ff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:34 executing program 1: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:34 executing program 4: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(&(0x7f0000000500)='./file0/file0\x00', 0x40) mkdir(&(0x7f0000000240)='./file0\x00', 0x7c) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0xfffff7fffffffffc) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, r3, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) recvmsg(r4, &(0x7f0000000400)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/23, 0x17}, {&(0x7f0000000200)=""/21, 0x15}], 0x2, &(0x7f00000003c0)=""/48, 0x30}, 0x2) close(r0) recvmsg$kcm(r1, &(0x7f00000126c0)={&(0x7f0000011140)=@hci, 0x80, &(0x7f0000011640)=[{0x0}, {&(0x7f0000011340)=""/96, 0x60}, {&(0x7f00000113c0)=""/156, 0x9c}, {&(0x7f0000011480)=""/66, 0x42}, {&(0x7f0000011500)=""/129, 0x81}, {&(0x7f00000115c0)=""/126, 0x7e}], 0x6, &(0x7f00000116c0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r1, 0x0, [], 0x0, r3, 0x8, 0x3}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 11:04:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(&(0x7f0000000500)='./file0/file0\x00', 0x40) mkdir(&(0x7f0000000240)='./file0\x00', 0x7c) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0xfffff7fffffffffc) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, r3, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) recvmsg(r4, &(0x7f0000000400)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/23, 0x17}, {&(0x7f0000000200)=""/21, 0x15}], 0x2, &(0x7f00000003c0)=""/48, 0x30}, 0x2) close(r0) recvmsg$kcm(r1, &(0x7f00000126c0)={&(0x7f0000011140)=@hci, 0x80, &(0x7f0000011640)=[{0x0}, {&(0x7f0000011340)=""/96, 0x60}, {&(0x7f00000113c0)=""/156, 0x9c}, {&(0x7f0000011480)=""/66, 0x42}, {&(0x7f0000011500)=""/129, 0x81}, {&(0x7f00000115c0)=""/126, 0x7e}], 0x6, &(0x7f00000116c0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r1, 0x0, [], 0x0, r3, 0x8, 0x3}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 11:04:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(&(0x7f0000000500)='./file0/file0\x00', 0x40) mkdir(&(0x7f0000000240)='./file0\x00', 0x7c) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0xfffff7fffffffffc) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, r3, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) recvmsg(r4, &(0x7f0000000400)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/23, 0x17}, {&(0x7f0000000200)=""/21, 0x15}], 0x2, &(0x7f00000003c0)=""/48, 0x30}, 0x2) close(r0) recvmsg$kcm(r1, &(0x7f00000126c0)={&(0x7f0000011140)=@hci, 0x80, &(0x7f0000011640)=[{0x0}, {&(0x7f0000011340)=""/96, 0x60}, {&(0x7f00000113c0)=""/156, 0x9c}, {&(0x7f0000011480)=""/66, 0x42}, {&(0x7f0000011500)=""/129, 0x81}, {&(0x7f00000115c0)=""/126, 0x7e}], 0x6, &(0x7f00000116c0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r1, 0x0, [], 0x0, r3, 0x8, 0x3}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 11:04:34 executing program 1: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:34 executing program 3: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:34 executing program 4: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:35 executing program 1: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:35 executing program 4: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:35 executing program 3: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:35 executing program 0: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:35 executing program 5: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:35 executing program 1: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:35 executing program 4: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:35 executing program 2: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:35 executing program 3: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:36 executing program 0: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:36 executing program 5: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:36 executing program 1: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:36 executing program 2: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:36 executing program 4: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:36 executing program 3: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:36 executing program 0: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:36 executing program 5: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:36 executing program 2: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:36 executing program 0: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:36 executing program 3: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x416, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 11:04:36 executing program 1: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x416, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 11:04:37 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x416, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 11:04:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(&(0x7f0000000500)='./file0/file0\x00', 0x40) mkdir(&(0x7f0000000240)='./file0\x00', 0x7c) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0xfffff7fffffffffc) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, r3, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) recvmsg(r4, &(0x7f0000000400)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/23, 0x17}, {&(0x7f0000000200)=""/21, 0x15}], 0x2, &(0x7f00000003c0)=""/48, 0x30}, 0x2) close(r0) recvmsg$kcm(r1, &(0x7f00000126c0)={&(0x7f0000011140)=@hci, 0x80, &(0x7f0000011640)=[{0x0}, {&(0x7f0000011340)=""/96, 0x60}, {&(0x7f00000113c0)=""/156, 0x9c}, {&(0x7f0000011480)=""/66, 0x42}, {&(0x7f0000011500)=""/129, 0x81}, {&(0x7f00000115c0)=""/126, 0x7e}], 0x6, &(0x7f00000116c0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r1, 0x0, [], 0x0, r3, 0x8, 0x3}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 11:04:37 executing program 0: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:37 executing program 1: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(&(0x7f0000000500)='./file0/file0\x00', 0x40) mkdir(&(0x7f0000000240)='./file0\x00', 0x7c) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0xfffff7fffffffffc) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, r3, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) recvmsg(r4, &(0x7f0000000400)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/23, 0x17}, {&(0x7f0000000200)=""/21, 0x15}], 0x2, &(0x7f00000003c0)=""/48, 0x30}, 0x2) close(r0) recvmsg$kcm(r1, &(0x7f00000126c0)={&(0x7f0000011140)=@hci, 0x80, &(0x7f0000011640)=[{0x0}, {&(0x7f0000011340)=""/96, 0x60}, {&(0x7f00000113c0)=""/156, 0x9c}, {&(0x7f0000011480)=""/66, 0x42}, {&(0x7f0000011500)=""/129, 0x81}, {&(0x7f00000115c0)=""/126, 0x7e}], 0x6, &(0x7f00000116c0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r1, 0x0, [], 0x0, r3, 0x8, 0x3}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 11:04:37 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x416, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 11:04:37 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x416, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 11:04:37 executing program 0: r0 = socket$kcm(0x2, 0x6, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4082) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) sendmsg(r5, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) sendmsg(r0, &(0x7f0000001500)={&(0x7f00000013c0)=@in={0x2, 0x0, @initdev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7000000000000000010000007f00000023b057e610dca089d3f2eb8dc248c6fbad743058ca67ae4d770cb48ab5f443a46a10d342614d8f970b017dc4a91c1ffaa3c3dc599eb5c46175f32492a02c7f5d86ff2b09ff7d6e172322f042eee047409516f42dc400007b21499100000000005d4de68728528b2249589923a7f0f475f329cdc4"], 0x84}, 0x800) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000340)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1, 0x0, 0x0, 0x8}, 0x0) 11:04:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(&(0x7f0000000500)='./file0/file0\x00', 0x40) mkdir(&(0x7f0000000240)='./file0\x00', 0x7c) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0xfffff7fffffffffc) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, r3, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) recvmsg(r4, &(0x7f0000000400)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/23, 0x17}, {&(0x7f0000000200)=""/21, 0x15}], 0x2, &(0x7f00000003c0)=""/48, 0x30}, 0x2) close(r0) recvmsg$kcm(r1, &(0x7f00000126c0)={&(0x7f0000011140)=@hci, 0x80, &(0x7f0000011640)=[{0x0}, {&(0x7f0000011340)=""/96, 0x60}, {&(0x7f00000113c0)=""/156, 0x9c}, {&(0x7f0000011480)=""/66, 0x42}, {&(0x7f0000011500)=""/129, 0x81}, {&(0x7f00000115c0)=""/126, 0x7e}], 0x6, &(0x7f00000116c0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r1, 0x0, [], 0x0, r3, 0x8, 0x3}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 11:04:38 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x416, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 11:04:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(&(0x7f0000000500)='./file0/file0\x00', 0x40) mkdir(&(0x7f0000000240)='./file0\x00', 0x7c) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0xfffff7fffffffffc) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, r3, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) recvmsg(r4, &(0x7f0000000400)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/23, 0x17}, {&(0x7f0000000200)=""/21, 0x15}], 0x2, &(0x7f00000003c0)=""/48, 0x30}, 0x2) close(r0) recvmsg$kcm(r1, &(0x7f00000126c0)={&(0x7f0000011140)=@hci, 0x80, &(0x7f0000011640)=[{0x0}, {&(0x7f0000011340)=""/96, 0x60}, {&(0x7f00000113c0)=""/156, 0x9c}, {&(0x7f0000011480)=""/66, 0x42}, {&(0x7f0000011500)=""/129, 0x81}, {&(0x7f00000115c0)=""/126, 0x7e}], 0x6, &(0x7f00000116c0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r1, 0x0, [], 0x0, r3, 0x8, 0x3}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 11:04:38 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'i\x00\x00\x00\x00\xbb\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000480)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r3, 0x0, 0x20008844) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0xc0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000bc0)=""/166, 0xa6}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001000)=""/124, 0x7c}, 0x160) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001080)={0xffffffffffffffff, 0x1, 0x1, 0x3, &(0x7f0000000900)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x10, 0x2, 0x10) 11:04:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(&(0x7f0000000500)='./file0/file0\x00', 0x40) mkdir(&(0x7f0000000240)='./file0\x00', 0x7c) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0xfffff7fffffffffc) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, r3, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) recvmsg(r4, &(0x7f0000000400)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/23, 0x17}, {&(0x7f0000000200)=""/21, 0x15}], 0x2, &(0x7f00000003c0)=""/48, 0x30}, 0x2) close(r0) recvmsg$kcm(r1, &(0x7f00000126c0)={&(0x7f0000011140)=@hci, 0x80, &(0x7f0000011640)=[{0x0}, {&(0x7f0000011340)=""/96, 0x60}, {&(0x7f00000113c0)=""/156, 0x9c}, {&(0x7f0000011480)=""/66, 0x42}, {&(0x7f0000011500)=""/129, 0x81}, {&(0x7f00000115c0)=""/126, 0x7e}], 0x6, &(0x7f00000116c0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r1, 0x0, [], 0x0, r3, 0x8, 0x3}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 11:04:38 executing program 4: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 11:04:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(&(0x7f0000000500)='./file0/file0\x00', 0x40) mkdir(&(0x7f0000000240)='./file0\x00', 0x7c) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0xfffff7fffffffffc) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, r3, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) recvmsg(r4, &(0x7f0000000400)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/23, 0x17}, {&(0x7f0000000200)=""/21, 0x15}], 0x2, &(0x7f00000003c0)=""/48, 0x30}, 0x2) close(r0) recvmsg$kcm(r1, &(0x7f00000126c0)={&(0x7f0000011140)=@hci, 0x80, &(0x7f0000011640)=[{0x0}, {&(0x7f0000011340)=""/96, 0x60}, {&(0x7f00000113c0)=""/156, 0x9c}, {&(0x7f0000011480)=""/66, 0x42}, {&(0x7f0000011500)=""/129, 0x81}, {&(0x7f00000115c0)=""/126, 0x7e}], 0x6, &(0x7f00000116c0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r1, 0x0, [], 0x0, r3, 0x8, 0x3}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 11:04:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(&(0x7f0000000500)='./file0/file0\x00', 0x40) mkdir(&(0x7f0000000240)='./file0\x00', 0x7c) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0xfffff7fffffffffc) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, r3, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) recvmsg(r4, &(0x7f0000000400)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/23, 0x17}, {&(0x7f0000000200)=""/21, 0x15}], 0x2, &(0x7f00000003c0)=""/48, 0x30}, 0x2) close(r0) recvmsg$kcm(r1, &(0x7f00000126c0)={&(0x7f0000011140)=@hci, 0x80, &(0x7f0000011640)=[{0x0}, {&(0x7f0000011340)=""/96, 0x60}, {&(0x7f00000113c0)=""/156, 0x9c}, {&(0x7f0000011480)=""/66, 0x42}, {&(0x7f0000011500)=""/129, 0x81}, {&(0x7f00000115c0)=""/126, 0x7e}], 0x6, &(0x7f00000116c0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r1, 0x0, [], 0x0, r3, 0x8, 0x3}, 0x3c) socket$kcm(0x10, 0x0, 0x4) [ 286.554874][T16092] device nr0 entered promiscuous mode 11:04:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(&(0x7f0000000500)='./file0/file0\x00', 0x40) mkdir(&(0x7f0000000240)='./file0\x00', 0x7c) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0xfffff7fffffffffc) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, r3, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) recvmsg(r4, &(0x7f0000000400)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/23, 0x17}, {&(0x7f0000000200)=""/21, 0x15}], 0x2, &(0x7f00000003c0)=""/48, 0x30}, 0x2) close(r0) recvmsg$kcm(r1, &(0x7f00000126c0)={&(0x7f0000011140)=@hci, 0x80, &(0x7f0000011640)=[{0x0}, {&(0x7f0000011340)=""/96, 0x60}, {&(0x7f00000113c0)=""/156, 0x9c}, {&(0x7f0000011480)=""/66, 0x42}, {&(0x7f0000011500)=""/129, 0x81}, {&(0x7f00000115c0)=""/126, 0x7e}], 0x6, &(0x7f00000116c0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r1, 0x0, [], 0x0, r3, 0x8, 0x3}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 11:04:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(&(0x7f0000000500)='./file0/file0\x00', 0x40) mkdir(&(0x7f0000000240)='./file0\x00', 0x7c) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0xfffff7fffffffffc) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, r3, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) recvmsg(r4, &(0x7f0000000400)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/23, 0x17}, {&(0x7f0000000200)=""/21, 0x15}], 0x2, &(0x7f00000003c0)=""/48, 0x30}, 0x2) close(r0) recvmsg$kcm(r1, &(0x7f00000126c0)={&(0x7f0000011140)=@hci, 0x80, &(0x7f0000011640)=[{0x0}, {&(0x7f0000011340)=""/96, 0x60}, {&(0x7f00000113c0)=""/156, 0x9c}, {&(0x7f0000011480)=""/66, 0x42}, {&(0x7f0000011500)=""/129, 0x81}, {&(0x7f00000115c0)=""/126, 0x7e}], 0x6, &(0x7f00000116c0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r1, 0x0, [], 0x0, r3, 0x8, 0x3}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 11:04:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(&(0x7f0000000500)='./file0/file0\x00', 0x40) mkdir(&(0x7f0000000240)='./file0\x00', 0x7c) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0xfffff7fffffffffc) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, r3, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) recvmsg(r4, &(0x7f0000000400)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/23, 0x17}, {&(0x7f0000000200)=""/21, 0x15}], 0x2, &(0x7f00000003c0)=""/48, 0x30}, 0x2) close(r0) recvmsg$kcm(r1, &(0x7f00000126c0)={&(0x7f0000011140)=@hci, 0x80, &(0x7f0000011640)=[{0x0}, {&(0x7f0000011340)=""/96, 0x60}, {&(0x7f00000113c0)=""/156, 0x9c}, {&(0x7f0000011480)=""/66, 0x42}, {&(0x7f0000011500)=""/129, 0x81}, {&(0x7f00000115c0)=""/126, 0x7e}], 0x6, &(0x7f00000116c0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r1, 0x0, [], 0x0, r3, 0x8, 0x3}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 11:04:39 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'i\x00\x00\x00\x00\xbb\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000480)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r3, 0x0, 0x20008844) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0xc0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000bc0)=""/166, 0xa6}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001000)=""/124, 0x7c}, 0x160) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001080)={0xffffffffffffffff, 0x1, 0x1, 0x3, &(0x7f0000000900)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x10, 0x2, 0x10) 11:04:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(&(0x7f0000000500)='./file0/file0\x00', 0x40) mkdir(&(0x7f0000000240)='./file0\x00', 0x7c) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0xfffff7fffffffffc) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, r3, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) recvmsg(r4, &(0x7f0000000400)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/23, 0x17}, {&(0x7f0000000200)=""/21, 0x15}], 0x2, &(0x7f00000003c0)=""/48, 0x30}, 0x2) close(r0) recvmsg$kcm(r1, &(0x7f00000126c0)={&(0x7f0000011140)=@hci, 0x80, &(0x7f0000011640)=[{0x0}, {&(0x7f0000011340)=""/96, 0x60}, {&(0x7f00000113c0)=""/156, 0x9c}, {&(0x7f0000011480)=""/66, 0x42}, {&(0x7f0000011500)=""/129, 0x81}, {&(0x7f00000115c0)=""/126, 0x7e}], 0x6, &(0x7f00000116c0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r1, 0x0, [], 0x0, r3, 0x8, 0x3}, 0x3c) socket$kcm(0x10, 0x0, 0x4) 11:04:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000640)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/217, 0xd9}, {0x0}], 0x2, &(0x7f00000008c0)=""/124, 0x7c}, 0x10100) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdir(&(0x7f0000000500)='./file0/file0\x00', 0x40) mkdir(&(0x7f0000000240)='./file0\x00', 0x7c) close(r2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(0x0, 0xfffff7fffffffffc) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14, 0x200000000000000, 0x7, 0x0, 0x0, 0xffffffffffffff9c, 0x3, [], 0x0, r3, 0x0, 0x7fff}, 0x3c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) recvmsg(r4, &(0x7f0000000400)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/23, 0x17}, {&(0x7f0000000200)=""/21, 0x15}], 0x2, &(0x7f00000003c0)=""/48, 0x30}, 0x2) close(r0) recvmsg$kcm(r1, &(0x7f00000126c0)={&(0x7f0000011140)=@hci, 0x80, &(0x7f0000011640)=[{0x0}, {&(0x7f0000011340)=""/96, 0x60}, {&(0x7f00000113c0)=""/156, 0x9c}, {&(0x7f0000011480)=""/66, 0x42}, {&(0x7f0000011500)=""/129, 0x81}, {&(0x7f00000115c0)=""/126, 0x7e}], 0x6, &(0x7f00000116c0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012700)={0x13, 0x4, 0xf003, 0x0, 0x32, r1, 0x0, [], 0x0, r3, 0x8, 0x3}, 0x3c) socket$kcm(0x10, 0x0, 0x4) [ 287.423571][T16092] device nr0 entered promiscuous mode 11:04:39 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'i\x00\x00\x00\x00\xbb\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000480)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r3, 0x0, 0x20008844) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0xc0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000bc0)=""/166, 0xa6}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001000)=""/124, 0x7c}, 0x160) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001080)={0xffffffffffffffff, 0x1, 0x1, 0x3, &(0x7f0000000900)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x10, 0x2, 0x10) 11:04:39 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'i\x00\x00\x00\x00\xbb\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000480)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r3, 0x0, 0x20008844) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0xc0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000bc0)=""/166, 0xa6}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001000)=""/124, 0x7c}, 0x160) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001080)={0xffffffffffffffff, 0x1, 0x1, 0x3, &(0x7f0000000900)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x10, 0x2, 0x10) 11:04:40 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'i\x00\x00\x00\x00\xbb\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000480)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r3, 0x0, 0x20008844) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0xc0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000bc0)=""/166, 0xa6}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001000)=""/124, 0x7c}, 0x160) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001080)={0xffffffffffffffff, 0x1, 0x1, 0x3, &(0x7f0000000900)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x10, 0x2, 0x10) 11:04:40 executing program 4: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 11:04:40 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'i\x00\x00\x00\x00\xbb\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000480)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r3, 0x0, 0x20008844) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0xc0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000bc0)=""/166, 0xa6}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001000)=""/124, 0x7c}, 0x160) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001080)={0xffffffffffffffff, 0x1, 0x1, 0x3, &(0x7f0000000900)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x10, 0x2, 0x10) 11:04:40 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'i\x00\x00\x00\x00\xbb\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000480)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r3, 0x0, 0x20008844) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0xc0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000bc0)=""/166, 0xa6}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001000)=""/124, 0x7c}, 0x160) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001080)={0xffffffffffffffff, 0x1, 0x1, 0x3, &(0x7f0000000900)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x10, 0x2, 0x10) [ 288.163800][T16162] device nr0 entered promiscuous mode 11:04:40 executing program 1: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 11:04:40 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'i\x00\x00\x00\x00\xbb\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000480)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r3, 0x0, 0x20008844) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0xc0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000bc0)=""/166, 0xa6}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001000)=""/124, 0x7c}, 0x160) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001080)={0xffffffffffffffff, 0x1, 0x1, 0x3, &(0x7f0000000900)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x10, 0x2, 0x10) 11:04:40 executing program 5: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 288.545753][T16170] device nr0 entered promiscuous mode 11:04:41 executing program 4: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 288.812347][T16194] device nr0 entered promiscuous mode [ 288.819283][T16199] device nr0 entered promiscuous mode 11:04:41 executing program 0: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 11:04:41 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'i\x00\x00\x00\x00\xbb\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000480)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r3, 0x0, 0x20008844) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0xc0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000bc0)=""/166, 0xa6}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001000)=""/124, 0x7c}, 0x160) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001080)={0xffffffffffffffff, 0x1, 0x1, 0x3, &(0x7f0000000900)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x10, 0x2, 0x10) 11:04:41 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'i\x00\x00\x00\x00\xbb\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000480)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r3, 0x0, 0x20008844) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0xc0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000bc0)=""/166, 0xa6}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001000)=""/124, 0x7c}, 0x160) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001080)={0xffffffffffffffff, 0x1, 0x1, 0x3, &(0x7f0000000900)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x10, 0x2, 0x10) 11:04:41 executing program 5: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 289.466768][T16215] device nr0 entered promiscuous mode [ 289.475829][T16222] device nr0 entered promiscuous mode [ 289.492588][T16232] device nr0 entered promiscuous mode 11:04:42 executing program 3: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 11:04:42 executing program 2: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 11:04:42 executing program 1: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 290.052176][T16241] device nr0 entered promiscuous mode 11:04:42 executing program 0: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 290.182555][T16250] device nr0 entered promiscuous mode 11:04:42 executing program 4: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 290.755437][T16268] device nr0 entered promiscuous mode [ 290.770158][T16266] device nr0 entered promiscuous mode [ 290.780980][T16275] device nr0 entered promiscuous mode 11:04:43 executing program 3: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 290.836707][T16286] device nr0 entered promiscuous mode 11:04:43 executing program 5: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 11:04:43 executing program 1: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 11:04:43 executing program 2: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 291.502530][T16295] device nr0 entered promiscuous mode 11:04:44 executing program 0: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 291.623358][T16304] device nr0 entered promiscuous mode 11:04:44 executing program 4: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 292.174077][T16314] device nr0 entered promiscuous mode [ 292.273005][T16324] device nr0 entered promiscuous mode [ 292.282338][T16326] device nr0 entered promiscuous mode 11:04:44 executing program 5: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 11:04:44 executing program 3: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 292.436283][T16336] device nr0 entered promiscuous mode [ 292.998521][T16348] device nr0 entered promiscuous mode 11:04:45 executing program 0: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 293.048286][T16355] device nr0 entered promiscuous mode 11:04:45 executing program 2: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 11:04:45 executing program 1: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 11:04:46 executing program 4: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 11:04:46 executing program 5: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 293.523775][T16364] device nr0 entered promiscuous mode 11:04:46 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'i\x00\x00\x00\x00\xbb\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000480)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r3, 0x0, 0x20008844) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0xc0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000bc0)=""/166, 0xa6}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001000)=""/124, 0x7c}, 0x160) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001080)={0xffffffffffffffff, 0x1, 0x1, 0x3, &(0x7f0000000900)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x10, 0x2, 0x10) [ 293.723566][T16378] device nr0 entered promiscuous mode [ 293.954474][T16377] device nr0 entered promiscuous mode [ 294.340070][T16396] device nr0 entered promiscuous mode 11:04:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000000)="fb0000002400e974db6875d7f3108dfe204ee2d70800000000000100f1ffffff801d5291d76b8c67452107132daffa3302c4ea2169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c31b047f720f4e7aab6489978112322628c7a1fbab650cdc797d32d3524ea85b198cb44a83c011d2572f9291431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a86105ea0ddbad539ef278168ac8d157a6366c5d680000b8f100437172ff070000000021002683d489e1ca0700a06f9900"/251, 0xfb}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) gettid() [ 294.479923][T16399] device nr0 entered promiscuous mode 11:04:47 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'i\x00\x00\x00\x00\xbb\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000480)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r3, 0x0, 0x20008844) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0xc0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000bc0)=""/166, 0xa6}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001000)=""/124, 0x7c}, 0x160) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001080)={0xffffffffffffffff, 0x1, 0x1, 0x3, &(0x7f0000000900)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x10, 0x2, 0x10) 11:04:47 executing program 0: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 11:04:47 executing program 4: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 294.722773][T16413] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.2'. 