0x3c9e, 0x0, 0x5, 0x0, 0x8}, 0x0, 0x4, r2, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpu.stat\x00', 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x1ff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x0, 0x40, 0x0, 0x79, 0x0, 0x0, 0x41, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x5, 0x9, 0x6, 0x0, 0x10001}, 0x0, 0xa, r1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000300)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000005c0)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x16\x17\xd6\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5