11:04:47 executing program 5: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 11:04:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000000)="fb0000002400e974db6875d7f3108dfe204ee2d70800000000000100f1ffffff801d5291d76b8c67452107132daffa3302c4ea2169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c31b047f720f4e7aab6489978112322628c7a1fbab650cdc797d32d3524ea85b198cb44a83c011d2572f9291431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a86105ea0ddbad539ef278168ac8d157a6366c5d680000b8f100437172ff070000000021002683d489e1ca0700a06f9900"/251, 0xfb}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) gettid() 11:04:47 executing program 1: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 11:04:47 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'i\x00\x00\x00\x00\xbb\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000480)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r3, 0x0, 0x20008844) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0xc0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000bc0)=""/166, 0xa6}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f0000001000)=""/124, 0x7c}, 0x160) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001080)={0xffffffffffffffff, 0x1, 0x1, 0x3, &(0x7f0000000900)=[0x0, 0x0], 0x2}, 0x20) socket$kcm(0x10, 0x2, 0x10) [ 295.119300][T16439] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.2'. [ 295.142372][T16431] device nr0 entered promiscuous mode 11:04:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000000)="fb0000002400e974db6875d7f3108dfe204ee2d70800000000000100f1ffffff801d5291d76b8c67452107132daffa3302c4ea2169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c31b047f720f4e7aab6489978112322628c7a1fbab650cdc797d32d3524ea85b198cb44a83c011d2572f9291431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a86105ea0ddbad539ef278168ac8d157a6366c5d680000b8f100437172ff070000000021002683d489e1ca0700a06f9900"/251, 0xfb}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) gettid() [ 295.316657][T16440] device nr0 entered promiscuous mode [ 295.326744][T16452] device nr0 entered promiscuous mode [ 295.338293][T16455] device nr0 entered promiscuous mode [ 295.346162][T16467] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.2'. 11:04:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000000)="fb0000002400e974db6875d7f3108dfe204ee2d70800000000000100f1ffffff801d5291d76b8c67452107132daffa3302c4ea2169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c31b047f720f4e7aab6489978112322628c7a1fbab650cdc797d32d3524ea85b198cb44a83c011d2572f9291431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a86105ea0ddbad539ef278168ac8d157a6366c5d680000b8f100437172ff070000000021002683d489e1ca0700a06f9900"/251, 0xfb}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) gettid() 11:04:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000000)="fb0000002400e974db6875d7f3108dfe204ee2d70800000000000100f1ffffff801d5291d76b8c67452107132daffa3302c4ea2169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c31b047f720f4e7aab6489978112322628c7a1fbab650cdc797d32d3524ea85b198cb44a83c011d2572f9291431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a86105ea0ddbad539ef278168ac8d157a6366c5d680000b8f100437172ff070000000021002683d489e1ca0700a06f9900"/251, 0xfb}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) gettid() 11:04:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000000)="fb0000002400e974db6875d7f3108dfe204ee2d70800000000000100f1ffffff801d5291d76b8c67452107132daffa3302c4ea2169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c31b047f720f4e7aab6489978112322628c7a1fbab650cdc797d32d3524ea85b198cb44a83c011d2572f9291431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a86105ea0ddbad539ef278168ac8d157a6366c5d680000b8f100437172ff070000000021002683d489e1ca0700a06f9900"/251, 0xfb}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) gettid() [ 295.986261][T16471] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.2'. [ 296.013143][T16475] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 11:04:48 executing program 0: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 11:04:48 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x5}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) 11:04:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) r0 = bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) r1 = socket$kcm(0x2, 0x2000000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x11, &(0x7f0000000140)=r0, 0x4) 11:04:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000000)="fb0000002400e974db6875d7f3108dfe204ee2d70800000000000100f1ffffff801d5291d76b8c67452107132daffa3302c4ea2169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c31b047f720f4e7aab6489978112322628c7a1fbab650cdc797d32d3524ea85b198cb44a83c011d2572f9291431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a86105ea0ddbad539ef278168ac8d157a6366c5d680000b8f100437172ff070000000021002683d489e1ca0700a06f9900"/251, 0xfb}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) gettid() 11:04:48 executing program 1: r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(r0, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x280, 0x0) recvmsg(r1, &(0x7f000000f600)={&(0x7f000000ecc0)=@hci, 0x80, 0x0}, 0x40000003) bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f900)={0x0, &(0x7f000000f840)=""/175, 0x0, 0xaf}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = perf_event_open$cgroup(&(0x7f0000001c40)={0x0, 0x70, 0x7ff, 0x1000, 0x1c, 0x0, 0x0, 0x100000000, 0x46800, 0x0, 0x0, 0x4, 0x6, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3ff, 0x3f, 0x5, 0x8, 0x800, 0x0, 0x4ed2, 0x7fffffff, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x5c5, 0x0, 0x80, 0x100000000, 0x2, 0x0, 0x9, 0x5, @perf_bp={0x0, 0x8}, 0x10, 0x0, 0x0, 0x5, 0x9, 0xbcfb, 0x6}, r2, 0x0, 0xffffffffffffffff, 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f0000000340)=@generic, 0x80, &(0x7f0000000b00)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f00000006c0)=""/131, 0x83}, {0x0}, {&(0x7f0000000880)=""/9, 0x9}, {0x0}, {&(0x7f0000000a40)=""/170, 0xaa}], 0x6, &(0x7f0000000bc0)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='+\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0xa000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x14, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000c00b0000000000000001000095000000000000009500005d3c601a39c9712dd03d5200000000"], 0x0, 0xfffffffffffff304, 0xc1, &(0x7f0000000780)=""/193, 0x41f00, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000001cc0)=""/71) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 296.203277][T16488] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.5'. 11:04:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) r0 = bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) r1 = socket$kcm(0x2, 0x2000000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x11, &(0x7f0000000140)=r0, 0x4) [ 296.292931][T16496] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 11:04:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000000)="fb0000002400e974db6875d7f3108dfe204ee2d70800000000000100f1ffffff801d5291d76b8c67452107132daffa3302c4ea2169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c31b047f720f4e7aab6489978112322628c7a1fbab650cdc797d32d3524ea85b198cb44a83c011d2572f9291431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a86105ea0ddbad539ef278168ac8d157a6366c5d680000b8f100437172ff070000000021002683d489e1ca0700a06f9900"/251, 0xfb}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) gettid() 11:04:48 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x5}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) [ 296.385492][T16492] syz-executor.4 (16492) used greatest stack depth: 21632 bytes left 11:04:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) r0 = bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) r1 = socket$kcm(0x2, 0x2000000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x11, &(0x7f0000000140)=r0, 0x4) 11:04:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000000)="fb0000002400e974db6875d7f3108dfe204ee2d70800000000000100f1ffffff801d5291d76b8c67452107132daffa3302c4ea2169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c31b047f720f4e7aab6489978112322628c7a1fbab650cdc797d32d3524ea85b198cb44a83c011d2572f9291431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a86105ea0ddbad539ef278168ac8d157a6366c5d680000b8f100437172ff070000000021002683d489e1ca0700a06f9900"/251, 0xfb}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) gettid() 11:04:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) r0 = bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) r1 = socket$kcm(0x2, 0x2000000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x11, &(0x7f0000000140)=r0, 0x4) 11:04:49 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x5}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) [ 296.612098][T16508] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.5'. [ 296.648715][T16505] device nr0 entered promiscuous mode [ 296.676993][T16511] device nr0 entered promiscuous mode [ 296.689778][T16525] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.3'. 11:04:49 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x5}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) 11:04:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x400454e2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) r1 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 11:04:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) r0 = bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) r1 = socket$kcm(0x2, 0x2000000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x11, &(0x7f0000000140)=r0, 0x4) 11:04:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000000)="fb0000002400e974db6875d7f3108dfe204ee2d70800000000000100f1ffffff801d5291d76b8c67452107132daffa3302c4ea2169b94b598296263578b72935c922974adced71c22b987fa68c5bb731c5f64e93ea793c262f67b56acbb4bac0c4c4f9d0c4437e99c25a7d9d3ffd47893808c31b047f720f4e7aab6489978112322628c7a1fbab650cdc797d32d3524ea85b198cb44a83c011d2572f9291431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a86105ea0ddbad539ef278168ac8d157a6366c5d680000b8f100437172ff070000000021002683d489e1ca0700a06f9900"/251, 0xfb}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) gettid() 11:04:49 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000380)) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(r2, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200), 0x1c8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x1e) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x54, 0x9, 0xfffffffffffffe00, 0xbdcf, 0x0, 0x10001, 0x2, 0x2, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x4, 0x2, 0x0, 0xd3, 0x11, 0x0, 0x1, 0xfffffffeffffffff, 0x83e, 0x7, 0x3, 0x8, 0xf097, 0x7c, 0x8, 0x0, 0x0, 0xfffffffe00, 0x7, 0x0, 0x20, 0x9, 0x0, 0x3ff, 0x1, @perf_config_ext={0x8001, 0x80000000}, 0x10, 0x4, 0x1, 0x7, 0x4, 0x0, 0xd8f7}, 0x0, 0x10, r3, 0x2) recvmsg$kcm(r5, 0x0, 0x1) write$cgroup_int(r1, &(0x7f00000000c0)=0x80, 0x12) 11:04:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair(0x15, 0x5, 0x0, &(0x7f0000000040)) [ 297.085407][T16542] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.5'. 11:04:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) r0 = bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) r1 = socket$kcm(0x2, 0x2000000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x11, &(0x7f0000000140)=r0, 0x4) 11:04:49 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r3, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) close(r0) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f00000007c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x1}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c40)="9c897c40367a64d3e829d625e0181965be93a0caa3ed19a8a5e15c78b67b92fc6838aa457ae91727eca6d0616620fad8d791705622738ac1cc8c8f9939215b643db6cbdfb07392905ed8ba1ab695b09644b5ac09726580eaab4d578df3f1430b60b4d9ea11ce213783241874053cb7b03a949bbe9f4f5b0627f4c47750c15597269b3f09b915a7dd037b7ba9cf46a5d08e65d19e470c7009e35d666441e0f3b92d2c62d9bb0e70575f0deb5b3d91d50cda6989f2", 0xb4}], 0x1, 0x0, 0x0, 0x40000}, 0x20008810) 11:04:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0xd, 0x4, 0x20001000000009}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)}, 0x10) 11:04:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x400454e2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) r1 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 11:04:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) r0 = bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) r1 = socket$kcm(0x2, 0x2000000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x11, &(0x7f0000000140)=r0, 0x4) 11:04:49 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r3, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) close(r0) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f00000007c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x1}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c40)="9c897c40367a64d3e829d625e0181965be93a0caa3ed19a8a5e15c78b67b92fc6838aa457ae91727eca6d0616620fad8d791705622738ac1cc8c8f9939215b643db6cbdfb07392905ed8ba1ab695b09644b5ac09726580eaab4d578df3f1430b60b4d9ea11ce213783241874053cb7b03a949bbe9f4f5b0627f4c47750c15597269b3f09b915a7dd037b7ba9cf46a5d08e65d19e470c7009e35d666441e0f3b92d2c62d9bb0e70575f0deb5b3d91d50cda6989f2", 0xb4}], 0x1, 0x0, 0x0, 0x40000}, 0x20008810) 11:04:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0xd, 0x4, 0x20001000000009}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)}, 0x10) 11:04:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair(0x15, 0x5, 0x0, &(0x7f0000000040)) 11:04:50 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0xd, 0x4, 0x20001000000009}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)}, 0x10) 11:04:50 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r3, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) close(r0) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f00000007c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x1}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c40)="9c897c40367a64d3e829d625e0181965be93a0caa3ed19a8a5e15c78b67b92fc6838aa457ae91727eca6d0616620fad8d791705622738ac1cc8c8f9939215b643db6cbdfb07392905ed8ba1ab695b09644b5ac09726580eaab4d578df3f1430b60b4d9ea11ce213783241874053cb7b03a949bbe9f4f5b0627f4c47750c15597269b3f09b915a7dd037b7ba9cf46a5d08e65d19e470c7009e35d666441e0f3b92d2c62d9bb0e70575f0deb5b3d91d50cda6989f2", 0xb4}], 0x1, 0x0, 0x0, 0x40000}, 0x20008810) [ 297.943205][ T27] audit: type=1804 audit(1557399890.379:230): pid=16598 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir946762580/syzkaller.sLBsnL/330/memory.events" dev="sda1" ino=16547 res=1 11:04:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair(0x15, 0x5, 0x0, &(0x7f0000000040)) 11:04:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair(0x15, 0x5, 0x0, &(0x7f0000000040)) 11:04:50 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0xd, 0x4, 0x20001000000009}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)}, 0x10) 11:04:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x400454e2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) r1 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 11:04:50 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r3, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) close(r0) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f00000007c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x1}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c40)="9c897c40367a64d3e829d625e0181965be93a0caa3ed19a8a5e15c78b67b92fc6838aa457ae91727eca6d0616620fad8d791705622738ac1cc8c8f9939215b643db6cbdfb07392905ed8ba1ab695b09644b5ac09726580eaab4d578df3f1430b60b4d9ea11ce213783241874053cb7b03a949bbe9f4f5b0627f4c47750c15597269b3f09b915a7dd037b7ba9cf46a5d08e65d19e470c7009e35d666441e0f3b92d2c62d9bb0e70575f0deb5b3d91d50cda6989f2", 0xb4}], 0x1, 0x0, 0x0, 0x40000}, 0x20008810) 11:04:50 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000380)) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(r2, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200), 0x1c8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x1e) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x54, 0x9, 0xfffffffffffffe00, 0xbdcf, 0x0, 0x10001, 0x2, 0x2, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x4, 0x2, 0x0, 0xd3, 0x11, 0x0, 0x1, 0xfffffffeffffffff, 0x83e, 0x7, 0x3, 0x8, 0xf097, 0x7c, 0x8, 0x0, 0x0, 0xfffffffe00, 0x7, 0x0, 0x20, 0x9, 0x0, 0x3ff, 0x1, @perf_config_ext={0x8001, 0x80000000}, 0x10, 0x4, 0x1, 0x7, 0x4, 0x0, 0xd8f7}, 0x0, 0x10, r3, 0x2) recvmsg$kcm(r5, 0x0, 0x1) write$cgroup_int(r1, &(0x7f00000000c0)=0x80, 0x12) 11:04:50 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000380)) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(r2, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200), 0x1c8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x1e) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x54, 0x9, 0xfffffffffffffe00, 0xbdcf, 0x0, 0x10001, 0x2, 0x2, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x4, 0x2, 0x0, 0xd3, 0x11, 0x0, 0x1, 0xfffffffeffffffff, 0x83e, 0x7, 0x3, 0x8, 0xf097, 0x7c, 0x8, 0x0, 0x0, 0xfffffffe00, 0x7, 0x0, 0x20, 0x9, 0x0, 0x3ff, 0x1, @perf_config_ext={0x8001, 0x80000000}, 0x10, 0x4, 0x1, 0x7, 0x4, 0x0, 0xd8f7}, 0x0, 0x10, r3, 0x2) recvmsg$kcm(r5, 0x0, 0x1) write$cgroup_int(r1, &(0x7f00000000c0)=0x80, 0x12) 11:04:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair(0x15, 0x5, 0x0, &(0x7f0000000040)) 11:04:50 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000380)) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(r2, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200), 0x1c8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x1e) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x54, 0x9, 0xfffffffffffffe00, 0xbdcf, 0x0, 0x10001, 0x2, 0x2, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x4, 0x2, 0x0, 0xd3, 0x11, 0x0, 0x1, 0xfffffffeffffffff, 0x83e, 0x7, 0x3, 0x8, 0xf097, 0x7c, 0x8, 0x0, 0x0, 0xfffffffe00, 0x7, 0x0, 0x20, 0x9, 0x0, 0x3ff, 0x1, @perf_config_ext={0x8001, 0x80000000}, 0x10, 0x4, 0x1, 0x7, 0x4, 0x0, 0xd8f7}, 0x0, 0x10, r3, 0x2) recvmsg$kcm(r5, 0x0, 0x1) write$cgroup_int(r1, &(0x7f00000000c0)=0x80, 0x12) 11:04:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair(0x15, 0x5, 0x0, &(0x7f0000000040)) 11:04:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair(0x15, 0x5, 0x0, &(0x7f0000000040)) 11:04:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x400454e2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) r1 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 11:04:50 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000380)) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(r2, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200), 0x1c8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x1e) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x54, 0x9, 0xfffffffffffffe00, 0xbdcf, 0x0, 0x10001, 0x2, 0x2, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x4, 0x2, 0x0, 0xd3, 0x11, 0x0, 0x1, 0xfffffffeffffffff, 0x83e, 0x7, 0x3, 0x8, 0xf097, 0x7c, 0x8, 0x0, 0x0, 0xfffffffe00, 0x7, 0x0, 0x20, 0x9, 0x0, 0x3ff, 0x1, @perf_config_ext={0x8001, 0x80000000}, 0x10, 0x4, 0x1, 0x7, 0x4, 0x0, 0xd8f7}, 0x0, 0x10, r3, 0x2) recvmsg$kcm(r5, 0x0, 0x1) write$cgroup_int(r1, &(0x7f00000000c0)=0x80, 0x12) 11:04:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0xd, 0x4, 0x20001000000009}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)}, 0x10) 11:04:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0xd, 0x4, 0x20001000000009}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)}, 0x10) 11:04:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0xd, 0x4, 0x20001000000009}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)}, 0x10) 11:04:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r3, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) close(r0) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f00000007c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x1}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c40)="9c897c40367a64d3e829d625e0181965be93a0caa3ed19a8a5e15c78b67b92fc6838aa457ae91727eca6d0616620fad8d791705622738ac1cc8c8f9939215b643db6cbdfb07392905ed8ba1ab695b09644b5ac09726580eaab4d578df3f1430b60b4d9ea11ce213783241874053cb7b03a949bbe9f4f5b0627f4c47750c15597269b3f09b915a7dd037b7ba9cf46a5d08e65d19e470c7009e35d666441e0f3b92d2c62d9bb0e70575f0deb5b3d91d50cda6989f2", 0xb4}], 0x1, 0x0, 0x0, 0x40000}, 0x20008810) 11:04:51 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000380)) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(r2, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200), 0x1c8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x1e) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x54, 0x9, 0xfffffffffffffe00, 0xbdcf, 0x0, 0x10001, 0x2, 0x2, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x4, 0x2, 0x0, 0xd3, 0x11, 0x0, 0x1, 0xfffffffeffffffff, 0x83e, 0x7, 0x3, 0x8, 0xf097, 0x7c, 0x8, 0x0, 0x0, 0xfffffffe00, 0x7, 0x0, 0x20, 0x9, 0x0, 0x3ff, 0x1, @perf_config_ext={0x8001, 0x80000000}, 0x10, 0x4, 0x1, 0x7, 0x4, 0x0, 0xd8f7}, 0x0, 0x10, r3, 0x2) recvmsg$kcm(r5, 0x0, 0x1) write$cgroup_int(r1, &(0x7f00000000c0)=0x80, 0x12) 11:04:51 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000380)) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(r2, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200), 0x1c8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x1e) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x54, 0x9, 0xfffffffffffffe00, 0xbdcf, 0x0, 0x10001, 0x2, 0x2, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x4, 0x2, 0x0, 0xd3, 0x11, 0x0, 0x1, 0xfffffffeffffffff, 0x83e, 0x7, 0x3, 0x8, 0xf097, 0x7c, 0x8, 0x0, 0x0, 0xfffffffe00, 0x7, 0x0, 0x20, 0x9, 0x0, 0x3ff, 0x1, @perf_config_ext={0x8001, 0x80000000}, 0x10, 0x4, 0x1, 0x7, 0x4, 0x0, 0xd8f7}, 0x0, 0x10, r3, 0x2) recvmsg$kcm(r5, 0x0, 0x1) write$cgroup_int(r1, &(0x7f00000000c0)=0x80, 0x12) 11:04:51 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000380)) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(r2, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200), 0x1c8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x1e) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x54, 0x9, 0xfffffffffffffe00, 0xbdcf, 0x0, 0x10001, 0x2, 0x2, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x4, 0x2, 0x0, 0xd3, 0x11, 0x0, 0x1, 0xfffffffeffffffff, 0x83e, 0x7, 0x3, 0x8, 0xf097, 0x7c, 0x8, 0x0, 0x0, 0xfffffffe00, 0x7, 0x0, 0x20, 0x9, 0x0, 0x3ff, 0x1, @perf_config_ext={0x8001, 0x80000000}, 0x10, 0x4, 0x1, 0x7, 0x4, 0x0, 0xd8f7}, 0x0, 0x10, r3, 0x2) recvmsg$kcm(r5, 0x0, 0x1) write$cgroup_int(r1, &(0x7f00000000c0)=0x80, 0x12) 11:04:51 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000380)) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(r2, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200), 0x1c8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x1e) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x54, 0x9, 0xfffffffffffffe00, 0xbdcf, 0x0, 0x10001, 0x2, 0x2, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x4, 0x2, 0x0, 0xd3, 0x11, 0x0, 0x1, 0xfffffffeffffffff, 0x83e, 0x7, 0x3, 0x8, 0xf097, 0x7c, 0x8, 0x0, 0x0, 0xfffffffe00, 0x7, 0x0, 0x20, 0x9, 0x0, 0x3ff, 0x1, @perf_config_ext={0x8001, 0x80000000}, 0x10, 0x4, 0x1, 0x7, 0x4, 0x0, 0xd8f7}, 0x0, 0x10, r3, 0x2) recvmsg$kcm(r5, 0x0, 0x1) write$cgroup_int(r1, &(0x7f00000000c0)=0x80, 0x12) 11:04:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r3, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) close(r0) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f00000007c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x1}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c40)="9c897c40367a64d3e829d625e0181965be93a0caa3ed19a8a5e15c78b67b92fc6838aa457ae91727eca6d0616620fad8d791705622738ac1cc8c8f9939215b643db6cbdfb07392905ed8ba1ab695b09644b5ac09726580eaab4d578df3f1430b60b4d9ea11ce213783241874053cb7b03a949bbe9f4f5b0627f4c47750c15597269b3f09b915a7dd037b7ba9cf46a5d08e65d19e470c7009e35d666441e0f3b92d2c62d9bb0e70575f0deb5b3d91d50cda6989f2", 0xb4}], 0x1, 0x0, 0x0, 0x40000}, 0x20008810) 11:04:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r3, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) close(r0) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f00000007c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x1}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c40)="9c897c40367a64d3e829d625e0181965be93a0caa3ed19a8a5e15c78b67b92fc6838aa457ae91727eca6d0616620fad8d791705622738ac1cc8c8f9939215b643db6cbdfb07392905ed8ba1ab695b09644b5ac09726580eaab4d578df3f1430b60b4d9ea11ce213783241874053cb7b03a949bbe9f4f5b0627f4c47750c15597269b3f09b915a7dd037b7ba9cf46a5d08e65d19e470c7009e35d666441e0f3b92d2c62d9bb0e70575f0deb5b3d91d50cda6989f2", 0xb4}], 0x1, 0x0, 0x0, 0x40000}, 0x20008810) 11:04:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r3, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) close(r0) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f00000007c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x1}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c40)="9c897c40367a64d3e829d625e0181965be93a0caa3ed19a8a5e15c78b67b92fc6838aa457ae91727eca6d0616620fad8d791705622738ac1cc8c8f9939215b643db6cbdfb07392905ed8ba1ab695b09644b5ac09726580eaab4d578df3f1430b60b4d9ea11ce213783241874053cb7b03a949bbe9f4f5b0627f4c47750c15597269b3f09b915a7dd037b7ba9cf46a5d08e65d19e470c7009e35d666441e0f3b92d2c62d9bb0e70575f0deb5b3d91d50cda6989f2", 0xb4}], 0x1, 0x0, 0x0, 0x40000}, 0x20008810) 11:04:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r3, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) close(r0) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f00000007c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x1}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c40)="9c897c40367a64d3e829d625e0181965be93a0caa3ed19a8a5e15c78b67b92fc6838aa457ae91727eca6d0616620fad8d791705622738ac1cc8c8f9939215b643db6cbdfb07392905ed8ba1ab695b09644b5ac09726580eaab4d578df3f1430b60b4d9ea11ce213783241874053cb7b03a949bbe9f4f5b0627f4c47750c15597269b3f09b915a7dd037b7ba9cf46a5d08e65d19e470c7009e35d666441e0f3b92d2c62d9bb0e70575f0deb5b3d91d50cda6989f2", 0xb4}], 0x1, 0x0, 0x0, 0x40000}, 0x20008810) 11:04:51 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000380)) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(r2, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200), 0x1c8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x1e) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x54, 0x9, 0xfffffffffffffe00, 0xbdcf, 0x0, 0x10001, 0x2, 0x2, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x4, 0x2, 0x0, 0xd3, 0x11, 0x0, 0x1, 0xfffffffeffffffff, 0x83e, 0x7, 0x3, 0x8, 0xf097, 0x7c, 0x8, 0x0, 0x0, 0xfffffffe00, 0x7, 0x0, 0x20, 0x9, 0x0, 0x3ff, 0x1, @perf_config_ext={0x8001, 0x80000000}, 0x10, 0x4, 0x1, 0x7, 0x4, 0x0, 0xd8f7}, 0x0, 0x10, r3, 0x2) recvmsg$kcm(r5, 0x0, 0x1) write$cgroup_int(r1, &(0x7f00000000c0)=0x80, 0x12) 11:04:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r3, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) close(r0) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f00000007c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x1}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c40)="9c897c40367a64d3e829d625e0181965be93a0caa3ed19a8a5e15c78b67b92fc6838aa457ae91727eca6d0616620fad8d791705622738ac1cc8c8f9939215b643db6cbdfb07392905ed8ba1ab695b09644b5ac09726580eaab4d578df3f1430b60b4d9ea11ce213783241874053cb7b03a949bbe9f4f5b0627f4c47750c15597269b3f09b915a7dd037b7ba9cf46a5d08e65d19e470c7009e35d666441e0f3b92d2c62d9bb0e70575f0deb5b3d91d50cda6989f2", 0xb4}], 0x1, 0x0, 0x0, 0x40000}, 0x20008810) 11:04:51 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000380)) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(r2, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200), 0x1c8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x1e) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x54, 0x9, 0xfffffffffffffe00, 0xbdcf, 0x0, 0x10001, 0x2, 0x2, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x4, 0x2, 0x0, 0xd3, 0x11, 0x0, 0x1, 0xfffffffeffffffff, 0x83e, 0x7, 0x3, 0x8, 0xf097, 0x7c, 0x8, 0x0, 0x0, 0xfffffffe00, 0x7, 0x0, 0x20, 0x9, 0x0, 0x3ff, 0x1, @perf_config_ext={0x8001, 0x80000000}, 0x10, 0x4, 0x1, 0x7, 0x4, 0x0, 0xd8f7}, 0x0, 0x10, r3, 0x2) recvmsg$kcm(r5, 0x0, 0x1) write$cgroup_int(r1, &(0x7f00000000c0)=0x80, 0x12) 11:04:51 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000380)) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(r2, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200), 0x1c8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x1e) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x54, 0x9, 0xfffffffffffffe00, 0xbdcf, 0x0, 0x10001, 0x2, 0x2, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x4, 0x2, 0x0, 0xd3, 0x11, 0x0, 0x1, 0xfffffffeffffffff, 0x83e, 0x7, 0x3, 0x8, 0xf097, 0x7c, 0x8, 0x0, 0x0, 0xfffffffe00, 0x7, 0x0, 0x20, 0x9, 0x0, 0x3ff, 0x1, @perf_config_ext={0x8001, 0x80000000}, 0x10, 0x4, 0x1, 0x7, 0x4, 0x0, 0xd8f7}, 0x0, 0x10, r3, 0x2) recvmsg$kcm(r5, 0x0, 0x1) write$cgroup_int(r1, &(0x7f00000000c0)=0x80, 0x12) 11:04:52 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000380)) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(r2, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200), 0x1c8}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x1e) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x54, 0x9, 0xfffffffffffffe00, 0xbdcf, 0x0, 0x10001, 0x2, 0x2, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x4, 0x2, 0x0, 0xd3, 0x11, 0x0, 0x1, 0xfffffffeffffffff, 0x83e, 0x7, 0x3, 0x8, 0xf097, 0x7c, 0x8, 0x0, 0x0, 0xfffffffe00, 0x7, 0x0, 0x20, 0x9, 0x0, 0x3ff, 0x1, @perf_config_ext={0x8001, 0x80000000}, 0x10, 0x4, 0x1, 0x7, 0x4, 0x0, 0xd8f7}, 0x0, 0x10, r3, 0x2) recvmsg$kcm(r5, 0x0, 0x1) write$cgroup_int(r1, &(0x7f00000000c0)=0x80, 0x12) 11:04:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r3, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) close(r0) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f00000007c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x1}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c40)="9c897c40367a64d3e829d625e0181965be93a0caa3ed19a8a5e15c78b67b92fc6838aa457ae91727eca6d0616620fad8d791705622738ac1cc8c8f9939215b643db6cbdfb07392905ed8ba1ab695b09644b5ac09726580eaab4d578df3f1430b60b4d9ea11ce213783241874053cb7b03a949bbe9f4f5b0627f4c47750c15597269b3f09b915a7dd037b7ba9cf46a5d08e65d19e470c7009e35d666441e0f3b92d2c62d9bb0e70575f0deb5b3d91d50cda6989f2", 0xb4}], 0x1, 0x0, 0x0, 0x40000}, 0x20008810) 11:04:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r3, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) close(r0) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f00000007c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x1}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c40)="9c897c40367a64d3e829d625e0181965be93a0caa3ed19a8a5e15c78b67b92fc6838aa457ae91727eca6d0616620fad8d791705622738ac1cc8c8f9939215b643db6cbdfb07392905ed8ba1ab695b09644b5ac09726580eaab4d578df3f1430b60b4d9ea11ce213783241874053cb7b03a949bbe9f4f5b0627f4c47750c15597269b3f09b915a7dd037b7ba9cf46a5d08e65d19e470c7009e35d666441e0f3b92d2c62d9bb0e70575f0deb5b3d91d50cda6989f2", 0xb4}], 0x1, 0x0, 0x0, 0x40000}, 0x20008810) 11:04:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r3, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) close(r0) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f00000007c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x1}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c40)="9c897c40367a64d3e829d625e0181965be93a0caa3ed19a8a5e15c78b67b92fc6838aa457ae91727eca6d0616620fad8d791705622738ac1cc8c8f9939215b643db6cbdfb07392905ed8ba1ab695b09644b5ac09726580eaab4d578df3f1430b60b4d9ea11ce213783241874053cb7b03a949bbe9f4f5b0627f4c47750c15597269b3f09b915a7dd037b7ba9cf46a5d08e65d19e470c7009e35d666441e0f3b92d2c62d9bb0e70575f0deb5b3d91d50cda6989f2", 0xb4}], 0x1, 0x0, 0x0, 0x40000}, 0x20008810) 11:04:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r3, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) close(r0) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f00000007c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x1}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c40)="9c897c40367a64d3e829d625e0181965be93a0caa3ed19a8a5e15c78b67b92fc6838aa457ae91727eca6d0616620fad8d791705622738ac1cc8c8f9939215b643db6cbdfb07392905ed8ba1ab695b09644b5ac09726580eaab4d578df3f1430b60b4d9ea11ce213783241874053cb7b03a949bbe9f4f5b0627f4c47750c15597269b3f09b915a7dd037b7ba9cf46a5d08e65d19e470c7009e35d666441e0f3b92d2c62d9bb0e70575f0deb5b3d91d50cda6989f2", 0xb4}], 0x1, 0x0, 0x0, 0x40000}, 0x20008810) 11:04:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r3, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) close(r0) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f00000007c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x1}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c40)="9c897c40367a64d3e829d625e0181965be93a0caa3ed19a8a5e15c78b67b92fc6838aa457ae91727eca6d0616620fad8d791705622738ac1cc8c8f9939215b643db6cbdfb07392905ed8ba1ab695b09644b5ac09726580eaab4d578df3f1430b60b4d9ea11ce213783241874053cb7b03a949bbe9f4f5b0627f4c47750c15597269b3f09b915a7dd037b7ba9cf46a5d08e65d19e470c7009e35d666441e0f3b92d2c62d9bb0e70575f0deb5b3d91d50cda6989f2", 0xb4}], 0x1, 0x0, 0x0, 0x40000}, 0x20008810) 11:04:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r3, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) close(r0) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f00000007c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x1}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c40)="9c897c40367a64d3e829d625e0181965be93a0caa3ed19a8a5e15c78b67b92fc6838aa457ae91727eca6d0616620fad8d791705622738ac1cc8c8f9939215b643db6cbdfb07392905ed8ba1ab695b09644b5ac09726580eaab4d578df3f1430b60b4d9ea11ce213783241874053cb7b03a949bbe9f4f5b0627f4c47750c15597269b3f09b915a7dd037b7ba9cf46a5d08e65d19e470c7009e35d666441e0f3b92d2c62d9bb0e70575f0deb5b3d91d50cda6989f2", 0xb4}], 0x1, 0x0, 0x0, 0x40000}, 0x20008810) 11:04:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r3, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) close(r0) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f00000007c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x1}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c40)="9c897c40367a64d3e829d625e0181965be93a0caa3ed19a8a5e15c78b67b92fc6838aa457ae91727eca6d0616620fad8d791705622738ac1cc8c8f9939215b643db6cbdfb07392905ed8ba1ab695b09644b5ac09726580eaab4d578df3f1430b60b4d9ea11ce213783241874053cb7b03a949bbe9f4f5b0627f4c47750c15597269b3f09b915a7dd037b7ba9cf46a5d08e65d19e470c7009e35d666441e0f3b92d2c62d9bb0e70575f0deb5b3d91d50cda6989f2", 0xb4}], 0x1, 0x0, 0x0, 0x40000}, 0x20008810) 11:04:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x400454e2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) r1 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 11:04:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x400454e2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) r1 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 11:04:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r3, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) close(r0) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f00000007c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x1}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c40)="9c897c40367a64d3e829d625e0181965be93a0caa3ed19a8a5e15c78b67b92fc6838aa457ae91727eca6d0616620fad8d791705622738ac1cc8c8f9939215b643db6cbdfb07392905ed8ba1ab695b09644b5ac09726580eaab4d578df3f1430b60b4d9ea11ce213783241874053cb7b03a949bbe9f4f5b0627f4c47750c15597269b3f09b915a7dd037b7ba9cf46a5d08e65d19e470c7009e35d666441e0f3b92d2c62d9bb0e70575f0deb5b3d91d50cda6989f2", 0xb4}], 0x1, 0x0, 0x0, 0x40000}, 0x20008810) 11:04:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x400454e2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) r1 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 11:04:53 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2, 0x1000000000000002, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') socketpair$unix(0x1, 0x0, 0x0, 0x0) 11:04:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x90}, [@ldst={0x2, 0x0, 0xb}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() 11:04:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)=0x5, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x3e6, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f00000002c0)=""/139, 0x8b}], 0x3, &(0x7f0000000380)=""/28, 0x1c}, 0x20) sendmsg$tipc(r3, &(0x7f0000000780)={&(0x7f00000004c0)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x1}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000640)="24c4b3e0656a13646d2b0923ab8342c79f757b9494a11651fa032cba3fa48e39409b5f7c775cffc2e131c19acb88dc0daf9420454a572c8a1ff57e979b627697d99c29ad798060073e1b5f8a3a9167f300fb3c29ae5f7b111fc05dd7fc5c5b70423e092bbe6892ff426d78f6120071d349cb800c71edc7b82e974d25ee403879edc7a721df3bbaf185678218d91ccb1e49aefe", 0x93}], 0x1, 0x0, 0x0, 0x80}, 0x40000) close(r0) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f00000007c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x3}, 0x1}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001c40)="9c897c40367a64d3e829d625e0181965be93a0caa3ed19a8a5e15c78b67b92fc6838aa457ae91727eca6d0616620fad8d791705622738ac1cc8c8f9939215b643db6cbdfb07392905ed8ba1ab695b09644b5ac09726580eaab4d578df3f1430b60b4d9ea11ce213783241874053cb7b03a949bbe9f4f5b0627f4c47750c15597269b3f09b915a7dd037b7ba9cf46a5d08e65d19e470c7009e35d666441e0f3b92d2c62d9bb0e70575f0deb5b3d91d50cda6989f2", 0xb4}], 0x1, 0x0, 0x0, 0x40000}, 0x20008810) 11:04:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x400454e2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) r1 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 11:04:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x400454e2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) r1 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 11:04:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x400454e2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) r1 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 11:04:53 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2, 0x1000000000000002, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') socketpair$unix(0x1, 0x0, 0x0, 0x0) 11:04:53 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2, 0x1000000000000002, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') socketpair$unix(0x1, 0x0, 0x0, 0x0) 11:04:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x400454e2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) r1 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 11:04:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x90}, [@ldst={0x2, 0x0, 0xb}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() 11:04:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x400454e2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) r1 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 11:04:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x400454e2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) r1 = socket$kcm(0x2b, 0x1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 11:04:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x90}, [@ldst={0x2, 0x0, 0xb}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() 11:04:53 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2, 0x1000000000000002, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') socketpair$unix(0x1, 0x0, 0x0, 0x0) 11:04:53 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2, 0x1000000000000002, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') socketpair$unix(0x1, 0x0, 0x0, 0x0) 11:04:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x90}, [@ldst={0x2, 0x0, 0xb}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() 11:04:53 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:54 executing program 5: socket$kcm(0xa, 0x80005, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_user\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\xff', 0x200000000100017e, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threade\xff\xff', 0x13ffffee7) 11:04:54 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$kcm(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$kcm(r3, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, 0x0}, 0x200000c0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r2}) openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) [ 301.641732][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 301.647745][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 301.722662][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 301.729057][ C1] protocol 88fb is buggy, dev hsr_slave_1 11:04:54 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2, 0x1000000000000002, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') socketpair$unix(0x1, 0x0, 0x0, 0x0) 11:04:54 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$kcm(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$kcm(r3, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, 0x0}, 0x200000c0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r2}) openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) 11:04:54 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$kcm(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$kcm(r3, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, 0x0}, 0x200000c0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r2}) openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) 11:04:54 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2, 0x1000000000000002, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') socketpair$unix(0x1, 0x0, 0x0, 0x0) 11:04:54 executing program 1: r0 = socket$kcm(0x11, 0xa, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$kcm(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$kcm(r3, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, 0x0}, 0x200000c0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r2}) openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) 11:04:54 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:54 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$kcm(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$kcm(r3, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, 0x0}, 0x200000c0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r2}) openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) 11:04:54 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$kcm(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$kcm(r3, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, 0x0}, 0x200000c0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r2}) openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) 11:04:54 executing program 1: r0 = socket$kcm(0x11, 0xa, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$kcm(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$kcm(r3, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, 0x0}, 0x200000c0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r2}) openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) 11:04:54 executing program 5: socket$kcm(0xa, 0x80005, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_user\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\xff', 0x200000000100017e, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threade\xff\xff', 0x13ffffee7) 11:04:55 executing program 4: r0 = socket$kcm(0x11, 0xa, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$kcm(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$kcm(r3, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, 0x0}, 0x200000c0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r2}) openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) 11:04:55 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$kcm(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$kcm(r3, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, 0x0}, 0x200000c0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r2}) openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) 11:04:55 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:55 executing program 2: socket$kcm(0xa, 0x80005, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_user\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\xff', 0x200000000100017e, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threade\xff\xff', 0x13ffffee7) 11:04:55 executing program 1: r0 = socket$kcm(0x11, 0xa, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$kcm(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$kcm(r3, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, 0x0}, 0x200000c0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r2}) openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) [ 302.762390][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 302.768656][ C1] protocol 88fb is buggy, dev hsr_slave_1 11:04:55 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:55 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:55 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:55 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:56 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:56 executing program 2: socket$kcm(0xa, 0x80005, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_user\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\xff', 0x200000000100017e, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threade\xff\xff', 0x13ffffee7) 11:04:56 executing program 5: socket$kcm(0xa, 0x80005, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_user\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\xff', 0x200000000100017e, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threade\xff\xff', 0x13ffffee7) 11:04:56 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:56 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:56 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:56 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:56 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:56 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:57 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:57 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:57 executing program 5: socket$kcm(0xa, 0x80005, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_user\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\xff', 0x200000000100017e, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threade\xff\xff', 0x13ffffee7) 11:04:57 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:57 executing program 2: socket$kcm(0xa, 0x80005, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_user\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\xff', 0x200000000100017e, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threade\xff\xff', 0x13ffffee7) 11:04:57 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:57 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:57 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$kcm(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$kcm(r3, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, 0x0}, 0x200000c0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r2}) openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) 11:04:58 executing program 0: r0 = socket$kcm(0x11, 0xa, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$kcm(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$kcm(r3, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, 0x0}, 0x200000c0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r2}) openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) [ 305.642285][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 305.648559][ C0] protocol 88fb is buggy, dev hsr_slave_1 11:04:58 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:58 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$kcm(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$kcm(r3, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, 0x0}, 0x200000c0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r2}) openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) 11:04:58 executing program 0: r0 = socket$kcm(0x11, 0xa, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$kcm(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$kcm(r3, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, 0x0}, 0x200000c0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r2}) openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) 11:04:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc001000024002000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) 11:04:58 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 11:04:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 306.024612][T16954] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 11:04:58 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$kcm(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$kcm(r3, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, 0x0}, 0x200000c0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r2}) openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) [ 306.142703][T16954] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 11:04:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc001000024002000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) 11:04:58 executing program 0: r0 = socket$kcm(0x11, 0xa, 0x300) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$kcm(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$kcm(r3, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, 0x0}, 0x200000c0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r2}) openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) 11:04:58 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x5, 0x5, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x93, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x57c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000400)='cpu&00&&\n\x00\x01\b\b\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) [ 306.463411][T16971] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 306.482047][T16971] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 11:04:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="230000004a0081aee4050c00000f00000a8bc36f7d79ce3263dac37b7403c609000000", 0x23}], 0x1}, 0x0) write$cgroup_pid(r1, &(0x7f0000000200), 0x12) sendmsg(0xffffffffffffffff, 0x0, 0x0) 11:04:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg$kcm(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd63}, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0x1, 0x12) 11:04:59 executing program 0: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:04:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc001000024002000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) 11:04:59 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="230000004a0081aee4050c00000f00000a8bc36f7d79ce3263dac37b7403c609000000", 0x23}], 0x1}, 0x0) write$cgroup_pid(r1, &(0x7f0000000200), 0x12) sendmsg(0xffffffffffffffff, 0x0, 0x0) 11:04:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="230000004a0081aee4050c00000f00000a8bc36f7d79ce3263dac37b7403c609000000", 0x23}], 0x1}, 0x0) write$cgroup_pid(r1, &(0x7f0000000200), 0x12) sendmsg(0xffffffffffffffff, 0x0, 0x0) [ 306.855150][T16987] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 306.867890][T16989] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 306.941374][T16989] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 11:04:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg$kcm(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd63}, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0x1, 0x12) [ 306.982738][T16991] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 11:04:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 11:04:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="230000004a0081aee4050c00000f00000a8bc36f7d79ce3263dac37b7403c609000000", 0x23}], 0x1}, 0x0) write$cgroup_pid(r1, &(0x7f0000000200), 0x12) sendmsg(0xffffffffffffffff, 0x0, 0x0) 11:04:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124fc001000024002000000053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) 11:04:59 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="230000004a0081aee4050c00000f00000a8bc36f7d79ce3263dac37b7403c609000000", 0x23}], 0x1}, 0x0) write$cgroup_pid(r1, &(0x7f0000000200), 0x12) sendmsg(0xffffffffffffffff, 0x0, 0x0) 11:04:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="230000004a0081aee4050c00000f00000a8bc36f7d79ce3263dac37b7403c609000000", 0x23}], 0x1}, 0x0) write$cgroup_pid(r1, &(0x7f0000000200), 0x12) sendmsg(0xffffffffffffffff, 0x0, 0x0) 11:04:59 executing program 0: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:04:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg$kcm(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd63}, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0x1, 0x12) [ 307.170750][T17010] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 307.240165][T17010] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 11:04:59 executing program 5: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:04:59 executing program 1: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:04:59 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="230000004a0081aee4050c00000f00000a8bc36f7d79ce3263dac37b7403c609000000", 0x23}], 0x1}, 0x0) write$cgroup_pid(r1, &(0x7f0000000200), 0x12) sendmsg(0xffffffffffffffff, 0x0, 0x0) 11:05:00 executing program 0: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:00 executing program 5: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 11:05:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg$kcm(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd63}, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0x1, 0x12) 11:05:00 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:00 executing program 1: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:00 executing program 5: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:00 executing program 0: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:00 executing program 5: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:00 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:00 executing program 1: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:00 executing program 0: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:00 executing program 4: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:00 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 11:05:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:01 executing program 1: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:01 executing program 0: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:01 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:01 executing program 4: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:01 executing program 4: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:01 executing program 1: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:01 executing program 0: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:01 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 11:05:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 11:05:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 11:05:02 executing program 1: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:02 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x0, 0x0, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x7ff, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xb, r0, 0x8, &(0x7f0000001d40)={0x100000000, 0xcd0}, 0x8, 0x10, &(0x7f0000001d80)={0x40, 0x0, 0x2, 0xf}, 0x10}, 0x70) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x129) socketpair$unix(0x1, 0x7, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x80, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0xfffffffffffffd7e, 0x0}, 0x200008c4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb904021d65ef0b007c05e87c55a11200160000ff009900000000000000000000812fa8000b000f0063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000200)='./file0\x00', r1}, 0xa) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000004fc0)={0x0, 0x0, 0x0}, 0x10040) 11:05:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg$kcm(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd63}, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0x1, 0x12) 11:05:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 11:05:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) 11:05:02 executing program 1: r0 = socket$kcm(0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000280)="0c198b135dd685d277132307f9e164294be1fa65259e4865b95ddba47c4c16dc76e9c9eacaae3a0fd950bb5e2cd3ca04c1718b5a5a261262976bab5d9ad2dc311b848d3c8314856f6b82754750f4402cbf71a2976a02d22afa1c5e8956fca80ea9fca38ab55fa28d0c5aed781f359c3c9b548ed5ede107bb68a5376aa746a7d87e50c0fe1863e049780f5aaa47ed1216e8186976f97c8b264ea0bd2aa279ad9a013505db5f17e730bb50e6a6d7ed2f7e5c2f391fe820f6b7a5b200d7dee7ca", 0xbf}], 0x1}, 0x20008844) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x15, 0x6, 0x3f, 0x0, 0x0, r0, 0x1, [], 0x0, 0xffffffffffffff9c, 0xba2, 0x1}, 0x3c) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 11:05:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg$kcm(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd63}, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0x1, 0x12) [ 310.315948][T17153] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 310.372503][T17153] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 11:05:02 executing program 1: r0 = socket$kcm(0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000280)="0c198b135dd685d277132307f9e164294be1fa65259e4865b95ddba47c4c16dc76e9c9eacaae3a0fd950bb5e2cd3ca04c1718b5a5a261262976bab5d9ad2dc311b848d3c8314856f6b82754750f4402cbf71a2976a02d22afa1c5e8956fca80ea9fca38ab55fa28d0c5aed781f359c3c9b548ed5ede107bb68a5376aa746a7d87e50c0fe1863e049780f5aaa47ed1216e8186976f97c8b264ea0bd2aa279ad9a013505db5f17e730bb50e6a6d7ed2f7e5c2f391fe820f6b7a5b200d7dee7ca", 0xbf}], 0x1}, 0x20008844) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x15, 0x6, 0x3f, 0x0, 0x0, r0, 0x1, [], 0x0, 0xffffffffffffff9c, 0xba2, 0x1}, 0x3c) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 11:05:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg$kcm(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd63}, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0x1, 0x12) [ 310.490585][T17158] device nr0 entered promiscuous mode 11:05:03 executing program 2: r0 = socket$kcm(0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000280)="0c198b135dd685d277132307f9e164294be1fa65259e4865b95ddba47c4c16dc76e9c9eacaae3a0fd950bb5e2cd3ca04c1718b5a5a261262976bab5d9ad2dc311b848d3c8314856f6b82754750f4402cbf71a2976a02d22afa1c5e8956fca80ea9fca38ab55fa28d0c5aed781f359c3c9b548ed5ede107bb68a5376aa746a7d87e50c0fe1863e049780f5aaa47ed1216e8186976f97c8b264ea0bd2aa279ad9a013505db5f17e730bb50e6a6d7ed2f7e5c2f391fe820f6b7a5b200d7dee7ca", 0xbf}], 0x1}, 0x20008844) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x15, 0x6, 0x3f, 0x0, 0x0, r0, 0x1, [], 0x0, 0xffffffffffffff9c, 0xba2, 0x1}, 0x3c) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 11:05:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 11:05:03 executing program 2: r0 = socket$kcm(0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000280)="0c198b135dd685d277132307f9e164294be1fa65259e4865b95ddba47c4c16dc76e9c9eacaae3a0fd950bb5e2cd3ca04c1718b5a5a261262976bab5d9ad2dc311b848d3c8314856f6b82754750f4402cbf71a2976a02d22afa1c5e8956fca80ea9fca38ab55fa28d0c5aed781f359c3c9b548ed5ede107bb68a5376aa746a7d87e50c0fe1863e049780f5aaa47ed1216e8186976f97c8b264ea0bd2aa279ad9a013505db5f17e730bb50e6a6d7ed2f7e5c2f391fe820f6b7a5b200d7dee7ca", 0xbf}], 0x1}, 0x20008844) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x15, 0x6, 0x3f, 0x0, 0x0, r0, 0x1, [], 0x0, 0xffffffffffffff9c, 0xba2, 0x1}, 0x3c) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 11:05:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 11:05:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 11:05:03 executing program 1: r0 = socket$kcm(0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000280)="0c198b135dd685d277132307f9e164294be1fa65259e4865b95ddba47c4c16dc76e9c9eacaae3a0fd950bb5e2cd3ca04c1718b5a5a261262976bab5d9ad2dc311b848d3c8314856f6b82754750f4402cbf71a2976a02d22afa1c5e8956fca80ea9fca38ab55fa28d0c5aed781f359c3c9b548ed5ede107bb68a5376aa746a7d87e50c0fe1863e049780f5aaa47ed1216e8186976f97c8b264ea0bd2aa279ad9a013505db5f17e730bb50e6a6d7ed2f7e5c2f391fe820f6b7a5b200d7dee7ca", 0xbf}], 0x1}, 0x20008844) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x15, 0x6, 0x3f, 0x0, 0x0, r0, 0x1, [], 0x0, 0xffffffffffffff9c, 0xba2, 0x1}, 0x3c) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) [ 311.082268][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 311.087514][T17158] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 311.088560][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 311.213225][T17208] device nr0 entered promiscuous mode 11:05:03 executing program 1: r0 = socket$kcm(0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000280)="0c198b135dd685d277132307f9e164294be1fa65259e4865b95ddba47c4c16dc76e9c9eacaae3a0fd950bb5e2cd3ca04c1718b5a5a261262976bab5d9ad2dc311b848d3c8314856f6b82754750f4402cbf71a2976a02d22afa1c5e8956fca80ea9fca38ab55fa28d0c5aed781f359c3c9b548ed5ede107bb68a5376aa746a7d87e50c0fe1863e049780f5aaa47ed1216e8186976f97c8b264ea0bd2aa279ad9a013505db5f17e730bb50e6a6d7ed2f7e5c2f391fe820f6b7a5b200d7dee7ca", 0xbf}], 0x1}, 0x20008844) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x15, 0x6, 0x3f, 0x0, 0x0, r0, 0x1, [], 0x0, 0xffffffffffffff9c, 0xba2, 0x1}, 0x3c) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) [ 311.322387][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 311.328677][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 311.338772][T17158] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 11:05:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) 11:05:04 executing program 2: r0 = socket$kcm(0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000280)="0c198b135dd685d277132307f9e164294be1fa65259e4865b95ddba47c4c16dc76e9c9eacaae3a0fd950bb5e2cd3ca04c1718b5a5a261262976bab5d9ad2dc311b848d3c8314856f6b82754750f4402cbf71a2976a02d22afa1c5e8956fca80ea9fca38ab55fa28d0c5aed781f359c3c9b548ed5ede107bb68a5376aa746a7d87e50c0fe1863e049780f5aaa47ed1216e8186976f97c8b264ea0bd2aa279ad9a013505db5f17e730bb50e6a6d7ed2f7e5c2f391fe820f6b7a5b200d7dee7ca", 0xbf}], 0x1}, 0x20008844) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x15, 0x6, 0x3f, 0x0, 0x0, r0, 0x1, [], 0x0, 0xffffffffffffff9c, 0xba2, 0x1}, 0x3c) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 11:05:04 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) [ 311.760562][T17228] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 311.874929][T17228] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 311.887595][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 311.894618][ C0] protocol 88fb is buggy, dev hsr_slave_1 11:05:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 311.947054][T17232] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 11:05:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 312.041758][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 312.047628][ C1] protocol 88fb is buggy, dev hsr_slave_1 11:05:04 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) 11:05:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) [ 312.121704][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 312.127551][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 312.171391][T17232] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 312.193050][T17228] device nr0 entered promiscuous mode [ 312.237521][T17251] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 312.260134][T17251] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 312.281669][T17253] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 312.315564][T17253] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 312.611173][T17232] device nr0 entered promiscuous mode [ 312.652236][T17257] device nr0 entered promiscuous mode [ 312.808080][T17266] device nr0 entered promiscuous mode 11:05:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) 11:05:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) [ 312.962236][T17272] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 11:05:05 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) [ 313.018730][T17272] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 313.055100][T17277] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.0'. [ 313.105776][T17277] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 313.124695][T17282] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 313.138580][T17282] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 11:05:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) [ 313.509418][T17297] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 11:05:06 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) [ 313.556234][T17297] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 313.571982][T17279] device nr0 entered promiscuous mode [ 313.665053][T17304] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 313.827543][T17292] device nr0 entered promiscuous mode 11:05:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) [ 313.918449][T17297] device nr0 entered promiscuous mode [ 313.934468][T17315] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 313.962770][T17309] device nr0 entered promiscuous mode 11:05:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) 11:05:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) [ 314.187444][T17324] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 314.225242][T17327] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 11:05:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) [ 314.587939][T17318] device nr0 entered promiscuous mode [ 314.608696][T17334] device nr0 entered promiscuous mode 11:05:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) 11:05:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) [ 314.740010][T17343] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 314.774138][T17344] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 314.823837][T17349] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 315.211659][T17346] device nr0 entered promiscuous mode [ 315.242936][T17349] device nr0 entered promiscuous mode [ 315.266558][T17343] device nr0 entered promiscuous mode 11:05:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) 11:05:07 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) [ 315.402994][T17370] __nla_validate_parse: 7 callbacks suppressed [ 315.403005][T17370] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 315.461274][T17370] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 11:05:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) [ 315.558316][T17382] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 315.585504][T17382] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 315.607295][T17371] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 315.634316][T17371] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 315.935127][T17375] device nr0 entered promiscuous mode [ 315.962035][T17373] device nr0 entered promiscuous mode 11:05:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) [ 315.988876][T17392] device nr0 entered promiscuous mode 11:05:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) 11:05:08 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) gettid() sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) [ 316.087743][T17397] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 316.129340][T17397] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 316.157051][T17400] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.0'. [ 316.184997][T17400] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 316.201723][ C1] net_ratelimit: 20 callbacks suppressed [ 316.201733][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 316.213448][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 316.281760][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 316.287619][ C1] protocol 88fb is buggy, dev hsr_slave_1 11:05:08 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) gettid() sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 11:05:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) gettid() sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 11:05:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) gettid() sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 11:05:09 executing program 3: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x891d, &(0x7f0000000800)='nr0\x01:`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r1, r0, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) [ 316.884550][T17407] device nr0 entered promiscuous mode 11:05:09 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) 11:05:09 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) 11:05:09 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='/\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) [ 317.166198][T17437] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 317.170976][T17429] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 317.179015][T17437] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 317.289293][T17429] CPU: 0 PID: 17429 Comm: syz-executor.2 Not tainted 5.1.0+ #4 [ 317.296899][T17429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.306967][T17429] Call Trace: [ 317.310353][T17429] dump_stack+0x172/0x1f0 [ 317.314879][T17429] dump_header+0x10f/0xb6c [ 317.319325][T17429] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 317.321751][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 317.325148][T17429] ? ___ratelimit+0x60/0x595 [ 317.325219][T17429] ? do_raw_spin_unlock+0x57/0x270 [ 317.325243][T17429] oom_kill_process.cold+0x10/0x15 [ 317.331013][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 317.335559][T17429] out_of_memory+0x79a/0x1280 [ 317.335576][T17429] ? lock_downgrade+0x880/0x880 [ 317.335652][T17429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.335684][T17429] ? oom_killer_disable+0x280/0x280 [ 317.372583][T17429] ? find_held_lock+0x35/0x130 [ 317.377471][T17429] mem_cgroup_out_of_memory+0x1ca/0x230 [ 317.383045][T17429] ? memcg_event_wake+0x230/0x230 [ 317.388088][T17429] ? do_raw_spin_unlock+0x57/0x270 [ 317.393313][T17429] ? _raw_spin_unlock+0x2d/0x50 [ 317.398780][T17429] try_charge+0x102c/0x15c0 [ 317.403318][T17429] ? find_held_lock+0x35/0x130 [ 317.408106][T17429] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 317.414201][T17429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.420565][T17429] ? kasan_check_read+0x11/0x20 [ 317.425535][T17429] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 317.431122][T17429] mem_cgroup_try_charge+0x24d/0x5e0 [ 317.437146][T17429] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 317.442991][T17429] __handle_mm_fault+0x1e1f/0x3ec0 [ 317.448130][T17429] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 317.453819][T17429] ? find_held_lock+0x35/0x130 [ 317.458643][T17429] ? handle_mm_fault+0x322/0xb30 [ 317.463738][T17429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.470023][T17429] ? kasan_check_read+0x11/0x20 [ 317.475000][T17429] handle_mm_fault+0x43f/0xb30 [ 317.479984][T17429] __do_page_fault+0x5ef/0xda0 [ 317.484880][T17429] do_page_fault+0x71/0x581 [ 317.489688][T17429] ? page_fault+0x8/0x30 [ 317.493965][T17429] page_fault+0x1e/0x30 [ 317.498325][T17429] RIP: 0033:0x4107bf [ 317.502262][T17429] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 317.521975][T17429] RSP: 002b:00007ffcfb0f4760 EFLAGS: 00010206 [ 317.528256][T17429] RAX: 00007ff299121000 RBX: 0000000000020000 RCX: 0000000000458dfa [ 317.536347][T17429] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 317.544602][T17429] RBP: 00007ffcfb0f4840 R08: ffffffffffffffff R09: 0000000000000000 [ 317.554678][T17429] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcfb0f4930 [ 317.563467][T17429] R13: 00007ff299141700 R14: 0000000000000001 R15: 000000000073bfac [ 317.571935][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 317.577763][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 317.595047][T17429] memory: usage 11528kB, limit 0kB, failcnt 8 [ 317.601322][T17429] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 317.616187][T17429] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 317.624805][T17429] Memory cgroup stats for /syz2: cache:1460KB rss:4236KB rss_huge:4096KB shmem:1188KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:520KB active_anon:5076KB inactive_file:0KB active_file:0KB unevictable:0KB [ 317.651339][ T27] audit: type=1804 audit(1557399910.079:231): pid=17439 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir233870541/syzkaller.5Pwtf4/362/memory.events" dev="sda1" ino=16531 res=1 [ 317.679253][T17429] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=17429,uid=0 [ 317.703622][T17429] Memory cgroup out of memory: Killed process 17429 (syz-executor.2) total-vm:72580kB, anon-rss:4192kB, file-rss:34816kB, shmem-rss:0kB [ 317.723410][ T27] audit: type=1800 audit(1557399910.089:232): pid=17439 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16531 res=0 [ 317.745513][ T1042] oom_reaper: reaped process 17429 (syz-executor.2), now anon-rss:0kB, file-rss:34772kB, shmem-rss:0kB [ 317.826911][T17440] device nr0 entered promiscuous mode 11:05:10 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) [ 317.865492][ T27] audit: type=1804 audit(1557399910.289:233): pid=17439 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir233870541/syzkaller.5Pwtf4/362/memory.events" dev="sda1" ino=16531 res=1 11:05:10 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='/\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) [ 317.961703][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 317.967539][ C1] protocol 88fb is buggy, dev hsr_slave_1 11:05:10 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 318.005732][ T27] audit: type=1800 audit(1557399910.289:234): pid=17439 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16531 res=0 [ 318.063278][T17454] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 318.068156][ T7901] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 318.092363][ T7901] CPU: 1 PID: 7901 Comm: syz-executor.2 Not tainted 5.1.0+ #4 [ 318.099858][ T7901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.109924][ T7901] Call Trace: [ 318.113244][ T7901] dump_stack+0x172/0x1f0 [ 318.117600][ T7901] dump_header+0x10f/0xb6c [ 318.122034][ T7901] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 318.127886][ T7901] ? ___ratelimit+0x60/0x595 [ 318.132488][ T7901] ? do_raw_spin_unlock+0x57/0x270 [ 318.137613][ T7901] oom_kill_process.cold+0x10/0x15 [ 318.142741][ T7901] out_of_memory+0x79a/0x1280 [ 318.147436][ T7901] ? lock_downgrade+0x880/0x880 [ 318.152299][ T7901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.158545][ T7901] ? oom_killer_disable+0x280/0x280 [ 318.163752][ T7901] ? find_held_lock+0x35/0x130 [ 318.168535][ T7901] mem_cgroup_out_of_memory+0x1ca/0x230 [ 318.174101][ T7901] ? memcg_event_wake+0x230/0x230 [ 318.179142][ T7901] ? do_raw_spin_unlock+0x57/0x270 [ 318.184263][ T7901] ? _raw_spin_unlock+0x2d/0x50 [ 318.189138][ T7901] try_charge+0x102c/0x15c0 [ 318.193654][ T7901] ? find_held_lock+0x35/0x130 [ 318.198440][ T7901] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 318.204008][ T7901] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 318.209574][ T7901] ? find_held_lock+0x35/0x130 [ 318.214356][ T7901] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 318.219921][ T7901] __memcg_kmem_charge_memcg+0x7c/0x130 [ 318.225473][ T7901] ? memcg_kmem_put_cache+0xb0/0xb0 [ 318.230678][ T7901] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 318.236251][ T7901] __memcg_kmem_charge+0x136/0x300 [ 318.241381][ T7901] __alloc_pages_nodemask+0x4bf/0x8d0 [ 318.246775][ T7901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.253058][ T7901] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 318.258918][ T7901] ? copy_process.part.0+0x43eb/0x6710 [ 318.263624][T17454] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 318.264395][ T7901] ? lockdep_hardirqs_on+0x418/0x5d0 [ 318.264432][ T7901] ? trace_hardirqs_on+0x67/0x230 [ 318.264458][ T7901] ? kasan_check_read+0x11/0x20 [ 318.289159][ T7901] copy_process.part.0+0x4a0/0x6710 [ 318.294378][ T7901] ? __might_fault+0x12b/0x1e0 [ 318.299166][ T7901] ? __cleanup_sighand+0x60/0x60 [ 318.304117][ T7901] ? lock_downgrade+0x880/0x880 [ 318.308993][ T7901] _do_fork+0x25d/0xfd0 [ 318.313168][ T7901] ? copy_init_mm+0x20/0x20 [ 318.317772][ T7901] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 318.323283][ T7901] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 318.328795][ T7901] ? do_syscall_64+0x26/0x670 [ 318.333497][ T7901] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.339580][ T7901] ? do_syscall_64+0x26/0x670 [ 318.344287][ T7901] __x64_sys_clone+0xbf/0x150 [ 318.348993][ T7901] do_syscall_64+0x103/0x670 [ 318.353711][ T7901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.359629][ T7901] RIP: 0033:0x45737a [ 318.363736][ T7901] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 318.383549][ T7901] RSP: 002b:00007ffcfb0f49b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 318.391966][ T7901] RAX: ffffffffffffffda RBX: 00007ffcfb0f49b0 RCX: 000000000045737a [ 318.400509][ T7901] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 318.408577][ T7901] RBP: 00007ffcfb0f49f0 R08: 0000000000000001 R09: 0000000000cc4940 [ 318.416553][ T7901] R10: 0000000000cc4c10 R11: 0000000000000246 R12: 0000000000000001 [ 318.424546][ T7901] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffcfb0f4a40 11:05:10 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 318.455792][ T7901] memory: usage 7144kB, limit 0kB, failcnt 17 [ 318.465088][ T7901] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 318.508863][ T7901] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 318.527598][ T7901] Memory cgroup stats for /syz2: cache:1460KB rss:72KB rss_huge:0KB shmem:1188KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:520KB active_anon:892KB inactive_file:0KB active_file:0KB unevictable:0KB [ 318.620108][ T7901] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=7901,uid=0 [ 318.677784][ T7901] Memory cgroup out of memory: Killed process 7901 (syz-executor.2) total-vm:72316kB, anon-rss:96kB, file-rss:35712kB, shmem-rss:0kB [ 318.717435][ T1042] oom_reaper: reaped process 7901 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 318.730313][T17460] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 318.762577][T17460] CPU: 1 PID: 17460 Comm: syz-executor.0 Not tainted 5.1.0+ #4 [ 318.770170][T17460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.780329][T17460] Call Trace: [ 318.783635][T17460] dump_stack+0x172/0x1f0 [ 318.788180][T17460] dump_header+0x10f/0xb6c [ 318.792606][T17460] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 318.798421][T17460] ? ___ratelimit+0x60/0x595 [ 318.803017][T17460] ? do_raw_spin_unlock+0x57/0x270 [ 318.808136][T17460] oom_kill_process.cold+0x10/0x15 [ 318.813253][T17460] out_of_memory+0x79a/0x1280 [ 318.817934][T17460] ? oom_killer_disable+0x280/0x280 [ 318.823131][T17460] ? find_held_lock+0x35/0x130 [ 318.828166][T17460] mem_cgroup_out_of_memory+0x1ca/0x230 [ 318.833713][T17460] ? memcg_event_wake+0x230/0x230 [ 318.838747][T17460] ? do_raw_spin_unlock+0x57/0x270 [ 318.843861][T17460] ? _raw_spin_unlock+0x2d/0x50 [ 318.848718][T17460] try_charge+0x102c/0x15c0 [ 318.853249][T17460] ? find_held_lock+0x35/0x130 [ 318.858114][T17460] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 318.863673][T17460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.869924][T17460] ? kasan_check_read+0x11/0x20 [ 318.874881][T17460] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 318.880434][T17460] mem_cgroup_try_charge+0x24d/0x5e0 [ 318.885728][T17460] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 318.891378][T17460] __handle_mm_fault+0x1e1f/0x3ec0 [ 318.896495][T17460] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 318.902130][T17460] ? find_held_lock+0x35/0x130 [ 318.906894][T17460] ? handle_mm_fault+0x322/0xb30 [ 318.911840][T17460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.918094][T17460] ? kasan_check_read+0x11/0x20 [ 318.922960][T17460] handle_mm_fault+0x43f/0xb30 [ 318.927754][T17460] __do_page_fault+0x5ef/0xda0 [ 318.932537][T17460] do_page_fault+0x71/0x581 [ 318.937131][T17460] ? page_fault+0x8/0x30 [ 318.941373][T17460] page_fault+0x1e/0x30 [ 318.945533][T17460] RIP: 0033:0x4107bf [ 318.949426][T17460] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 318.969035][T17460] RSP: 002b:00007ffe2e85fe40 EFLAGS: 00010206 11:05:11 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) [ 318.975107][T17460] RAX: 00007fee9b0b1000 RBX: 0000000000020000 RCX: 0000000000458dfa [ 318.983077][T17460] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 318.991063][T17460] RBP: 00007ffe2e85ff20 R08: ffffffffffffffff R09: 0000000000000000 [ 318.999038][T17460] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe2e860010 [ 319.007021][T17460] R13: 00007fee9b0d1700 R14: 0000000000000001 R15: 000000000073bfac [ 319.064449][T17460] memory: usage 9484kB, limit 0kB, failcnt 8 [ 319.070695][T17460] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 319.081146][T17460] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 319.089195][T17460] Memory cgroup stats for /syz0: cache:64KB rss:4336KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4240KB inactive_file:0KB active_file:0KB unevictable:0KB [ 319.111276][T17460] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=17460,uid=0 11:05:11 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='/\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) [ 319.147187][ T27] audit: type=1804 audit(1557399911.579:235): pid=17461 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir233870541/syzkaller.5Pwtf4/363/memory.events" dev="sda1" ino=16524 res=1 [ 319.166659][T17460] Memory cgroup out of memory: Killed process 17460 (syz-executor.0) total-vm:72580kB, anon-rss:4196kB, file-rss:34816kB, shmem-rss:0kB [ 319.198143][ T27] audit: type=1800 audit(1557399911.579:236): pid=17461 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16524 res=0 [ 319.199805][ T1042] oom_reaper: reaped process 17460 (syz-executor.0), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 319.247281][T17470] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 319.276966][T17470] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 11:05:11 executing program 3: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x891d, &(0x7f0000000800)='nr0\x01:`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r1, r0, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 11:05:12 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 319.794441][ T7896] syz-executor.0 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 319.826298][ T7896] CPU: 1 PID: 7896 Comm: syz-executor.0 Not tainted 5.1.0+ #4 [ 319.833823][ T7896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.843881][ T7896] Call Trace: [ 319.843904][ T7896] dump_stack+0x172/0x1f0 [ 319.843927][ T7896] dump_header+0x10f/0xb6c [ 319.855962][ T7896] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 319.861787][ T7896] ? ___ratelimit+0x60/0x595 [ 319.866392][ T7896] ? do_raw_spin_unlock+0x57/0x270 [ 319.871524][ T7896] oom_kill_process.cold+0x10/0x15 [ 319.876653][ T7896] out_of_memory+0x79a/0x1280 [ 319.881349][ T7896] ? lock_downgrade+0x880/0x880 [ 319.886230][ T7896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.892488][ T7896] ? oom_killer_disable+0x280/0x280 [ 319.897700][ T7896] ? find_held_lock+0x35/0x130 [ 319.902490][ T7896] mem_cgroup_out_of_memory+0x1ca/0x230 [ 319.908081][ T7896] ? memcg_event_wake+0x230/0x230 [ 319.913131][ T7896] ? do_raw_spin_unlock+0x57/0x270 [ 319.918262][ T7896] ? _raw_spin_unlock+0x2d/0x50 [ 319.923136][ T7896] try_charge+0x102c/0x15c0 [ 319.927658][ T7896] ? find_held_lock+0x35/0x130 [ 319.932444][ T7896] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 319.938001][ T7896] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 319.943566][ T7896] ? find_held_lock+0x35/0x130 [ 319.948435][ T7896] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 319.954003][ T7896] __memcg_kmem_charge_memcg+0x7c/0x130 [ 319.959568][ T7896] ? memcg_kmem_put_cache+0xb0/0xb0 [ 319.964788][ T7896] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 319.970365][ T7896] __memcg_kmem_charge+0x136/0x300 [ 319.975505][ T7896] __alloc_pages_nodemask+0x4bf/0x8d0 [ 319.980896][ T7896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.987154][ T7896] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 319.992976][ T7896] ? copy_process.part.0+0x43eb/0x6710 [ 319.998453][ T7896] ? lockdep_hardirqs_on+0x418/0x5d0 [ 320.003753][ T7896] ? trace_hardirqs_on+0x67/0x230 [ 320.008795][ T7896] ? kasan_check_read+0x11/0x20 [ 320.013673][ T7896] copy_process.part.0+0x4a0/0x6710 [ 320.018891][ T7896] ? __might_fault+0x12b/0x1e0 [ 320.023683][ T7896] ? __cleanup_sighand+0x60/0x60 [ 320.028634][ T7896] ? lock_downgrade+0x880/0x880 [ 320.033604][ T7896] _do_fork+0x25d/0xfd0 [ 320.037788][ T7896] ? copy_init_mm+0x20/0x20 [ 320.042324][ T7896] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 320.047815][ T7896] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 320.053289][ T7896] ? do_syscall_64+0x26/0x670 [ 320.057981][ T7896] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.064060][ T7896] ? do_syscall_64+0x26/0x670 [ 320.068755][ T7896] __x64_sys_clone+0xbf/0x150 [ 320.073537][ T7896] do_syscall_64+0x103/0x670 [ 320.078159][ T7896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.084090][ T7896] RIP: 0033:0x45737a [ 320.088082][ T7896] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 320.107788][ T7896] RSP: 002b:00007ffe2e860090 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 320.116223][ T7896] RAX: ffffffffffffffda RBX: 00007ffe2e860090 RCX: 000000000045737a [ 320.124204][ T7896] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 320.132195][ T7896] RBP: 00007ffe2e8600d0 R08: 0000000000000001 R09: 0000000000a91940 11:05:12 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 320.140188][ T7896] R10: 0000000000a91c10 R11: 0000000000000246 R12: 0000000000000001 [ 320.148178][ T7896] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffe2e860120 [ 320.229796][ T7896] memory: usage 5104kB, limit 0kB, failcnt 17 [ 320.237240][ T7896] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 320.247782][ T27] audit: type=1800 audit(1557399912.679:237): pid=17474 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16524 res=0 11:05:12 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='/\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 11:05:12 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 320.275442][ T7896] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 320.284898][ T7896] Memory cgroup stats for /syz0: cache:64KB rss:168KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:56KB inactive_file:0KB active_file:0KB unevictable:0KB [ 320.311958][ T7896] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=7896,uid=0 [ 320.345905][ T7896] Memory cgroup out of memory: Killed process 7896 (syz-executor.0) total-vm:72316kB, anon-rss:100kB, file-rss:35712kB, shmem-rss:0kB [ 320.367340][ T1042] oom_reaper: reaped process 7896 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 11:05:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = socket$kcm(0x10, 0x0, 0x10) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x100000002, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='^\x00\x00\x00\x00\x00\x00\x00I\xfa\xde\x10\x05\x19\xd7w\x9c\x8b\xf6\x19ventc\xe5', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) write$cgroup_pid(r4, &(0x7f0000000000), 0x20000200) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000380)="b340feb47471e9a2ebc2126ce6ca50a386b8c5a6644e67f30260b1ab1b0b4ff695746cb9c3ea3c976798003de24abe2d8d18d4dc84b43b0a1098d752ebef8b7b3082d284e3d8b546bb4b6a73e709880d572627fb0cf1a91e980769afee02b52dd8c4b474be46815a8ed52bf94e846787dd552665af550b573c5b01c6d9e987b25be5686162fd2378b412ebb44156", 0x8e}, {0x0}], 0x2}, 0x24008001) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[], 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'nr0\x01\x00', 0x4005}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3df, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000004c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000810000000000fd908488d8dd2dfa8863"], 0x12) [ 320.742516][T17496] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 320.821414][T17496] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 11:05:13 executing program 1: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x891d, &(0x7f0000000800)='nr0\x01:`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r1, r0, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 11:05:13 executing program 3: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x891d, &(0x7f0000000800)='nr0\x01:`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r1, r0, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 11:05:13 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) 11:05:13 executing program 4: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x891d, &(0x7f0000000800)='nr0\x01:`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r1, r0, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) [ 321.322445][ T27] audit: type=1800 audit(1557399913.759:238): pid=17492 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16509 res=0 [ 321.354136][T17500] device nr0 entered promiscuous mode [ 321.481817][ C1] net_ratelimit: 18 callbacks suppressed [ 321.481858][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 321.494799][ C1] protocol 88fb is buggy, dev hsr_slave_1 11:05:14 executing program 0: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x891d, &(0x7f0000000800)='nr0\x01:`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r1, r0, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) [ 321.721761][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 321.727640][ C0] protocol 88fb is buggy, dev hsr_slave_1 11:05:14 executing program 1: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x891d, &(0x7f0000000800)='nr0\x01:`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r1, r0, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 11:05:14 executing program 4: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x891d, &(0x7f0000000800)='nr0\x01:`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r1, r0, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) [ 321.913479][T17524] IPVS: ftp: loaded support on port[0] = 21 11:05:14 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 322.198045][T17533] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 11:05:14 executing program 3: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x891d, &(0x7f0000000800)='nr0\x01:`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r1, r0, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) [ 322.290588][T17533] CPU: 1 PID: 17533 Comm: syz-executor.5 Not tainted 5.1.0+ #4 [ 322.298260][T17533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.308636][T17533] Call Trace: [ 322.312041][T17533] dump_stack+0x172/0x1f0 [ 322.316387][T17533] dump_header+0x10f/0xb6c [ 322.320922][T17533] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 322.326850][T17533] ? ___ratelimit+0x60/0x595 [ 322.331478][T17533] ? do_raw_spin_unlock+0x57/0x270 [ 322.336803][T17533] oom_kill_process.cold+0x10/0x15 [ 322.342136][T17533] out_of_memory+0x79a/0x1280 [ 322.346844][T17533] ? lock_downgrade+0x880/0x880 [ 322.351716][T17533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 322.358051][T17533] ? oom_killer_disable+0x280/0x280 [ 322.363271][T17533] ? find_held_lock+0x35/0x130 [ 322.368059][T17533] mem_cgroup_out_of_memory+0x1ca/0x230 [ 322.373811][T17533] ? memcg_event_wake+0x230/0x230 [ 322.379256][T17533] ? do_raw_spin_unlock+0x57/0x270 [ 322.384572][T17533] ? _raw_spin_unlock+0x2d/0x50 [ 322.389796][T17533] try_charge+0x102c/0x15c0 [ 322.394318][T17533] ? find_held_lock+0x35/0x130 [ 322.400447][T17533] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 322.405992][T17533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 322.412248][T17533] ? kasan_check_read+0x11/0x20 [ 322.417217][T17533] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 322.422796][T17533] mem_cgroup_try_charge+0x24d/0x5e0 [ 322.428093][T17533] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 322.433745][T17533] __handle_mm_fault+0x1e1f/0x3ec0 [ 322.439049][T17533] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 322.444585][T17533] ? find_held_lock+0x35/0x130 [ 322.449363][T17533] ? handle_mm_fault+0x322/0xb30 [ 322.454293][T17533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 322.461078][T17533] ? kasan_check_read+0x11/0x20 [ 322.467488][T17533] handle_mm_fault+0x43f/0xb30 [ 322.472779][T17533] __do_page_fault+0x5ef/0xda0 [ 322.477715][T17533] do_page_fault+0x71/0x581 [ 322.482301][T17533] ? page_fault+0x8/0x30 [ 322.486557][T17533] page_fault+0x1e/0x30 [ 322.490725][T17533] RIP: 0033:0x4107bf [ 322.494646][T17533] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 322.514415][T17533] RSP: 002b:00007ffc90d649a0 EFLAGS: 00010206 [ 322.520481][T17533] RAX: 00007fbfc4626000 RBX: 0000000000020000 RCX: 0000000000458dfa [ 322.528859][T17533] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 322.536943][T17533] RBP: 00007ffc90d64a80 R08: ffffffffffffffff R09: 0000000000000000 [ 322.544930][T17533] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc90d64b70 [ 322.553467][T17533] R13: 00007fbfc4646700 R14: 0000000000000001 R15: 000000000073bfac [ 322.564830][T17533] memory: usage 12888kB, limit 0kB, failcnt 9 [ 322.571081][T17533] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 322.578812][T17533] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 322.586942][T17533] Memory cgroup stats for /syz5: cache:4012KB rss:4232KB rss_huge:4096KB shmem:3960KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:8312KB inactive_file:0KB active_file:4KB unevictable:0KB [ 322.609096][T17533] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=17533,uid=0 [ 322.609221][T17533] Memory cgroup out of memory: Killed process 17533 (syz-executor.5) total-vm:72580kB, anon-rss:4204kB, file-rss:34816kB, shmem-rss:0kB 11:05:15 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 322.719622][T11695] syz-executor.5 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 322.770233][T11695] CPU: 1 PID: 11695 Comm: syz-executor.5 Not tainted 5.1.0+ #4 [ 322.779586][T11695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.790295][T11695] Call Trace: [ 322.793785][T11695] dump_stack+0x172/0x1f0 [ 322.798146][T11695] dump_header+0x10f/0xb6c [ 322.802585][T11695] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 322.808767][T11695] ? ___ratelimit+0x60/0x595 [ 322.813632][T11695] ? do_raw_spin_unlock+0x57/0x270 [ 322.820075][T11695] oom_kill_process.cold+0x10/0x15 [ 322.825236][T11695] out_of_memory+0x79a/0x1280 [ 322.829937][T11695] ? lock_downgrade+0x880/0x880 [ 322.834808][T11695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 322.841074][T11695] ? oom_killer_disable+0x280/0x280 [ 322.846287][T11695] ? find_held_lock+0x35/0x130 [ 322.851342][T11695] mem_cgroup_out_of_memory+0x1ca/0x230 [ 322.856904][T11695] ? memcg_event_wake+0x230/0x230 [ 322.861962][T11695] ? do_raw_spin_unlock+0x57/0x270 [ 322.867106][T11695] ? _raw_spin_unlock+0x2d/0x50 [ 322.872250][T11695] try_charge+0x102c/0x15c0 [ 322.877524][T11695] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 322.883270][T11695] ? rcu_read_lock_sched_held+0x110/0x130 [ 322.889017][T11695] ? __alloc_pages_nodemask+0x61d/0x8d0 [ 322.894589][T11695] ? perf_trace_lock_acquire+0xf5/0x530 [ 322.900425][T11695] __memcg_kmem_charge_memcg+0x7c/0x130 [ 322.905996][T11695] ? memcg_kmem_put_cache+0xb0/0xb0 [ 322.911232][T11695] ? cache_grow_begin+0x594/0x860 [ 322.916278][T11695] ? lockdep_hardirqs_on+0x418/0x5d0 [ 322.921579][T11695] ? trace_hardirqs_on+0x67/0x230 [ 322.926711][T11695] cache_grow_begin+0x5c0/0x860 [ 322.931759][T11695] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 322.938508][T11695] ? __cpuset_node_allowed+0x136/0x540 [ 322.944139][T11695] fallback_alloc+0x1fd/0x2d0 [ 322.948845][T11695] ____cache_alloc_node+0x1be/0x1e0 [ 322.954062][T11695] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 322.960444][T11695] kmem_cache_alloc+0x1e8/0x6f0 [ 322.965715][T11695] ? inet_create+0x2f4/0xe10 [ 322.970510][T11695] sk_prot_alloc+0x67/0x2e0 [ 322.975036][T11695] ? lock_downgrade+0x880/0x880 [ 322.980005][T11695] sk_alloc+0x39/0xf70 [ 322.984097][T11695] inet_create+0x36a/0xe10 [ 322.988585][T11695] __sock_create+0x3e6/0x750 [ 322.993217][T11695] __sys_socket+0x103/0x220 [ 322.997830][T11695] ? move_addr_to_kernel+0x80/0x80 [ 323.002962][T11695] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 323.008523][T11695] ? do_syscall_64+0x26/0x670 [ 323.013566][T11695] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.019647][T11695] ? do_syscall_64+0x26/0x670 [ 323.024530][T11695] __x64_sys_socket+0x73/0xb0 [ 323.029245][T11695] do_syscall_64+0x103/0x670 [ 323.033870][T11695] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.039779][T11695] RIP: 0033:0x45b917 [ 323.043692][T11695] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.063656][T11695] RSP: 002b:00007ffc90d64558 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 323.072094][T11695] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045b917 [ 323.081737][T11695] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 323.092236][T11695] RBP: 000000000000029a R08: 0000000000000000 R09: 000000000000000a [ 323.100249][T11695] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 323.108244][T11695] R13: 00007ffc90d64c70 R14: 000000000004ea11 R15: 00007ffc90d64c80 [ 323.117222][T11695] memory: usage 8508kB, limit 0kB, failcnt 22 [ 323.134588][T11695] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 323.143733][T11695] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 323.150945][T11695] Memory cgroup stats for /syz5: cache:4012KB rss:68KB rss_huge:0KB shmem:3960KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4132KB inactive_file:4KB active_file:0KB unevictable:0KB [ 323.180409][T11695] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=11695,uid=0 [ 323.201924][T11695] Memory cgroup out of memory: Killed process 11695 (syz-executor.5) total-vm:72316kB, anon-rss:108kB, file-rss:35712kB, shmem-rss:0kB [ 323.232672][T17547] IPVS: ftp: loaded support on port[0] = 21 [ 323.246048][ T1042] oom_reaper: reaped process 11695 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 323.591567][T17524] chnl_net:caif_netlink_parms(): no params data found [ 323.689634][T14743] device bridge_slave_1 left promiscuous mode [ 323.696409][T14743] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.762921][T14743] device bridge_slave_0 left promiscuous mode [ 323.769174][T14743] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.404929][T14743] device hsr_slave_1 left promiscuous mode [ 325.475155][T14743] device hsr_slave_0 left promiscuous mode [ 325.547570][T14743] team0 (unregistering): Port device team_slave_1 removed [ 325.559948][T14743] team0 (unregistering): Port device team_slave_0 removed [ 325.571489][T14743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 325.629677][T14743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 325.719546][T14743] bond0 (unregistering): Released all slaves [ 325.918911][T17524] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.926607][T17524] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.934912][T17524] device bridge_slave_0 entered promiscuous mode [ 325.961566][T17524] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.968763][T17524] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.977168][T17524] device bridge_slave_1 entered promiscuous mode [ 325.997154][T17547] chnl_net:caif_netlink_parms(): no params data found [ 326.036767][T17524] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 326.061223][T17524] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 326.083758][T17547] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.090914][T17547] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.101506][T17547] device bridge_slave_0 entered promiscuous mode [ 326.115122][T17547] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.123003][T17547] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.130884][T17547] device bridge_slave_1 entered promiscuous mode [ 326.154716][T17524] team0: Port device team_slave_0 added [ 326.163616][T17547] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 326.174389][T17547] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 326.196157][T17524] team0: Port device team_slave_1 added [ 326.249158][T17547] team0: Port device team_slave_0 added [ 326.257090][T17547] team0: Port device team_slave_1 added [ 326.334161][T17547] device hsr_slave_0 entered promiscuous mode [ 326.382131][T17547] device hsr_slave_1 entered promiscuous mode [ 326.485081][T17524] device hsr_slave_0 entered promiscuous mode [ 326.642095][T17524] device hsr_slave_1 entered promiscuous mode [ 326.752889][T17547] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.759999][T17547] bridge0: port 2(bridge_slave_1) entered forwarding state [ 326.767478][T17547] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.774707][T17547] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.901020][T17524] 8021q: adding VLAN 0 to HW filter on device bond0 [ 326.919308][T17547] 8021q: adding VLAN 0 to HW filter on device bond0 [ 326.939574][ T7902] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 326.949263][ T7902] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.966792][ T7902] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.990192][T17547] 8021q: adding VLAN 0 to HW filter on device team0 [ 326.999240][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 327.009647][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 327.020377][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 327.028643][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 327.047381][T17524] 8021q: adding VLAN 0 to HW filter on device team0 [ 327.059991][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 327.071194][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 327.089259][ T3583] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.096444][ T3583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.105248][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 327.114539][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 327.123573][ T3583] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.130666][ T3583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.157050][ T7902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 327.166163][ T7902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 327.175453][ T7902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 327.185913][ T7902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 327.195240][ T7902] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.202456][ T7902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.210943][ T7902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 327.219883][ T7902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 327.228964][ T7902] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.236102][ T7902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.244412][ T7902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 327.253408][ T7902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 327.262733][ T7902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 327.285232][T17547] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 327.295786][T17547] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 327.311957][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 327.319954][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 327.328173][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 327.338637][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 327.347574][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 327.356528][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 327.365485][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 327.374239][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 327.383192][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 327.392963][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 327.401308][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 327.410420][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 327.418329][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 327.447136][T17524] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 327.457916][T17524] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 327.478722][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 327.488805][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 327.499793][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 327.517177][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 327.528450][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 327.539473][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 327.548370][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 327.569886][T17547] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 327.589625][T17524] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 327.862427][T17564] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 327.881955][T17564] CPU: 0 PID: 17564 Comm: syz-executor.2 Not tainted 5.1.0+ #4 [ 327.889537][T17564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.899607][T17564] Call Trace: [ 327.902924][T17564] dump_stack+0x172/0x1f0 [ 327.907290][T17564] dump_header+0x10f/0xb6c [ 327.911819][T17564] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 327.917645][T17564] ? ___ratelimit+0x60/0x595 [ 327.922265][T17564] ? do_raw_spin_unlock+0x57/0x270 [ 327.927403][T17564] oom_kill_process.cold+0x10/0x15 [ 327.932557][T17564] out_of_memory+0x79a/0x1280 [ 327.937254][T17564] ? lock_downgrade+0x880/0x880 [ 327.942133][T17564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.948398][T17564] ? oom_killer_disable+0x280/0x280 [ 327.953607][T17564] ? find_held_lock+0x35/0x130 [ 327.958399][T17564] mem_cgroup_out_of_memory+0x1ca/0x230 [ 327.964051][T17564] ? memcg_event_wake+0x230/0x230 [ 327.969103][T17564] ? do_raw_spin_unlock+0x57/0x270 [ 327.974232][T17564] ? _raw_spin_unlock+0x2d/0x50 [ 327.979096][T17564] try_charge+0x102c/0x15c0 [ 327.983607][T17564] ? find_held_lock+0x35/0x130 [ 327.988389][T17564] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 327.993959][T17564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.000228][T17564] ? kasan_check_read+0x11/0x20 [ 328.005103][T17564] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 328.010680][T17564] mem_cgroup_try_charge+0x24d/0x5e0 [ 328.015992][T17564] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 328.021648][T17564] __handle_mm_fault+0x1e1f/0x3ec0 [ 328.026787][T17564] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 328.032433][T17564] ? find_held_lock+0x35/0x130 [ 328.037206][T17564] ? handle_mm_fault+0x322/0xb30 [ 328.042173][T17564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.048432][T17564] ? kasan_check_read+0x11/0x20 [ 328.053336][T17564] handle_mm_fault+0x43f/0xb30 [ 328.058142][T17564] __do_page_fault+0x5ef/0xda0 [ 328.062928][T17564] do_page_fault+0x71/0x581 [ 328.067442][T17564] ? page_fault+0x8/0x30 [ 328.071701][T17564] page_fault+0x1e/0x30 [ 328.075879][T17564] RIP: 0033:0x4107bf [ 328.079779][T17564] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 328.099395][T17564] RSP: 002b:00007ffdca0e6790 EFLAGS: 00010206 [ 328.105471][T17564] RAX: 00007f72ccf8c000 RBX: 0000000000020000 RCX: 0000000000458dfa [ 328.113451][T17564] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 328.121435][T17564] RBP: 00007ffdca0e6870 R08: ffffffffffffffff R09: 0000000000000000 [ 328.129414][T17564] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdca0e6960 [ 328.137393][T17564] R13: 00007f72ccfac700 R14: 0000000000000001 R15: 000000000073bfac [ 328.149200][T17564] memory: usage 11172kB, limit 0kB, failcnt 28 [ 328.155716][T17564] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 328.163691][T17564] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 328.170635][T17564] Memory cgroup stats for /syz2: cache:1460KB rss:4208KB rss_huge:4096KB shmem:1188KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:520KB active_anon:5048KB inactive_file:0KB active_file:0KB unevictable:0KB [ 328.193003][T17564] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=17564,uid=0 [ 328.208938][T17564] Memory cgroup out of memory: Killed process 17564 (syz-executor.2) total-vm:72584kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 328.224550][ T1042] oom_reaper: reaped process 17564 (syz-executor.2), now anon-rss:0kB, file-rss:34876kB, shmem-rss:0kB 11:05:20 executing program 4: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x891d, &(0x7f0000000800)='nr0\x01:`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r1, r0, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 11:05:20 executing program 1: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x891d, &(0x7f0000000800)='nr0\x01:`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r1, r0, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 11:05:20 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 328.259842][T17524] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 328.292312][T17524] CPU: 1 PID: 17524 Comm: syz-executor.2 Not tainted 5.1.0+ #4 [ 328.299900][T17524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.309966][T17524] Call Trace: [ 328.313270][T17524] dump_stack+0x172/0x1f0 [ 328.317611][T17524] dump_header+0x10f/0xb6c [ 328.322053][T17524] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 328.327872][T17524] ? ___ratelimit+0x60/0x595 [ 328.332468][T17524] ? do_raw_spin_unlock+0x57/0x270 [ 328.337684][T17524] oom_kill_process.cold+0x10/0x15 [ 328.342813][T17524] out_of_memory+0x79a/0x1280 [ 328.347509][T17524] ? lock_downgrade+0x880/0x880 [ 328.352376][T17524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.358636][T17524] ? oom_killer_disable+0x280/0x280 [ 328.363847][T17524] ? find_held_lock+0x35/0x130 [ 328.368638][T17524] mem_cgroup_out_of_memory+0x1ca/0x230 [ 328.374204][T17524] ? memcg_event_wake+0x230/0x230 [ 328.379251][T17524] ? do_raw_spin_unlock+0x57/0x270 [ 328.384381][T17524] ? _raw_spin_unlock+0x2d/0x50 [ 328.389260][T17524] try_charge+0x102c/0x15c0 [ 328.393864][T17524] ? find_held_lock+0x35/0x130 [ 328.399333][T17524] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 328.404896][T17524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.411171][T17524] ? kasan_check_read+0x11/0x20 [ 328.416040][T17524] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 328.421591][T17524] mem_cgroup_try_charge+0x24d/0x5e0 [ 328.426901][T17524] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 328.432552][T17524] wp_page_copy+0x408/0x1740 [ 328.437149][T17524] ? find_held_lock+0x35/0x130 [ 328.441935][T17524] ? pmd_pfn+0x1d0/0x1d0 [ 328.446190][T17524] ? lock_downgrade+0x880/0x880 [ 328.451052][T17524] ? swp_swapcount+0x540/0x540 [ 328.455822][T17524] ? do_raw_spin_unlock+0x57/0x270 [ 328.460941][T17524] ? kasan_check_read+0x11/0x20 [ 328.465804][T17524] ? do_raw_spin_unlock+0x57/0x270 [ 328.470929][T17524] do_wp_page+0x48e/0x1500 [ 328.475389][T17524] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 328.480793][T17524] __handle_mm_fault+0x22e8/0x3ec0 [ 328.485924][T17524] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 328.491498][T17524] ? find_held_lock+0x35/0x130 [ 328.496276][T17524] ? handle_mm_fault+0x322/0xb30 [ 328.501255][T17524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.509053][T17524] ? kasan_check_read+0x11/0x20 [ 328.513923][T17524] handle_mm_fault+0x43f/0xb30 [ 328.518731][T17524] __do_page_fault+0x5ef/0xda0 [ 328.523516][T17524] do_page_fault+0x71/0x581 [ 328.528025][T17524] ? page_fault+0x8/0x30 [ 328.532277][T17524] page_fault+0x1e/0x30 [ 328.536535][T17524] RIP: 0033:0x42ff36 [ 328.540446][T17524] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 11:05:20 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) 11:05:20 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 328.560240][T17524] RSP: 002b:00007ffdca0e57a0 EFLAGS: 00010206 [ 328.566310][T17524] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 328.574370][T17524] RDX: 00000000014de930 RSI: 00000000014e6970 RDI: 0000000000000003 [ 328.582363][T17524] RBP: 0000000000008041 R08: 0000000000000001 R09: 00000000014dd940 [ 328.590334][T17524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 328.598573][T17524] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 328.662731][T17524] memory: usage 6780kB, limit 0kB, failcnt 37 [ 328.669048][T17524] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 328.688968][T17524] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 328.700826][T17524] Memory cgroup stats for /syz2: cache:1460KB rss:52KB rss_huge:0KB shmem:1188KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:520KB active_anon:876KB inactive_file:0KB active_file:0KB unevictable:0KB [ 328.740718][T17524] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=17524,uid=0 [ 328.758038][T17524] Memory cgroup out of memory: Killed process 17524 (syz-executor.2) total-vm:72320kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 328.773018][ T1042] oom_reaper: reaped process 17524 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 328.782276][T17569] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 328.801961][T17569] CPU: 1 PID: 17569 Comm: syz-executor.3 Not tainted 5.1.0+ #4 [ 328.809531][T17569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.819596][T17569] Call Trace: [ 328.822902][T17569] dump_stack+0x172/0x1f0 [ 328.827255][T17569] dump_header+0x10f/0xb6c [ 328.831685][T17569] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 328.837500][T17569] ? ___ratelimit+0x60/0x595 [ 328.842101][T17569] ? do_raw_spin_unlock+0x57/0x270 [ 328.847229][T17569] oom_kill_process.cold+0x10/0x15 [ 328.852361][T17569] out_of_memory+0x79a/0x1280 [ 328.857143][T17569] ? lock_downgrade+0x880/0x880 [ 328.862001][T17569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.868261][T17569] ? oom_killer_disable+0x280/0x280 [ 328.873472][T17569] ? find_held_lock+0x35/0x130 [ 328.878777][T17569] mem_cgroup_out_of_memory+0x1ca/0x230 [ 328.884340][T17569] ? memcg_event_wake+0x230/0x230 [ 328.889380][T17569] ? do_raw_spin_unlock+0x57/0x270 [ 328.894507][T17569] ? _raw_spin_unlock+0x2d/0x50 [ 328.899368][T17569] try_charge+0x102c/0x15c0 [ 328.903879][T17569] ? find_held_lock+0x35/0x130 [ 328.908657][T17569] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 328.914221][T17569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.920475][T17569] ? kasan_check_read+0x11/0x20 [ 328.925429][T17569] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 328.930989][T17569] mem_cgroup_try_charge+0x24d/0x5e0 [ 328.936288][T17569] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 328.941935][T17569] __handle_mm_fault+0x1e1f/0x3ec0 [ 328.947065][T17569] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 328.952617][T17569] ? find_held_lock+0x35/0x130 [ 328.957393][T17569] ? handle_mm_fault+0x322/0xb30 [ 328.962351][T17569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.968599][T17569] ? sync_mm_rss+0xa4/0x1c0 [ 328.973113][T17569] handle_mm_fault+0x43f/0xb30 [ 328.977893][T17569] __do_page_fault+0x5ef/0xda0 [ 328.982768][T17569] do_page_fault+0x71/0x581 [ 328.987276][T17569] ? page_fault+0x8/0x30 [ 328.991522][T17569] page_fault+0x1e/0x30 [ 328.995669][T17569] RIP: 0033:0x4107bf [ 328.999562][T17569] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 329.019413][T17569] RSP: 002b:00007fff259af6c0 EFLAGS: 00010206 [ 329.025477][T17569] RAX: 00007f731f5f9000 RBX: 0000000000020000 RCX: 0000000000458dfa [ 329.033465][T17569] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 329.041456][T17569] RBP: 00007fff259af7a0 R08: ffffffffffffffff R09: 0000000000000000 [ 329.049529][T17569] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff259af890 [ 329.057510][T17569] R13: 00007f731f619700 R14: 0000000000000001 R15: 000000000073bfac [ 329.065999][T17569] memory: usage 9672kB, limit 0kB, failcnt 8 [ 329.072111][T17569] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 329.079576][T17569] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 329.079585][T17569] Memory cgroup stats for /syz3: cache:68KB rss:4324KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4236KB inactive_file:4KB active_file:4KB unevictable:0KB 11:05:21 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 329.079687][T17569] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=17569,uid=0 [ 329.108194][T17569] Memory cgroup out of memory: Killed process 17569 (syz-executor.3) total-vm:72580kB, anon-rss:4240kB, file-rss:35784kB, shmem-rss:0kB [ 329.140717][ T1042] oom_reaper: reaped process 17569 (syz-executor.3), now anon-rss:0kB, file-rss:34888kB, shmem-rss:0kB 11:05:21 executing program 0: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x891d, &(0x7f0000000800)='nr0\x01:`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r1, r0, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) [ 329.200727][ T7906] syz-executor.3 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 329.229749][ T7906] CPU: 1 PID: 7906 Comm: syz-executor.3 Not tainted 5.1.0+ #4 [ 329.237251][ T7906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.247314][ T7906] Call Trace: [ 329.250616][ T7906] dump_stack+0x172/0x1f0 [ 329.254961][ T7906] dump_header+0x10f/0xb6c [ 329.259397][ T7906] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 329.265539][ T7906] ? ___ratelimit+0x60/0x595 [ 329.270140][ T7906] ? do_raw_spin_unlock+0x57/0x270 [ 329.275359][ T7906] oom_kill_process.cold+0x10/0x15 [ 329.280486][ T7906] out_of_memory+0x79a/0x1280 [ 329.285177][ T7906] ? lock_downgrade+0x880/0x880 [ 329.290037][ T7906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.296383][ T7906] ? oom_killer_disable+0x280/0x280 [ 329.301584][ T7906] ? find_held_lock+0x35/0x130 [ 329.306396][ T7906] mem_cgroup_out_of_memory+0x1ca/0x230 [ 329.311955][ T7906] ? memcg_event_wake+0x230/0x230 [ 329.317013][ T7906] ? do_raw_spin_unlock+0x57/0x270 [ 329.322132][ T7906] ? _raw_spin_unlock+0x2d/0x50 [ 329.326997][ T7906] try_charge+0x102c/0x15c0 [ 329.331507][ T7906] ? find_held_lock+0x35/0x130 [ 329.336375][ T7906] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 329.341930][ T7906] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 329.347572][ T7906] ? find_held_lock+0x35/0x130 [ 329.352349][ T7906] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 329.367398][ T7906] __memcg_kmem_charge_memcg+0x7c/0x130 [ 329.373497][ T7906] ? memcg_kmem_put_cache+0xb0/0xb0 [ 329.379075][ T7906] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 329.384649][ T7906] __memcg_kmem_charge+0x136/0x300 [ 329.389875][ T7906] __alloc_pages_nodemask+0x4bf/0x8d0 [ 329.395259][ T7906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.401521][ T7906] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 329.407266][ T7906] ? copy_process.part.0+0x43eb/0x6710 [ 329.412748][ T7906] ? lockdep_hardirqs_on+0x418/0x5d0 [ 329.418052][ T7906] ? trace_hardirqs_on+0x67/0x230 [ 329.423099][ T7906] ? kasan_check_read+0x11/0x20 [ 329.428164][ T7906] copy_process.part.0+0x4a0/0x6710 [ 329.433383][ T7906] ? __might_fault+0x12b/0x1e0 [ 329.438173][ T7906] ? __cleanup_sighand+0x60/0x60 [ 329.443225][ T7906] ? lock_downgrade+0x880/0x880 [ 329.448108][ T7906] _do_fork+0x25d/0xfd0 [ 329.452387][ T7906] ? copy_init_mm+0x20/0x20 [ 329.456916][ T7906] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 329.462385][ T7906] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 329.467853][ T7906] ? do_syscall_64+0x26/0x670 [ 329.472544][ T7906] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.478628][ T7906] ? do_syscall_64+0x26/0x670 [ 329.483326][ T7906] __x64_sys_clone+0xbf/0x150 [ 329.488021][ T7906] do_syscall_64+0x103/0x670 [ 329.492631][ T7906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.498535][ T7906] RIP: 0033:0x45737a [ 329.502556][ T7906] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 329.522150][ T7906] RSP: 002b:00007fff259af910 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 329.530552][ T7906] RAX: ffffffffffffffda RBX: 00007fff259af910 RCX: 000000000045737a [ 329.538512][ T7906] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 329.546473][ T7906] RBP: 00007fff259af950 R08: 0000000000000001 R09: 0000000000f7a940 [ 329.555249][ T7906] R10: 0000000000f7ac10 R11: 0000000000000246 R12: 0000000000000001 [ 329.563251][ T7906] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff259af9a0 [ 329.574389][ T7906] memory: usage 5284kB, limit 0kB, failcnt 17 [ 329.581783][ T7906] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 329.589356][ T7906] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 329.596505][ T7906] Memory cgroup stats for /syz3: cache:68KB rss:156KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:52KB inactive_file:4KB active_file:4KB unevictable:0KB [ 329.617388][ T7906] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=7906,uid=0 [ 329.632870][ T7906] Memory cgroup out of memory: Killed process 7906 (syz-executor.3) total-vm:72316kB, anon-rss:100kB, file-rss:35712kB, shmem-rss:0kB [ 329.633646][ T1042] oom_reaper: reaped process 7906 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 11:05:22 executing program 1: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) 11:05:22 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 330.189680][T17590] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 330.226654][T17590] CPU: 1 PID: 17590 Comm: syz-executor.4 Not tainted 5.1.0+ #4 [ 330.234250][T17590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.244306][T17590] Call Trace: [ 330.247619][T17590] dump_stack+0x172/0x1f0 [ 330.251960][T17590] dump_header+0x10f/0xb6c [ 330.256386][T17590] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 330.262249][T17590] ? ___ratelimit+0x60/0x595 [ 330.266935][T17590] ? do_raw_spin_unlock+0x57/0x270 [ 330.272093][T17590] oom_kill_process.cold+0x10/0x15 [ 330.277238][T17590] out_of_memory+0x79a/0x1280 [ 330.281935][T17590] ? lock_downgrade+0x880/0x880 [ 330.286801][T17590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.293060][T17590] ? oom_killer_disable+0x280/0x280 [ 330.298446][T17590] ? find_held_lock+0x35/0x130 [ 330.303236][T17590] mem_cgroup_out_of_memory+0x1ca/0x230 [ 330.308789][T17590] ? memcg_event_wake+0x230/0x230 [ 330.313817][T17590] ? do_raw_spin_unlock+0x57/0x270 [ 330.318912][T17590] ? _raw_spin_unlock+0x2d/0x50 [ 330.323748][T17590] try_charge+0x102c/0x15c0 [ 330.328313][T17590] ? find_held_lock+0x35/0x130 [ 330.333081][T17590] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 330.338615][T17590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.344847][T17590] ? kasan_check_read+0x11/0x20 [ 330.349691][T17590] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 330.355332][T17590] mem_cgroup_try_charge+0x24d/0x5e0 [ 330.360608][T17590] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 330.366262][T17590] __handle_mm_fault+0x1e1f/0x3ec0 [ 330.371368][T17590] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 330.376919][T17590] ? find_held_lock+0x35/0x130 [ 330.381672][T17590] ? handle_mm_fault+0x322/0xb30 [ 330.386608][T17590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.393100][T17590] ? kasan_check_read+0x11/0x20 [ 330.398780][T17590] handle_mm_fault+0x43f/0xb30 [ 330.403539][T17590] __do_page_fault+0x5ef/0xda0 [ 330.408292][T17590] do_page_fault+0x71/0x581 [ 330.412780][T17590] ? page_fault+0x8/0x30 [ 330.417006][T17590] page_fault+0x1e/0x30 [ 330.421139][T17590] RIP: 0033:0x4107bf [ 330.425024][T17590] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 330.452237][T17590] RSP: 002b:00007ffc7600e960 EFLAGS: 00010206 [ 330.458312][T17590] RAX: 00007f2558058000 RBX: 0000000000020000 RCX: 0000000000458dfa [ 330.466295][T17590] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 330.474357][T17590] RBP: 00007ffc7600ea40 R08: ffffffffffffffff R09: 0000000000000000 [ 330.482337][T17590] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc7600eb30 [ 330.490386][T17590] R13: 00007f2558078700 R14: 0000000000000001 R15: 000000000073bfac [ 330.499591][T17590] memory: usage 9680kB, limit 0kB, failcnt 8 [ 330.505806][T17590] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 330.514964][T17590] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 330.521992][T17590] Memory cgroup stats for /syz4: cache:20KB rss:4228KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4228KB inactive_file:0KB active_file:0KB unevictable:0KB [ 330.543334][T17590] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=17590,uid=0 [ 330.559027][T17590] Memory cgroup out of memory: Killed process 17590 (syz-executor.4) total-vm:72580kB, anon-rss:4192kB, file-rss:34816kB, shmem-rss:0kB [ 330.575115][ T1042] oom_reaper: reaped process 17590 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB [ 330.587388][T17587] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 330.599369][T17587] CPU: 0 PID: 17587 Comm: syz-executor.1 Not tainted 5.1.0+ #4 [ 330.606940][T17587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.606946][T17587] Call Trace: [ 330.606969][T17587] dump_stack+0x172/0x1f0 [ 330.606989][T17587] dump_header+0x10f/0xb6c [ 330.607007][T17587] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 330.607022][T17587] ? ___ratelimit+0x60/0x595 [ 330.607036][T17587] ? do_raw_spin_unlock+0x57/0x270 [ 330.607054][T17587] oom_kill_process.cold+0x10/0x15 [ 330.607074][T17587] out_of_memory+0x79a/0x1280 [ 330.628129][T17585] IPVS: ftp: loaded support on port[0] = 21 [ 330.629167][T17587] ? oom_killer_disable+0x280/0x280 [ 330.649785][T17587] ? find_held_lock+0x35/0x130 [ 330.649806][T17587] mem_cgroup_out_of_memory+0x1ca/0x230 [ 330.649818][T17587] ? memcg_event_wake+0x230/0x230 [ 330.649835][T17587] ? do_raw_spin_unlock+0x57/0x270 [ 330.649850][T17587] ? _raw_spin_unlock+0x2d/0x50 11:05:23 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 330.660698][T17587] try_charge+0x102c/0x15c0 [ 330.660721][T17587] ? find_held_lock+0x35/0x130 [ 330.660744][T17587] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 330.670700][T17587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.670729][T17587] ? kasan_check_read+0x11/0x20 [ 330.670752][T17587] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 330.681693][T17587] mem_cgroup_try_charge+0x24d/0x5e0 [ 330.681725][T17587] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 330.681746][T17587] __handle_mm_fault+0x1e1f/0x3ec0 [ 330.681768][T17587] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 330.681782][T17587] ? find_held_lock+0x35/0x130 [ 330.681796][T17587] ? handle_mm_fault+0x322/0xb30 [ 330.681821][T17587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.681839][T17587] ? kasan_check_read+0x11/0x20 [ 330.681858][T17587] handle_mm_fault+0x43f/0xb30 [ 330.681877][T17587] __do_page_fault+0x5ef/0xda0 [ 330.681896][T17587] do_page_fault+0x71/0x581 [ 330.681911][T17587] ? page_fault+0x8/0x30 [ 330.681926][T17587] page_fault+0x1e/0x30 [ 330.681938][T17587] RIP: 0033:0x4107bf [ 330.681951][T17587] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 330.681959][T17587] RSP: 002b:00007ffc3c9b7040 EFLAGS: 00010206 [ 330.681971][T17587] RAX: 00007f6371fb8000 RBX: 0000000000020000 RCX: 0000000000458dfa [ 330.681980][T17587] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 330.681989][T17587] RBP: 00007ffc3c9b7120 R08: ffffffffffffffff R09: 0000000000000000 11:05:23 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 330.681998][T17587] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc3c9b7210 [ 330.682006][T17587] R13: 00007f6371fd8700 R14: 0000000000000001 R15: 000000000073bfac [ 330.689734][T17587] memory: usage 9532kB, limit 0kB, failcnt 8 [ 330.697209][T17587] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 330.726193][T17587] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 11:05:23 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) 11:05:23 executing program 1: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 330.768725][T17587] Memory cgroup stats for /syz1: cache:32KB rss:4340KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4240KB inactive_file:4KB active_file:0KB unevictable:0KB [ 330.795229][T17587] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=17587,uid=0 [ 330.858127][T17587] Memory cgroup out of memory: Killed process 17587 (syz-executor.1) total-vm:72580kB, anon-rss:4196kB, file-rss:34816kB, shmem-rss:0kB [ 330.900128][ T7909] syz-executor.4 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 330.977810][ T7909] CPU: 0 PID: 7909 Comm: syz-executor.4 Not tainted 5.1.0+ #4 [ 330.985413][ T7909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.995484][ T7909] Call Trace: [ 330.998796][ T7909] dump_stack+0x172/0x1f0 [ 331.003319][ T7909] dump_header+0x10f/0xb6c [ 331.007936][ T7909] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 331.013759][ T7909] ? ___ratelimit+0x60/0x595 [ 331.013775][ T7909] ? do_raw_spin_unlock+0x57/0x270 [ 331.013793][ T7909] oom_kill_process.cold+0x10/0x15 [ 331.013809][ T7909] out_of_memory+0x79a/0x1280 [ 331.013824][ T7909] ? lock_downgrade+0x880/0x880 [ 331.013838][ T7909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 331.013853][ T7909] ? oom_killer_disable+0x280/0x280 [ 331.013865][ T7909] ? find_held_lock+0x35/0x130 [ 331.013888][ T7909] mem_cgroup_out_of_memory+0x1ca/0x230 [ 331.013910][ T7909] ? memcg_event_wake+0x230/0x230 [ 331.023641][ T7909] ? do_raw_spin_unlock+0x57/0x270 [ 331.033599][ T7909] ? _raw_spin_unlock+0x2d/0x50 [ 331.033619][ T7909] try_charge+0x102c/0x15c0 [ 331.033632][ T7909] ? find_held_lock+0x35/0x130 [ 331.033652][ T7909] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 331.033666][ T7909] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 331.033679][ T7909] ? find_held_lock+0x35/0x130 [ 331.033694][ T7909] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 331.033728][ T7909] __memcg_kmem_charge_memcg+0x7c/0x130 [ 331.033750][ T7909] ? memcg_kmem_put_cache+0xb0/0xb0 [ 331.044836][ T7909] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 331.044856][ T7909] __memcg_kmem_charge+0x136/0x300 [ 331.044877][ T7909] __alloc_pages_nodemask+0x4bf/0x8d0 [ 331.044891][ T7909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 331.044909][ T7909] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 331.044924][ T7909] ? copy_process.part.0+0x43eb/0x6710 [ 331.044941][ T7909] ? lockdep_hardirqs_on+0x418/0x5d0 [ 331.044964][ T7909] ? trace_hardirqs_on+0x67/0x230 [ 331.162751][ T7909] ? kasan_check_read+0x11/0x20 [ 331.167790][ T7909] copy_process.part.0+0x4a0/0x6710 [ 331.172985][ T7909] ? __might_fault+0x12b/0x1e0 [ 331.177862][ T7909] ? __cleanup_sighand+0x60/0x60 [ 331.182881][ T7909] ? lock_downgrade+0x880/0x880 [ 331.187738][ T7909] _do_fork+0x25d/0xfd0 [ 331.191885][ T7909] ? copy_init_mm+0x20/0x20 [ 331.196379][ T7909] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 331.201831][ T7909] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 331.207289][ T7909] ? do_syscall_64+0x26/0x670 [ 331.211978][ T7909] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.218042][ T7909] ? do_syscall_64+0x26/0x670 [ 331.222725][ T7909] __x64_sys_clone+0xbf/0x150 [ 331.227394][ T7909] do_syscall_64+0x103/0x670 [ 331.231975][ T7909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.237857][ T7909] RIP: 0033:0x45737a [ 331.241745][ T7909] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 331.261367][ T7909] RSP: 002b:00007ffc7600ebb0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 331.269769][ T7909] RAX: ffffffffffffffda RBX: 00007ffc7600ebb0 RCX: 000000000045737a [ 331.277755][ T7909] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 331.285744][ T7909] RBP: 00007ffc7600ebf0 R08: 0000000000000001 R09: 0000000002955940 [ 331.293714][ T7909] R10: 0000000002955c10 R11: 0000000000000246 R12: 0000000000000001 [ 331.301861][ T7909] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffc7600ec40 [ 331.311312][ T7909] memory: usage 5228kB, limit 0kB, failcnt 17 [ 331.320602][ T7909] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 331.337539][ T7909] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 331.352450][ T7909] Memory cgroup stats for /syz4: cache:20KB rss:60KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:44KB inactive_file:0KB active_file:0KB unevictable:0KB [ 331.381932][ T7909] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=7909,uid=0 [ 331.404419][ T7909] Memory cgroup out of memory: Killed process 7909 (syz-executor.4) total-vm:72316kB, anon-rss:96kB, file-rss:35712kB, shmem-rss:0kB [ 331.426707][ T1042] oom_reaper: reaped process 7909 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 331.440216][ T7899] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 331.468126][ T7899] CPU: 1 PID: 7899 Comm: syz-executor.1 Not tainted 5.1.0+ #4 [ 331.475620][ T7899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.485689][ T7899] Call Trace: [ 331.488990][ T7899] dump_stack+0x172/0x1f0 [ 331.493334][ T7899] dump_header+0x10f/0xb6c [ 331.497793][ T7899] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 331.503597][ T7899] ? ___ratelimit+0x60/0x595 [ 331.508166][ T7899] ? do_raw_spin_unlock+0x57/0x270 [ 331.513262][ T7899] oom_kill_process.cold+0x10/0x15 [ 331.518392][ T7899] out_of_memory+0x79a/0x1280 [ 331.523054][ T7899] ? oom_killer_disable+0x280/0x280 [ 331.528263][ T7899] ? find_held_lock+0x35/0x130 [ 331.533015][ T7899] mem_cgroup_out_of_memory+0x1ca/0x230 [ 331.538541][ T7899] ? memcg_event_wake+0x230/0x230 [ 331.543551][ T7899] ? do_raw_spin_unlock+0x57/0x270 [ 331.548666][ T7899] ? _raw_spin_unlock+0x2d/0x50 [ 331.553520][ T7899] try_charge+0x102c/0x15c0 [ 331.558003][ T7899] ? find_held_lock+0x35/0x130 [ 331.562749][ T7899] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 331.568273][ T7899] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 331.573805][ T7899] ? find_held_lock+0x35/0x130 [ 331.578551][ T7899] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 331.584081][ T7899] __memcg_kmem_charge_memcg+0x7c/0x130 [ 331.589603][ T7899] ? memcg_kmem_put_cache+0xb0/0xb0 [ 331.594896][ T7899] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 331.600424][ T7899] __memcg_kmem_charge+0x136/0x300 [ 331.605677][ T7899] __alloc_pages_nodemask+0x4bf/0x8d0 [ 331.611033][ T7899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 331.617593][ T7899] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 331.623297][ T7899] ? copy_process.part.0+0x43eb/0x6710 [ 331.628759][ T7899] ? lockdep_hardirqs_on+0x418/0x5d0 [ 331.634921][ T7899] ? trace_hardirqs_on+0x67/0x230 [ 331.639959][ T7899] ? kasan_check_read+0x11/0x20 [ 331.644808][ T7899] copy_process.part.0+0x4a0/0x6710 [ 331.650001][ T7899] ? __might_fault+0x12b/0x1e0 [ 331.654801][ T7899] ? __cleanup_sighand+0x60/0x60 [ 331.659749][ T7899] ? lock_downgrade+0x880/0x880 [ 331.664594][ T7899] _do_fork+0x25d/0xfd0 [ 331.668738][ T7899] ? copy_init_mm+0x20/0x20 [ 331.673240][ T7899] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 331.678701][ T7899] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 331.684147][ T7899] ? do_syscall_64+0x26/0x670 [ 331.689255][ T7899] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.695304][ T7899] ? do_syscall_64+0x26/0x670 [ 331.699969][ T7899] __x64_sys_clone+0xbf/0x150 [ 331.704634][ T7899] do_syscall_64+0x103/0x670 [ 331.709241][ T7899] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.715146][ T7899] RIP: 0033:0x45737a [ 331.719046][ T7899] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 331.738660][ T7899] RSP: 002b:00007ffc3c9b7290 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 331.747230][ T7899] RAX: ffffffffffffffda RBX: 00007ffc3c9b7290 RCX: 000000000045737a [ 331.755201][ T7899] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 331.763169][ T7899] RBP: 00007ffc3c9b72d0 R08: 0000000000000001 R09: 000000000123e940 [ 331.771141][ T7899] R10: 000000000123ec10 R11: 0000000000000246 R12: 0000000000000001 [ 331.779099][ T7899] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffc3c9b7320 [ 331.791818][ T7899] memory: usage 5144kB, limit 0kB, failcnt 17 [ 331.797925][ T7899] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 331.797935][ T7899] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 331.797942][ T7899] Memory cgroup stats for /syz1: cache:32KB rss:176KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:56KB inactive_file:0KB active_file:4KB unevictable:0KB 11:05:24 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 331.814356][ T7899] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=7899,uid=0 [ 331.849291][ T7899] Memory cgroup out of memory: Killed process 7899 (syz-executor.1) total-vm:72316kB, anon-rss:100kB, file-rss:35712kB, shmem-rss:0kB [ 331.864541][ T1042] oom_reaper: reaped process 7899 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 11:05:24 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 332.337610][T17595] IPVS: ftp: loaded support on port[0] = 21 [ 332.897728][T17585] chnl_net:caif_netlink_parms(): no params data found [ 333.263338][T17599] IPVS: ftp: loaded support on port[0] = 21 [ 333.281797][T17595] chnl_net:caif_netlink_parms(): no params data found [ 333.303741][T17585] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.310839][T17585] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.319481][T17585] device bridge_slave_0 entered promiscuous mode [ 333.331299][T17585] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.338493][T17585] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.347436][T17585] device bridge_slave_1 entered promiscuous mode [ 333.370047][T14743] device bridge_slave_1 left promiscuous mode [ 333.379932][T14743] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.422463][T14743] device bridge_slave_0 left promiscuous mode [ 333.428871][T14743] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.473840][T14743] device bridge_slave_1 left promiscuous mode [ 333.481123][T14743] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.533606][T14743] device bridge_slave_0 left promiscuous mode [ 333.539970][T14743] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.975082][T14743] device hsr_slave_1 left promiscuous mode [ 337.018252][T14743] device hsr_slave_0 left promiscuous mode [ 337.057976][T14743] team0 (unregistering): Port device team_slave_1 removed [ 337.070143][T14743] team0 (unregistering): Port device team_slave_0 removed [ 337.082268][T14743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 337.109691][T14743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 337.209226][T14743] bond0 (unregistering): Released all slaves [ 337.375566][T14743] device hsr_slave_1 left promiscuous mode [ 337.425416][T14743] device hsr_slave_0 left promiscuous mode [ 337.477935][T14743] team0 (unregistering): Port device team_slave_1 removed [ 337.489963][T14743] team0 (unregistering): Port device team_slave_0 removed [ 337.503603][T14743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 337.555815][T14743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 337.652978][T14743] bond0 (unregistering): Released all slaves [ 337.769012][T17595] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.776328][T17595] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.784504][T17595] device bridge_slave_0 entered promiscuous mode [ 337.799455][T17585] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 337.808091][T17595] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.815793][T17595] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.824075][T17595] device bridge_slave_1 entered promiscuous mode [ 337.836474][T17585] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 337.881315][T17595] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 337.900348][T17585] team0: Port device team_slave_0 added [ 337.909942][T17585] team0: Port device team_slave_1 added [ 337.917637][T17595] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 337.965925][T17595] team0: Port device team_slave_0 added [ 337.979083][T17595] team0: Port device team_slave_1 added [ 338.024573][T17585] device hsr_slave_0 entered promiscuous mode [ 338.082027][T17585] device hsr_slave_1 entered promiscuous mode [ 338.254815][T17595] device hsr_slave_0 entered promiscuous mode [ 338.302160][T17595] device hsr_slave_1 entered promiscuous mode [ 338.393927][T17599] chnl_net:caif_netlink_parms(): no params data found [ 338.445124][T17595] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.452275][T17595] bridge0: port 2(bridge_slave_1) entered forwarding state [ 338.606734][T17599] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.614045][T17599] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.622295][T17599] device bridge_slave_0 entered promiscuous mode [ 338.630584][T17599] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.639809][T17599] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.648549][T17599] device bridge_slave_1 entered promiscuous mode [ 338.676509][T17585] 8021q: adding VLAN 0 to HW filter on device bond0 [ 338.730406][T17585] 8021q: adding VLAN 0 to HW filter on device team0 [ 338.740878][ T7925] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.749679][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 338.767653][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 338.775735][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 338.796495][T17595] 8021q: adding VLAN 0 to HW filter on device bond0 [ 338.810308][T17599] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 338.833844][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 338.851543][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 338.860600][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.879071][ T7925] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.886329][ T7925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 338.914914][T17595] 8021q: adding VLAN 0 to HW filter on device team0 [ 338.934178][T17599] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 338.944276][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 338.962727][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 338.970628][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 338.988028][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 339.000922][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 339.017639][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.024892][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 339.033172][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 339.043780][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 339.083139][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 339.097976][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 339.107329][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 339.118183][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 339.127802][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 339.137183][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 339.146488][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 339.162405][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 339.171061][ T7925] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.178749][ T7925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 339.191375][T17585] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 339.204913][T17585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 339.224281][T17599] team0: Port device team_slave_0 added [ 339.232400][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 339.243147][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 339.263606][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 339.275779][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 339.297422][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 339.306415][ T2989] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.313772][ T2989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 339.324437][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 339.341166][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 339.365503][T17585] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 339.383809][T17599] team0: Port device team_slave_1 added [ 339.390705][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 339.406223][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 339.439278][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 339.450024][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 339.460483][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 339.478863][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 339.491304][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 339.509846][T17595] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 339.527660][T17595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 339.595057][T17599] device hsr_slave_0 entered promiscuous mode [ 339.662224][T17599] device hsr_slave_1 entered promiscuous mode [ 339.731768][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 339.740729][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 339.778009][T17595] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 339.879001][T17599] 8021q: adding VLAN 0 to HW filter on device bond0 [ 339.924124][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 339.969214][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 340.007627][T17599] 8021q: adding VLAN 0 to HW filter on device team0 [ 340.053689][T17615] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 340.059771][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 340.078624][T17615] CPU: 1 PID: 17615 Comm: syz-executor.2 Not tainted 5.1.0+ #4 [ 340.086295][T17615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.096365][T17615] Call Trace: [ 340.099689][T17615] dump_stack+0x172/0x1f0 [ 340.104039][T17615] dump_header+0x10f/0xb6c [ 340.108847][T17615] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 340.112718][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 340.114756][T17615] ? ___ratelimit+0x60/0x595 [ 340.124881][ T7925] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.128308][T17615] ? do_raw_spin_unlock+0x57/0x270 [ 340.135452][ T7925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.140522][T17615] oom_kill_process.cold+0x10/0x15 [ 340.152831][T17615] out_of_memory+0x79a/0x1280 [ 340.157554][T17615] ? lock_downgrade+0x880/0x880 [ 340.162080][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 340.162423][T17615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 340.170479][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 340.176043][T17615] ? oom_killer_disable+0x280/0x280 [ 340.176056][T17615] ? find_held_lock+0x35/0x130 [ 340.176078][T17615] mem_cgroup_out_of_memory+0x1ca/0x230 [ 340.176092][T17615] ? memcg_event_wake+0x230/0x230 [ 340.176111][T17615] ? do_raw_spin_unlock+0x57/0x270 [ 340.176130][T17615] ? _raw_spin_unlock+0x2d/0x50 [ 340.176148][T17615] try_charge+0x102c/0x15c0 [ 340.176171][T17615] ? find_held_lock+0x35/0x130 [ 340.186293][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 340.189646][T17615] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 340.196026][ T7925] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.200064][T17615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 340.205194][ T7925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.210222][T17615] ? kasan_check_read+0x11/0x20 [ 340.219537][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 340.219638][T17615] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 340.225400][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 340.232390][T17615] mem_cgroup_try_charge+0x24d/0x5e0 [ 340.232412][T17615] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 340.232431][T17615] __handle_mm_fault+0x1e1f/0x3ec0 [ 340.232451][T17615] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 340.232466][T17615] ? find_held_lock+0x35/0x130 [ 340.232482][T17615] ? handle_mm_fault+0x322/0xb30 [ 340.232509][T17615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 340.241108][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 340.245094][T17615] ? kasan_check_read+0x11/0x20 [ 340.245116][T17615] handle_mm_fault+0x43f/0xb30 [ 340.245136][T17615] __do_page_fault+0x5ef/0xda0 [ 340.245158][T17615] do_page_fault+0x71/0x581 [ 340.254132][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 340.258617][T17615] ? page_fault+0x8/0x30 [ 340.274867][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 340.277262][T17615] page_fault+0x1e/0x30 [ 340.287539][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 340.290709][T17615] RIP: 0033:0x4107bf [ 340.298244][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 340.301621][T17615] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 340.301630][T17615] RSP: 002b:00007fff2ad5fdc0 EFLAGS: 00010206 [ 340.301642][T17615] RAX: 00007f595670f000 RBX: 0000000000020000 RCX: 0000000000458dfa [ 340.301650][T17615] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 340.301658][T17615] RBP: 00007fff2ad5fea0 R08: ffffffffffffffff R09: 0000000000000000 [ 340.301676][T17615] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff2ad5ff90 [ 340.301685][T17615] R13: 00007f595672f700 R14: 0000000000000001 R15: 000000000073bfac [ 340.419307][T17615] memory: usage 10628kB, limit 0kB, failcnt 46 [ 340.443168][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 340.478825][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 340.493384][T17615] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 340.496857][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 340.509797][T17615] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 340.518968][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 340.523624][T17615] Memory cgroup stats for /syz2: cache:1460KB rss:4232KB rss_huge:4096KB shmem:1188KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:520KB active_anon:5048KB inactive_file:0KB active_file:0KB unevictable:0KB [ 340.533847][T17599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 340.560575][T17615] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=17615,uid=0 [ 340.600299][T17615] Memory cgroup out of memory: Killed process 17615 (syz-executor.2) total-vm:72584kB, anon-rss:4180kB, file-rss:34816kB, shmem-rss:0kB [ 340.608510][T17599] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 340.626555][ T1042] oom_reaper: reaped process 17615 (syz-executor.2), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB [ 340.638765][T17610] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 340.670545][T17610] CPU: 1 PID: 17610 Comm: syz-executor.5 Not tainted 5.1.0+ #4 [ 340.678133][T17610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.688213][T17610] Call Trace: [ 340.691552][T17610] dump_stack+0x172/0x1f0 [ 340.695934][T17610] dump_header+0x10f/0xb6c [ 340.700371][T17610] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 340.706190][T17610] ? ___ratelimit+0x60/0x595 [ 340.710799][T17610] ? do_raw_spin_unlock+0x57/0x270 [ 340.715936][T17610] oom_kill_process.cold+0x10/0x15 [ 340.721067][T17610] out_of_memory+0x79a/0x1280 [ 340.725789][T17610] ? oom_killer_disable+0x280/0x280 [ 340.731087][T17610] ? find_held_lock+0x35/0x130 [ 340.736050][T17610] mem_cgroup_out_of_memory+0x1ca/0x230 [ 340.741612][T17610] ? memcg_event_wake+0x230/0x230 [ 340.746756][T17610] ? do_raw_spin_unlock+0x57/0x270 [ 340.751879][T17610] ? _raw_spin_unlock+0x2d/0x50 [ 340.756835][T17610] try_charge+0x102c/0x15c0 [ 340.761347][T17610] ? find_held_lock+0x35/0x130 [ 340.766125][T17610] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 340.771692][T17610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 340.777953][T17610] ? kasan_check_read+0x11/0x20 [ 340.782821][T17610] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 340.788391][T17610] mem_cgroup_try_charge+0x24d/0x5e0 [ 340.793711][T17610] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 340.799466][T17610] __handle_mm_fault+0x1e1f/0x3ec0 [ 340.804605][T17610] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 340.810522][T17610] ? find_held_lock+0x35/0x130 [ 340.815499][T17610] ? handle_mm_fault+0x322/0xb30 [ 340.820470][T17610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 340.828046][T17610] ? kasan_check_read+0x11/0x20 [ 340.832930][T17610] handle_mm_fault+0x43f/0xb30 [ 340.837720][T17610] __do_page_fault+0x5ef/0xda0 [ 340.842515][T17610] do_page_fault+0x71/0x581 [ 340.847041][T17610] ? page_fault+0x8/0x30 [ 340.851311][T17610] page_fault+0x1e/0x30 [ 340.855488][T17610] RIP: 0033:0x4107bf [ 340.859397][T17610] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 340.879035][T17610] RSP: 002b:00007ffea67eea00 EFLAGS: 00010206 [ 340.885115][T17610] RAX: 00007f2ac3880000 RBX: 0000000000020000 RCX: 0000000000458dfa [ 340.893192][T17610] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 340.901188][T17610] RBP: 00007ffea67eeae0 R08: ffffffffffffffff R09: 0000000000000000 [ 340.909169][T17610] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffea67eebd0 [ 340.917162][T17610] R13: 00007f2ac38a0700 R14: 0000000000000001 R15: 000000000073bfac [ 340.927604][T17610] memory: usage 12324kB, limit 0kB, failcnt 31 [ 340.933968][T17610] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 340.942325][T17610] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 340.949283][T17610] Memory cgroup stats for /syz5: cache:4012KB rss:4204KB rss_huge:4096KB shmem:3960KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:8272KB inactive_file:4KB active_file:0KB unevictable:0KB [ 341.005364][T17610] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=17610,uid=0 [ 341.042601][T17610] Memory cgroup out of memory: Killed process 17610 (syz-executor.5) total-vm:72584kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 341.060520][ T1042] oom_reaper: reaped process 17610 (syz-executor.5), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB [ 341.072941][T17595] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 341.087778][T17595] CPU: 0 PID: 17595 Comm: syz-executor.2 Not tainted 5.1.0+ #4 [ 341.095430][T17595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.105500][T17595] Call Trace: [ 341.108824][T17595] dump_stack+0x172/0x1f0 [ 341.113189][T17595] dump_header+0x10f/0xb6c [ 341.117636][T17595] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 341.123559][T17595] ? ___ratelimit+0x60/0x595 [ 341.128166][T17595] ? do_raw_spin_unlock+0x57/0x270 [ 341.133326][T17595] oom_kill_process.cold+0x10/0x15 [ 341.138462][T17595] out_of_memory+0x79a/0x1280 [ 341.143170][T17595] ? oom_killer_disable+0x280/0x280 [ 341.148471][T17595] ? find_held_lock+0x35/0x130 [ 341.153267][T17595] mem_cgroup_out_of_memory+0x1ca/0x230 [ 341.159006][T17595] ? memcg_event_wake+0x230/0x230 [ 341.164059][T17595] ? do_raw_spin_unlock+0x57/0x270 [ 341.169194][T17595] ? _raw_spin_unlock+0x2d/0x50 [ 341.174067][T17595] try_charge+0x102c/0x15c0 [ 341.178688][T17595] ? find_held_lock+0x35/0x130 [ 341.183486][T17595] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 341.189138][T17595] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.195420][T17595] ? kasan_check_read+0x11/0x20 [ 341.200294][T17595] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 341.205860][T17595] mem_cgroup_try_charge+0x24d/0x5e0 [ 341.211273][T17595] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 341.216928][T17595] __handle_mm_fault+0x1e1f/0x3ec0 [ 341.222066][T17595] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 341.227628][T17595] ? find_held_lock+0x35/0x130 [ 341.232593][T17595] ? handle_mm_fault+0x322/0xb30 [ 341.237758][T17595] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.244143][T17595] ? kasan_check_read+0x11/0x20 [ 341.249020][T17595] handle_mm_fault+0x43f/0xb30 [ 341.254412][T17595] __do_page_fault+0x5ef/0xda0 [ 341.259198][T17595] do_page_fault+0x71/0x581 [ 341.263729][T17595] ? page_fault+0x8/0x30 [ 341.267988][T17595] page_fault+0x1e/0x30 [ 341.272157][T17595] RIP: 0033:0x4032a2 [ 341.276090][T17595] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 49 85 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 f9 3a 05 00 48 [ 341.296055][T17595] RSP: 002b:00007fff2ad5ef70 EFLAGS: 00010246 [ 341.302129][T17595] RAX: 0000000000000000 RBX: 0000000000053007 RCX: 0000000000412a80 [ 341.310180][T17595] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007fff2ad600a0 [ 341.318251][T17595] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000001c52940 [ 341.326221][T17595] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff2ad600a0 [ 341.334197][T17595] R13: 00007fff2ad60090 R14: 0000000000000000 R15: 00007fff2ad600a0 [ 341.345289][T17595] memory: usage 6140kB, limit 0kB, failcnt 59 [ 341.351428][T17595] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 341.360139][T17595] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 341.367533][T17595] Memory cgroup stats for /syz2: cache:1460KB rss:48KB rss_huge:0KB shmem:1188KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:520KB active_anon:880KB inactive_file:0KB active_file:0KB unevictable:0KB [ 341.388934][T17595] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=17595,uid=0 11:05:33 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) 11:05:33 executing program 0: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x891d, &(0x7f0000000800)='nr0\x01:`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r1, r0, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 11:05:33 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) 11:05:33 executing program 1: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) 11:05:33 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 341.404835][T17595] Memory cgroup out of memory: Killed process 17595 (syz-executor.2) total-vm:72320kB, anon-rss:68kB, file-rss:34824kB, shmem-rss:0kB [ 341.419324][ T1042] oom_reaper: reaped process 17595 (syz-executor.2), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB [ 341.420623][T17621] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 341.481977][T17621] CPU: 1 PID: 17621 Comm: syz-executor.3 Not tainted 5.1.0+ #4 [ 341.489565][T17621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.499723][T17621] Call Trace: [ 341.503030][T17621] dump_stack+0x172/0x1f0 [ 341.507862][T17621] dump_header+0x10f/0xb6c [ 341.512298][T17621] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 341.518115][T17621] ? ___ratelimit+0x60/0x595 [ 341.522718][T17621] ? do_raw_spin_unlock+0x57/0x270 [ 341.527873][T17621] oom_kill_process.cold+0x10/0x15 [ 341.533088][T17621] out_of_memory+0x79a/0x1280 [ 341.537791][T17621] ? oom_killer_disable+0x280/0x280 [ 341.542998][T17621] ? find_held_lock+0x35/0x130 [ 341.547787][T17621] mem_cgroup_out_of_memory+0x1ca/0x230 [ 341.553521][T17621] ? memcg_event_wake+0x230/0x230 [ 341.558575][T17621] ? do_raw_spin_unlock+0x57/0x270 [ 341.563720][T17621] ? _raw_spin_unlock+0x2d/0x50 [ 341.568586][T17621] try_charge+0x102c/0x15c0 [ 341.573096][T17621] ? find_held_lock+0x35/0x130 [ 341.577878][T17621] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 341.583435][T17621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.589707][T17621] ? kasan_check_read+0x11/0x20 [ 341.594596][T17621] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 341.600162][T17621] mem_cgroup_try_charge+0x24d/0x5e0 [ 341.605469][T17621] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 341.611290][T17621] __handle_mm_fault+0x1e1f/0x3ec0 [ 341.616421][T17621] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 341.621975][T17621] ? find_held_lock+0x35/0x130 [ 341.626779][T17621] ? handle_mm_fault+0x322/0xb30 [ 341.631730][T17621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.637980][T17621] ? kasan_check_read+0x11/0x20 [ 341.642843][T17621] handle_mm_fault+0x43f/0xb30 [ 341.647708][T17621] __do_page_fault+0x5ef/0xda0 [ 341.652486][T17621] do_page_fault+0x71/0x581 [ 341.657079][T17621] ? page_fault+0x8/0x30 [ 341.661330][T17621] page_fault+0x1e/0x30 [ 341.665486][T17621] RIP: 0033:0x4107bf [ 341.669382][T17621] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 341.688991][T17621] RSP: 002b:00007ffcdf9c0b00 EFLAGS: 00010206 [ 341.695063][T17621] RAX: 00007f1d1e4d9000 RBX: 0000000000020000 RCX: 0000000000458dfa [ 341.703041][T17621] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 341.711013][T17621] RBP: 00007ffcdf9c0be0 R08: ffffffffffffffff R09: 0000000000000000 [ 341.719007][T17621] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcdf9c0cd0 [ 341.726989][T17621] R13: 00007f1d1e4f9700 R14: 0000000000000001 R15: 000000000073bfac [ 341.742974][T17621] memory: usage 9344kB, limit 0kB, failcnt 30 [ 341.749077][T17621] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 341.778562][T17621] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 341.801762][T17621] Memory cgroup stats for /syz3: cache:68KB rss:4260KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4208KB inactive_file:0KB active_file:0KB unevictable:0KB [ 341.824118][T17621] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=17621,uid=0 [ 341.851008][T17621] Memory cgroup out of memory: Killed process 17621 (syz-executor.3) total-vm:72584kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB [ 341.879326][ T1042] oom_reaper: reaped process 17621 (syz-executor.3), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB [ 341.892088][T17585] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 341.912251][T17585] CPU: 0 PID: 17585 Comm: syz-executor.5 Not tainted 5.1.0+ #4 [ 341.919832][T17585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.929898][T17585] Call Trace: [ 341.933204][T17585] dump_stack+0x172/0x1f0 [ 341.937636][T17585] dump_header+0x10f/0xb6c [ 341.942087][T17585] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 341.948111][T17585] ? ___ratelimit+0x60/0x595 [ 341.952795][T17585] ? do_raw_spin_unlock+0x57/0x270 [ 341.957920][T17585] oom_kill_process.cold+0x10/0x15 [ 341.963065][T17585] out_of_memory+0x79a/0x1280 [ 341.967875][T17585] ? oom_killer_disable+0x280/0x280 [ 341.973083][T17585] ? find_held_lock+0x35/0x130 [ 341.977870][T17585] mem_cgroup_out_of_memory+0x1ca/0x230 [ 341.983435][T17585] ? memcg_event_wake+0x230/0x230 [ 341.988479][T17585] ? do_raw_spin_unlock+0x57/0x270 [ 341.993606][T17585] ? _raw_spin_unlock+0x2d/0x50 [ 341.998495][T17585] try_charge+0x102c/0x15c0 [ 342.003013][T17585] ? find_held_lock+0x35/0x130 [ 342.007822][T17585] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 342.013388][T17585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.019652][T17585] ? kasan_check_read+0x11/0x20 [ 342.024539][T17585] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 342.030103][T17585] mem_cgroup_try_charge+0x24d/0x5e0 [ 342.035415][T17585] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 342.041090][T17585] wp_page_copy+0x408/0x1740 [ 342.045713][T17585] ? find_held_lock+0x35/0x130 [ 342.050505][T17585] ? pmd_pfn+0x1d0/0x1d0 [ 342.054763][T17585] ? lock_downgrade+0x880/0x880 [ 342.059888][T17585] ? swp_swapcount+0x540/0x540 [ 342.064678][T17585] ? kasan_check_read+0x11/0x20 [ 342.069552][T17585] ? do_raw_spin_unlock+0x57/0x270 [ 342.074696][T17585] do_wp_page+0x48e/0x1500 [ 342.079127][T17585] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 342.085054][T17585] __handle_mm_fault+0x22e8/0x3ec0 [ 342.090174][T17585] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 342.095839][T17585] ? find_held_lock+0x35/0x130 [ 342.100719][T17585] ? handle_mm_fault+0x322/0xb30 [ 342.105680][T17585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.112027][T17585] ? kasan_check_read+0x11/0x20 [ 342.116888][T17585] handle_mm_fault+0x43f/0xb30 [ 342.121821][T17585] __do_page_fault+0x5ef/0xda0 [ 342.126579][T17585] do_page_fault+0x71/0x581 [ 342.131086][T17585] ? page_fault+0x8/0x30 [ 342.135339][T17585] page_fault+0x1e/0x30 [ 342.139475][T17585] RIP: 0033:0x4032a2 [ 342.143350][T17585] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 49 85 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 f9 3a 05 00 48 [ 342.162940][T17585] RSP: 002b:00007ffea67edbb0 EFLAGS: 00010246 [ 342.168996][T17585] RAX: 0000000000000000 RBX: 0000000000052fff RCX: 0000000000412a80 [ 342.176953][T17585] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffea67eece0 [ 342.184915][T17585] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000001a3f940 [ 342.192869][T17585] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffea67eece0 [ 342.201412][T17585] R13: 00007ffea67eecd0 R14: 0000000000000000 R15: 00007ffea67eece0 [ 342.213268][T17585] memory: usage 7952kB, limit 0kB, failcnt 40 [ 342.219452][T17585] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 342.229777][T17585] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 342.236729][T17585] Memory cgroup stats for /syz5: cache:4012KB rss:44KB rss_huge:0KB shmem:3960KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4104KB inactive_file:0KB active_file:0KB unevictable:0KB [ 342.236817][T17585] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=17585,uid=0 [ 342.236906][T17585] Memory cgroup out of memory: Killed process 17585 (syz-executor.5) total-vm:72320kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 342.260385][T17599] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 342.291069][T17599] CPU: 0 PID: 17599 Comm: syz-executor.3 Not tainted 5.1.0+ #4 [ 342.304830][T17599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.314886][T17599] Call Trace: [ 342.318204][T17599] dump_stack+0x172/0x1f0 [ 342.322544][T17599] dump_header+0x10f/0xb6c [ 342.326964][T17599] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 342.332774][T17599] ? ___ratelimit+0x60/0x595 [ 342.337393][T17599] ? do_raw_spin_unlock+0x57/0x270 [ 342.342517][T17599] oom_kill_process.cold+0x10/0x15 [ 342.347902][T17599] out_of_memory+0x79a/0x1280 [ 342.352700][T17599] ? lock_downgrade+0x880/0x880 [ 342.357560][T17599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.363806][T17599] ? oom_killer_disable+0x280/0x280 [ 342.369100][T17599] ? find_held_lock+0x35/0x130 [ 342.373880][T17599] mem_cgroup_out_of_memory+0x1ca/0x230 [ 342.379519][T17599] ? memcg_event_wake+0x230/0x230 [ 342.384553][T17599] ? do_raw_spin_unlock+0x57/0x270 [ 342.389679][T17599] ? _raw_spin_unlock+0x2d/0x50 [ 342.394816][T17599] try_charge+0x102c/0x15c0 [ 342.400846][T17599] ? find_held_lock+0x35/0x130 [ 342.405632][T17599] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 342.411273][T17599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.417528][T17599] ? kasan_check_read+0x11/0x20 [ 342.422647][T17599] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 342.428214][T17599] mem_cgroup_try_charge+0x24d/0x5e0 [ 342.433874][T17599] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 342.439601][T17599] wp_page_copy+0x408/0x1740 [ 342.444284][T17599] ? find_held_lock+0x35/0x130 [ 342.449073][T17599] ? pmd_pfn+0x1d0/0x1d0 [ 342.453322][T17599] ? lock_downgrade+0x880/0x880 [ 342.458274][T17599] ? swp_swapcount+0x540/0x540 [ 342.463576][T17599] ? kasan_check_read+0x11/0x20 [ 342.468436][T17599] ? do_raw_spin_unlock+0x57/0x270 [ 342.473908][T17599] do_wp_page+0x48e/0x1500 [ 342.478342][T17599] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 342.483748][T17599] __handle_mm_fault+0x22e8/0x3ec0 [ 342.488969][T17599] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 342.494539][T17599] ? find_held_lock+0x35/0x130 [ 342.499322][T17599] ? handle_mm_fault+0x322/0xb30 [ 342.505422][T17599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.512654][T17599] ? kasan_check_read+0x11/0x20 [ 342.518320][T17599] handle_mm_fault+0x43f/0xb30 [ 342.523092][T17599] __do_page_fault+0x5ef/0xda0 [ 342.527867][T17599] do_page_fault+0x71/0x581 [ 342.532371][T17599] ? page_fault+0x8/0x30 [ 342.536619][T17599] page_fault+0x1e/0x30 [ 342.540776][T17599] RIP: 0033:0x4032a2 [ 342.544772][T17599] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 49 85 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 f9 3a 05 00 48 [ 342.564396][T17599] RSP: 002b:00007ffcdf9bfcb0 EFLAGS: 00010246 [ 342.570471][T17599] RAX: 0000000000000000 RBX: 0000000000053433 RCX: 0000000000412a80 11:05:35 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 342.578448][T17599] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffcdf9c0de0 [ 342.586421][T17599] RBP: 0000000000000002 R08: 0000000000000001 R09: 00000000020ba940 [ 342.594391][T17599] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcdf9c0de0 [ 342.602364][T17599] R13: 00007ffcdf9c0dd0 R14: 0000000000000000 R15: 00007ffcdf9c0de0 [ 342.622063][T17599] memory: usage 4972kB, limit 0kB, failcnt 39 [ 342.629874][T17599] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 342.648711][T17599] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 342.658834][T17599] Memory cgroup stats for /syz3: cache:68KB rss:96KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 342.682613][T17599] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=17599,uid=0 [ 342.699249][T17599] Memory cgroup out of memory: Killed process 17599 (syz-executor.3) total-vm:72320kB, anon-rss:76kB, file-rss:34824kB, shmem-rss:0kB [ 342.713994][ T1042] oom_reaper: reaped process 17599 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 11:05:35 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) 11:05:35 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) 11:05:35 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) 11:05:36 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) 11:05:36 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 343.680420][T17632] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 343.743477][T17632] CPU: 0 PID: 17632 Comm: syz-executor.0 Not tainted 5.1.0+ #4 [ 343.751075][T17632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.761142][T17632] Call Trace: [ 343.764453][T17632] dump_stack+0x172/0x1f0 [ 343.768799][T17632] dump_header+0x10f/0xb6c [ 343.773244][T17632] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 343.779073][T17632] ? ___ratelimit+0x60/0x595 [ 343.783767][T17632] ? do_raw_spin_unlock+0x57/0x270 [ 343.788931][T17632] oom_kill_process.cold+0x10/0x15 [ 343.794066][T17632] out_of_memory+0x79a/0x1280 [ 343.798789][T17632] ? lock_downgrade+0x880/0x880 [ 343.803659][T17632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.809933][T17632] ? oom_killer_disable+0x280/0x280 [ 343.815316][T17632] ? find_held_lock+0x35/0x130 [ 343.820105][T17632] mem_cgroup_out_of_memory+0x1ca/0x230 [ 343.825681][T17632] ? memcg_event_wake+0x230/0x230 [ 343.830737][T17632] ? do_raw_spin_unlock+0x57/0x270 [ 343.835961][T17632] ? _raw_spin_unlock+0x2d/0x50 [ 343.841007][T17632] try_charge+0x102c/0x15c0 [ 343.845606][T17632] ? find_held_lock+0x35/0x130 [ 343.850476][T17632] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 343.856122][T17632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.862389][T17632] ? kasan_check_read+0x11/0x20 [ 343.867255][T17632] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 343.872820][T17632] mem_cgroup_try_charge+0x24d/0x5e0 [ 343.878147][T17632] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 343.883806][T17632] __handle_mm_fault+0x1e1f/0x3ec0 [ 343.888946][T17632] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 343.894510][T17632] ? find_held_lock+0x35/0x130 [ 343.899472][T17632] ? handle_mm_fault+0x322/0xb30 [ 343.904525][T17632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.910874][T17632] ? kasan_check_read+0x11/0x20 [ 343.915753][T17632] handle_mm_fault+0x43f/0xb30 [ 343.920539][T17632] __do_page_fault+0x5ef/0xda0 [ 343.925430][T17632] do_page_fault+0x71/0x581 [ 343.929953][T17632] ? page_fault+0x8/0x30 [ 343.934245][T17632] page_fault+0x1e/0x30 [ 343.938496][T17632] RIP: 0033:0x4107bf [ 343.942408][T17632] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 343.962034][T17632] RSP: 002b:00007ffc33d31660 EFLAGS: 00010206 [ 343.968093][T17632] RAX: 00007f8cb220f000 RBX: 0000000000020000 RCX: 0000000000458dfa [ 343.976066][T17632] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 343.984045][T17632] RBP: 00007ffc33d31740 R08: ffffffffffffffff R09: 0000000000000000 [ 343.992016][T17632] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc33d31830 [ 344.000093][T17632] R13: 00007f8cb222f700 R14: 0000000000000001 R15: 000000000073bfac [ 344.010794][T17632] memory: usage 8812kB, limit 0kB, failcnt 28 [ 344.016966][T17632] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 344.016976][T17632] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 344.016983][T17632] Memory cgroup stats for /syz0: cache:64KB rss:4188KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4228KB inactive_file:4KB active_file:0KB unevictable:0KB [ 344.052761][T17632] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=17632,uid=0 [ 344.068896][T17632] Memory cgroup out of memory: Killed process 17632 (syz-executor.0) total-vm:72580kB, anon-rss:4188kB, file-rss:34816kB, shmem-rss:0kB 11:05:36 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 344.101586][T17629] IPVS: ftp: loaded support on port[0] = 21 [ 344.106369][T17630] IPVS: ftp: loaded support on port[0] = 21 [ 344.157163][T17547] syz-executor.0 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 344.178904][T17547] CPU: 1 PID: 17547 Comm: syz-executor.0 Not tainted 5.1.0+ #4 [ 344.186600][T17547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.186615][T17547] Call Trace: [ 344.200005][T17547] dump_stack+0x172/0x1f0 [ 344.204344][T17547] dump_header+0x10f/0xb6c [ 344.204362][T17547] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 344.204376][T17547] ? ___ratelimit+0x60/0x595 [ 344.204391][T17547] ? do_raw_spin_unlock+0x57/0x270 [ 344.204408][T17547] oom_kill_process.cold+0x10/0x15 [ 344.204428][T17547] out_of_memory+0x79a/0x1280 [ 344.214642][T17547] ? lock_downgrade+0x880/0x880 [ 344.214656][T17547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.214683][T17547] ? oom_killer_disable+0x280/0x280 [ 344.214702][T17547] ? find_held_lock+0x35/0x130 [ 344.224399][T17547] mem_cgroup_out_of_memory+0x1ca/0x230 [ 344.224414][T17547] ? memcg_event_wake+0x230/0x230 [ 344.224444][T17547] ? do_raw_spin_unlock+0x57/0x270 [ 344.234227][T17547] ? _raw_spin_unlock+0x2d/0x50 [ 344.234247][T17547] try_charge+0x102c/0x15c0 [ 344.234271][T17547] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 344.245347][T17547] ? rcu_read_lock_sched_held+0x110/0x130 [ 344.245364][T17547] ? __alloc_pages_nodemask+0x61d/0x8d0 [ 344.245395][T17547] __memcg_kmem_charge_memcg+0x7c/0x130 [ 344.255348][T17547] ? memcg_kmem_put_cache+0xb0/0xb0 [ 344.255365][T17547] ? cache_grow_begin+0x594/0x860 [ 344.255381][T17547] ? lockdep_hardirqs_on+0x418/0x5d0 [ 344.255402][T17547] ? trace_hardirqs_on+0x67/0x230 [ 344.266143][T17547] cache_grow_begin+0x5c0/0x860 [ 344.266160][T17547] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 344.266175][T17547] ? __cpuset_node_allowed+0x136/0x540 [ 344.266195][T17547] fallback_alloc+0x1fd/0x2d0 [ 344.276262][T17547] ____cache_alloc_node+0x1be/0x1e0 [ 344.276278][T17547] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 344.276302][T17547] kmem_cache_alloc+0x1e8/0x6f0 [ 344.286348][T17547] ? inet_create+0x2f4/0xe10 [ 344.286369][T17547] sk_prot_alloc+0x67/0x2e0 [ 344.286382][T17547] ? lock_downgrade+0x880/0x880 [ 344.286402][T17547] sk_alloc+0x39/0xf70 [ 344.297686][T17547] inet_create+0x36a/0xe10 [ 344.308448][T17547] __sock_create+0x3e6/0x750 [ 344.319265][T17547] __sys_socket+0x103/0x220 [ 344.329116][T17547] ? move_addr_to_kernel+0x80/0x80 [ 344.340807][T17547] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 344.350778][T17547] ? do_syscall_64+0x26/0x670 [ 344.363450][T17547] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.363467][T17547] ? do_syscall_64+0x26/0x670 [ 344.363490][T17547] __x64_sys_socket+0x73/0xb0 [ 344.373986][T17547] do_syscall_64+0x103/0x670 [ 344.374006][T17547] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.374018][T17547] RIP: 0033:0x45b917 [ 344.374039][T17547] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 344.383239][T17547] RSP: 002b:00007ffc33d31218 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 344.383252][T17547] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045b917 [ 344.383259][T17547] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 344.383266][T17547] RBP: 000000000000000b R08: 0000000000000000 R09: 000000000000000a [ 344.383273][T17547] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 11:05:36 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) [ 344.383281][T17547] R13: 00007ffc33d31930 R14: 0000000000053dd5 R15: 00007ffc33d31940 [ 344.515534][T17547] memory: usage 4428kB, limit 0kB, failcnt 41 [ 344.529597][T17547] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 344.538825][T17547] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 344.553858][T17547] Memory cgroup stats for /syz0: cache:64KB rss:24KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:44KB inactive_file:4KB active_file:0KB unevictable:0KB [ 344.582286][T17547] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=17547,uid=0 11:05:37 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='/\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) [ 344.607025][T17547] Memory cgroup out of memory: Killed process 17547 (syz-executor.0) total-vm:72316kB, anon-rss:92kB, file-rss:35712kB, shmem-rss:0kB [ 345.130412][T17637] IPVS: ftp: loaded support on port[0] = 21 [ 345.130792][T17638] IPVS: ftp: loaded support on port[0] = 21 [ 346.128162][T17640] IPVS: ftp: loaded support on port[0] = 21 [ 346.436927][T17629] chnl_net:caif_netlink_parms(): no params data found [ 346.487298][T17630] chnl_net:caif_netlink_parms(): no params data found [ 346.768646][T17629] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.776547][T17629] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.784997][T17629] device bridge_slave_0 entered promiscuous mode [ 346.796712][T17629] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.804174][T17629] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.812854][T17629] device bridge_slave_1 entered promiscuous mode [ 346.855695][T17629] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 346.885424][T17629] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 346.938839][T17629] team0: Port device team_slave_0 added [ 347.232311][T17629] team0: Port device team_slave_1 added [ 347.248792][T17637] chnl_net:caif_netlink_parms(): no params data found [ 347.259230][T17630] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.266591][T17630] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.275773][T17630] device bridge_slave_0 entered promiscuous mode [ 347.284514][T17630] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.291719][T17630] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.300046][T17630] device bridge_slave_1 entered promiscuous mode [ 347.699460][T17629] device hsr_slave_0 entered promiscuous mode [ 347.731997][T17629] device hsr_slave_1 entered promiscuous mode [ 347.825079][T17630] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 347.835494][T14743] device bridge_slave_1 left promiscuous mode [ 347.842049][T14743] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.892820][T14743] device bridge_slave_0 left promiscuous mode [ 347.899095][T14743] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.953798][T14743] device bridge_slave_1 left promiscuous mode [ 347.960047][T14743] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.002589][T14743] device bridge_slave_0 left promiscuous mode [ 348.009379][T14743] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.063052][T14743] device bridge_slave_1 left promiscuous mode [ 348.069282][T14743] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.113299][T14743] device bridge_slave_0 left promiscuous mode [ 348.119549][T14743] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.173771][T14743] device bridge_slave_1 left promiscuous mode [ 348.179992][T14743] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.222616][T14743] device bridge_slave_0 left promiscuous mode [ 348.228821][T14743] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.535269][T14743] device hsr_slave_1 left promiscuous mode [ 355.595496][T14743] device hsr_slave_0 left promiscuous mode [ 355.646047][T14743] team0 (unregistering): Port device team_slave_1 removed [ 355.660772][T14743] team0 (unregistering): Port device team_slave_0 removed [ 355.673538][T14743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 355.731529][T14743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 355.813506][T14743] bond0 (unregistering): Released all slaves [ 355.966935][T14743] device hsr_slave_1 left promiscuous mode [ 356.027996][T14743] device hsr_slave_0 left promiscuous mode [ 356.087851][T14743] team0 (unregistering): Port device team_slave_1 removed [ 356.100623][T14743] team0 (unregistering): Port device team_slave_0 removed [ 356.113476][T14743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 356.147067][T14743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 356.255315][T14743] bond0 (unregistering): Released all slaves [ 356.404236][T14743] device hsr_slave_1 left promiscuous mode [ 356.457952][T14743] device hsr_slave_0 left promiscuous mode [ 356.500482][T14743] team0 (unregistering): Port device team_slave_1 removed [ 356.513072][T14743] team0 (unregistering): Port device team_slave_0 removed [ 356.528633][T14743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 356.571210][T14743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 356.666170][T14743] bond0 (unregistering): Released all slaves [ 356.805406][T14743] device hsr_slave_1 left promiscuous mode [ 356.855441][T14743] device hsr_slave_0 left promiscuous mode [ 356.909115][T14743] team0 (unregistering): Port device team_slave_1 removed [ 356.921770][T14743] team0 (unregistering): Port device team_slave_0 removed [ 356.935180][T14743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 356.979898][T14743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 357.075861][T14743] bond0 (unregistering): Released all slaves [ 357.207903][T17638] chnl_net:caif_netlink_parms(): no params data found [ 357.218753][T17630] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 357.339581][T17630] team0: Port device team_slave_0 added [ 357.357814][T17637] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.365966][T17637] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.377926][T17637] device bridge_slave_0 entered promiscuous mode [ 357.395299][T17630] team0: Port device team_slave_1 added [ 357.408690][T17638] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.417305][T17638] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.426022][T17638] device bridge_slave_0 entered promiscuous mode [ 357.437918][T17637] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.446754][T17637] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.454895][T17637] device bridge_slave_1 entered promiscuous mode [ 357.477809][T17637] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 357.489020][T17640] chnl_net:caif_netlink_parms(): no params data found [ 357.498797][T17638] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.506358][T17638] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.514783][T17638] device bridge_slave_1 entered promiscuous mode [ 357.539883][T17637] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 357.588079][T17637] team0: Port device team_slave_0 added [ 357.598752][T17637] team0: Port device team_slave_1 added [ 357.644931][T17630] device hsr_slave_0 entered promiscuous mode [ 357.692983][T17630] device hsr_slave_1 entered promiscuous mode [ 357.744154][T17638] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 357.756827][T17629] 8021q: adding VLAN 0 to HW filter on device bond0 [ 357.775555][T17638] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 357.799429][T17629] 8021q: adding VLAN 0 to HW filter on device team0 [ 357.864466][T17637] device hsr_slave_0 entered promiscuous mode [ 357.902098][T17637] device hsr_slave_1 entered promiscuous mode [ 357.984850][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 357.992887][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 358.017890][T17640] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.025101][T17640] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.038461][T17640] device bridge_slave_0 entered promiscuous mode [ 358.047132][T17640] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.055040][T17640] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.063307][T17640] device bridge_slave_1 entered promiscuous mode [ 358.072091][T17638] team0: Port device team_slave_0 added [ 358.091141][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 358.100108][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 358.108760][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.116077][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.123867][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 358.133638][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 358.142178][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.149504][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 358.158958][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 358.167191][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 358.188313][T17638] team0: Port device team_slave_1 added [ 358.204692][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 358.216836][T17640] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 358.244597][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 358.254421][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 358.264340][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 358.273536][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 358.282760][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 358.304388][T17640] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 358.332094][T17629] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 358.343934][T17629] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 358.395455][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 358.404352][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 358.413268][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 358.421670][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 358.430134][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 358.513930][T17638] device hsr_slave_0 entered promiscuous mode [ 358.552078][T17638] device hsr_slave_1 entered promiscuous mode [ 358.604656][T17640] team0: Port device team_slave_0 added [ 358.616263][T17629] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 358.646158][T17640] team0: Port device team_slave_1 added [ 358.694039][T17630] 8021q: adding VLAN 0 to HW filter on device bond0 [ 358.745556][T17640] device hsr_slave_0 entered promiscuous mode [ 358.792298][T17640] device hsr_slave_1 entered promiscuous mode [ 358.856138][T17637] 8021q: adding VLAN 0 to HW filter on device bond0 [ 358.871499][T17630] 8021q: adding VLAN 0 to HW filter on device team0 [ 358.899509][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 358.907661][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 358.931752][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 358.941095][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 358.962663][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.969835][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.985364][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 358.994372][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 359.003517][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.010858][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 359.079544][T17652] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 359.097403][T17637] 8021q: adding VLAN 0 to HW filter on device team0 [ 359.105166][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 359.113743][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 359.115574][T17652] CPU: 1 PID: 17652 Comm: syz-executor.1 Not tainted 5.1.0+ #4 [ 359.122824][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 359.129655][T17652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.129670][T17652] Call Trace: [ 359.137639][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 359.146969][T17652] dump_stack+0x172/0x1f0 [ 359.146989][T17652] dump_header+0x10f/0xb6c [ 359.147008][T17652] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 359.147032][T17652] ? ___ratelimit+0x60/0x595 [ 359.151295][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 359.158604][T17652] ? do_raw_spin_unlock+0x57/0x270 [ 359.158626][T17652] oom_kill_process.cold+0x10/0x15 [ 359.158644][T17652] out_of_memory+0x79a/0x1280 [ 359.158676][T17652] ? __sched_text_start+0x8/0x8 [ 359.164095][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 359.167634][T17652] ? oom_killer_disable+0x280/0x280 [ 359.174406][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 359.178129][T17652] mem_cgroup_out_of_memory+0x1ca/0x230 [ 359.232691][T17652] ? memcg_event_wake+0x230/0x230 [ 359.237733][T17652] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 359.243558][T17652] ? cgroup_file_notify+0x140/0x1b0 [ 359.248769][T17652] memory_max_write+0x169/0x300 [ 359.253902][T17652] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 359.259708][T17652] ? mem_cgroup_write+0x360/0x360 [ 359.264821][T17652] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 359.270302][T17652] cgroup_file_write+0x245/0x7a0 [ 359.275425][T17652] ? mem_cgroup_write+0x360/0x360 [ 359.280439][T17652] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 359.286611][T17652] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 359.292299][T17652] kernfs_fop_write+0x2ba/0x480 [ 359.297144][T17652] __vfs_write+0x8d/0x110 [ 359.301503][T17652] ? kernfs_fop_open+0xd90/0xd90 [ 359.306493][T17652] vfs_write+0x20c/0x580 [ 359.310741][T17652] ksys_write+0x14f/0x290 [ 359.315060][T17652] ? __ia32_sys_read+0xb0/0xb0 [ 359.319827][T17652] ? do_syscall_64+0x26/0x670 [ 359.324492][T17652] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.330970][T17652] ? do_syscall_64+0x26/0x670 [ 359.335809][T17652] __x64_sys_write+0x73/0xb0 [ 359.348620][T17652] do_syscall_64+0x103/0x670 [ 359.353818][T17652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.359703][T17652] RIP: 0033:0x458da9 [ 359.363609][T17652] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 359.383210][T17652] RSP: 002b:00007fca053cac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 359.391622][T17652] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 359.400383][T17652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 359.408361][T17652] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 359.416513][T17652] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fca053cb6d4 [ 359.424737][T17652] R13: 00000000004c8808 R14: 00000000004def78 R15: 00000000ffffffff [ 359.456984][T17652] memory: usage 8896kB, limit 0kB, failcnt 20 [ 359.469762][T17652] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 359.478557][T17652] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 359.487071][T17652] Memory cgroup stats for /syz1: cache:32KB rss:4296KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4220KB inactive_file:4KB active_file:0KB unevictable:0KB [ 359.509545][T17652] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=17650,uid=0 [ 359.526948][T17652] Memory cgroup out of memory: Killed process 17650 (syz-executor.1) total-vm:72584kB, anon-rss:4232kB, file-rss:35768kB, shmem-rss:0kB [ 359.554925][ T1042] oom_reaper: reaped process 17650 (syz-executor.1), now anon-rss:0kB, file-rss:34808kB, shmem-rss:0kB [ 359.556232][T17638] 8021q: adding VLAN 0 to HW filter on device bond0 [ 359.592059][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 359.600588][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 359.609609][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 359.618579][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 359.627416][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 359.636086][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 359.645497][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 359.654434][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 359.672380][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 359.680908][ T2989] bridge0: port 1(bridge_slave_0) entered blocking state [ 359.688028][ T2989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 359.705946][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 359.718630][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 359.736132][ T2989] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.743296][ T2989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 359.760041][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 359.790997][T17629] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 359.802160][T17629] CPU: 0 PID: 17629 Comm: syz-executor.1 Not tainted 5.1.0+ #4 [ 359.809726][T17629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.820823][T17629] Call Trace: [ 359.824208][T17629] dump_stack+0x172/0x1f0 [ 359.828727][T17629] dump_header+0x10f/0xb6c [ 359.833168][T17629] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 359.838961][T17629] ? ___ratelimit+0x60/0x595 [ 359.843546][T17629] ? do_raw_spin_unlock+0x57/0x270 [ 359.848671][T17629] oom_kill_process.cold+0x10/0x15 [ 359.853791][T17629] out_of_memory+0x79a/0x1280 [ 359.858547][T17629] ? lock_downgrade+0x880/0x880 [ 359.863432][T17629] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 359.869691][T17629] ? oom_killer_disable+0x280/0x280 [ 359.874914][T17629] ? find_held_lock+0x35/0x130 [ 359.879672][T17629] mem_cgroup_out_of_memory+0x1ca/0x230 [ 359.885248][T17629] ? memcg_event_wake+0x230/0x230 [ 359.890290][T17629] ? do_raw_spin_unlock+0x57/0x270 [ 359.895490][T17629] ? _raw_spin_unlock+0x2d/0x50 [ 359.900332][T17629] try_charge+0x102c/0x15c0 [ 359.904830][T17629] ? find_held_lock+0x35/0x130 [ 359.909924][T17629] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 359.915633][T17629] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 359.921877][T17629] ? kasan_check_read+0x11/0x20 [ 359.926828][T17629] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 359.932476][T17629] mem_cgroup_try_charge+0x24d/0x5e0 [ 359.937764][T17629] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 359.943425][T17629] __handle_mm_fault+0x1e1f/0x3ec0 [ 359.948549][T17629] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 359.954090][T17629] ? find_held_lock+0x35/0x130 [ 359.958841][T17629] ? handle_mm_fault+0x322/0xb30 [ 359.963787][T17629] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 359.970040][T17629] ? kasan_check_read+0x11/0x20 [ 359.974888][T17629] handle_mm_fault+0x43f/0xb30 [ 359.979654][T17629] __do_page_fault+0x5ef/0xda0 [ 359.984423][T17629] do_page_fault+0x71/0x581 [ 359.989019][T17629] ? page_fault+0x8/0x30 [ 359.993258][T17629] page_fault+0x1e/0x30 [ 359.997399][T17629] RIP: 0033:0x42f3ac [ 360.001289][T17629] Code: 83 c0 17 41 55 41 54 55 53 48 89 c5 48 83 e5 f0 48 89 fb 48 81 ec 98 00 00 00 48 83 f8 20 b8 20 00 00 00 48 0f 42 e8 48 85 ff <48> 89 74 24 08 0f 84 3a 08 00 00 48 3b 2d ba 5b 62 00 77 70 89 ef [ 360.020898][T17629] RSP: 002b:00007ffd1d36cff0 EFLAGS: 00010202 [ 360.026956][T17629] RAX: 0000000000000020 RBX: 0000000000713640 RCX: 0000000000458114 [ 360.034945][T17629] RDX: 00007ffd1d36d0e0 RSI: 0000000000008030 RDI: 0000000000713640 [ 360.043697][T17629] RBP: 0000000000008040 R08: 0000000000000001 R09: 0000000000c1d940 [ 360.051685][T17629] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd1d36e2c0 [ 360.059661][T17629] R13: 00007ffd1d36e2b0 R14: 0000000000000000 R15: 00007ffd1d36e2c0 [ 360.070300][T17629] memory: usage 4484kB, limit 0kB, failcnt 32 [ 360.076472][T17629] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 360.086724][T17630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 360.090073][T17629] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 360.101235][T17629] Memory cgroup stats for /syz1: cache:32KB rss:132KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:4KB unevictable:0KB [ 360.109508][T17638] 8021q: adding VLAN 0 to HW filter on device team0 [ 360.122538][T17629] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=17629,uid=0 [ 360.144520][T17629] Memory cgroup out of memory: Killed process 17629 (syz-executor.1) total-vm:72320kB, anon-rss:68kB, file-rss:34824kB, shmem-rss:0kB [ 360.162064][ T7944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 360.170326][ T7944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 360.177692][ T1042] oom_reaper: reaped process 17629 (syz-executor.1), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB [ 360.194622][ T7944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 360.220437][T17640] 8021q: adding VLAN 0 to HW filter on device bond0 [ 360.244991][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 360.254197][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 360.263649][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 360.272495][T15844] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.279592][T15844] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.705693][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 360.732522][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 360.741386][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 360.750402][ T7925] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.757615][ T7925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.766606][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 360.775572][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 360.784973][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 360.793379][ T7925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 360.825197][T17640] 8021q: adding VLAN 0 to HW filter on device team0 [ 360.848308][T17630] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 360.882186][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 360.891130][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 360.922970][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 360.948725][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 360.961557][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 360.977385][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 360.986289][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 360.995397][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 361.004748][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 361.014097][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 361.024441][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 361.034060][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 361.043196][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 361.052659][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 361.063802][T17637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 361.079733][T17638] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 361.093077][T17638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 361.114843][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 361.123803][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 361.133963][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 361.151553][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 361.161185][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 361.172273][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 361.180827][ T2989] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.187977][ T2989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.196692][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 361.205876][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 361.214944][ T2989] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.222113][ T2989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.230517][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 361.239627][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 361.320575][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 361.340071][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 361.350906][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 361.369404][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 361.388797][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 361.400163][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 361.418757][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 361.435975][T17640] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 361.459324][T17640] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 361.483864][T17637] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 361.500859][T17638] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 361.507216][T17662] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 361.518586][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 361.526363][T17662] CPU: 0 PID: 17662 Comm: syz-executor.4 Not tainted 5.1.0+ #4 [ 361.533918][T17662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.543986][T17662] Call Trace: [ 361.547378][T17662] dump_stack+0x172/0x1f0 [ 361.551732][T17662] dump_header+0x10f/0xb6c [ 361.556163][T17662] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 361.562079][T17662] ? ___ratelimit+0x60/0x595 [ 361.567903][T17662] ? do_raw_spin_unlock+0x57/0x270 [ 361.573121][T17662] oom_kill_process.cold+0x10/0x15 [ 361.578713][T17662] out_of_memory+0x79a/0x1280 [ 361.583431][T17662] ? __sched_text_start+0x8/0x8 [ 361.588396][T17662] ? oom_killer_disable+0x280/0x280 [ 361.593631][T17662] mem_cgroup_out_of_memory+0x1ca/0x230 [ 361.599190][T17662] ? memcg_event_wake+0x230/0x230 [ 361.604242][T17662] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 361.610069][T17662] ? cgroup_file_notify+0x140/0x1b0 [ 361.615294][T17662] memory_max_write+0x169/0x300 [ 361.620174][T17662] ? mem_cgroup_write+0x360/0x360 [ 361.625215][T17662] ? lock_acquire+0x16f/0x3f0 [ 361.629909][T17662] ? kernfs_fop_write+0x227/0x480 [ 361.634976][T17662] cgroup_file_write+0x245/0x7a0 [ 361.640021][T17662] ? mem_cgroup_write+0x360/0x360 [ 361.645170][T17662] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 361.650826][T17662] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 361.656499][T17662] kernfs_fop_write+0x2ba/0x480 [ 361.661484][T17662] __vfs_write+0x8d/0x110 [ 361.665830][T17662] ? kernfs_fop_open+0xd90/0xd90 [ 361.671014][T17662] vfs_write+0x20c/0x580 [ 361.675277][T17662] ksys_write+0x14f/0x290 [ 361.679774][T17662] ? __ia32_sys_read+0xb0/0xb0 [ 361.684647][T17662] ? do_syscall_64+0x26/0x670 [ 361.689333][T17662] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.695419][T17662] ? do_syscall_64+0x26/0x670 [ 361.700111][T17662] __x64_sys_write+0x73/0xb0 [ 361.704716][T17662] do_syscall_64+0x103/0x670 [ 361.709338][T17662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.715239][T17662] RIP: 0033:0x458da9 [ 361.719267][T17662] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 361.739360][T17662] RSP: 002b:00007fbeece95c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 361.747771][T17662] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 361.756069][T17662] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 361.764049][T17662] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 361.772043][T17662] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbeece966d4 [ 361.780027][T17662] R13: 00000000004c8808 R14: 00000000004def78 R15: 00000000ffffffff [ 361.789970][T17662] memory: usage 8788kB, limit 0kB, failcnt 20 [ 361.790864][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 361.799533][T17662] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 361.805525][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 361.819987][T17640] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 361.841132][T17662] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 361.861362][T17662] Memory cgroup stats for /syz4: cache:20KB rss:4188KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4224KB inactive_file:4KB active_file:0KB unevictable:0KB [ 361.888108][T17662] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=17661,uid=0 [ 361.907845][T17662] Memory cgroup out of memory: Killed process 17661 (syz-executor.4) total-vm:72584kB, anon-rss:4236kB, file-rss:35772kB, shmem-rss:0kB [ 361.926834][ T1042] oom_reaper: reaped process 17661 (syz-executor.4), now anon-rss:0kB, file-rss:34812kB, shmem-rss:0kB [ 362.239207][T17679] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 362.272261][T17679] CPU: 1 PID: 17679 Comm: syz-executor.2 Not tainted 5.1.0+ #4 [ 362.279844][T17679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.289909][T17679] Call Trace: [ 362.293261][T17679] dump_stack+0x172/0x1f0 [ 362.297614][T17679] dump_header+0x10f/0xb6c [ 362.302054][T17679] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 362.307880][T17679] ? ___ratelimit+0x60/0x595 [ 362.312486][T17679] ? do_raw_spin_unlock+0x57/0x270 [ 362.317619][T17679] oom_kill_process.cold+0x10/0x15 [ 362.322788][T17679] out_of_memory+0x79a/0x1280 [ 362.327491][T17679] ? lock_downgrade+0x880/0x880 [ 362.332359][T17679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 362.338624][T17679] ? oom_killer_disable+0x280/0x280 [ 362.343844][T17679] ? find_held_lock+0x35/0x130 [ 362.348729][T17679] mem_cgroup_out_of_memory+0x1ca/0x230 [ 362.354310][T17679] ? memcg_event_wake+0x230/0x230 [ 362.359444][T17679] ? do_raw_spin_unlock+0x57/0x270 [ 362.364922][T17679] ? _raw_spin_unlock+0x2d/0x50 [ 362.369795][T17679] try_charge+0x102c/0x15c0 [ 362.374312][T17679] ? find_held_lock+0x35/0x130 [ 362.379095][T17679] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 362.384631][T17679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 362.390978][T17679] ? kasan_check_read+0x11/0x20 [ 362.395860][T17679] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 362.402126][T17679] mem_cgroup_try_charge+0x24d/0x5e0 [ 362.407431][T17679] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 362.413062][T17679] __handle_mm_fault+0x1e1f/0x3ec0 [ 362.418274][T17679] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 362.423830][T17679] ? find_held_lock+0x35/0x130 [ 362.428621][T17679] ? handle_mm_fault+0x322/0xb30 [ 362.433575][T17679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 362.439819][T17679] ? kasan_check_read+0x11/0x20 [ 362.444764][T17679] handle_mm_fault+0x43f/0xb30 [ 362.449527][T17679] __do_page_fault+0x5ef/0xda0 [ 362.454292][T17679] do_page_fault+0x71/0x581 [ 362.459091][T17679] ? page_fault+0x8/0x30 [ 362.463353][T17679] page_fault+0x1e/0x30 [ 362.467519][T17679] RIP: 0033:0x4107bf [ 362.471400][T17679] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 362.491427][T17679] RSP: 002b:00007fff1eaf59d0 EFLAGS: 00010206 [ 362.497602][T17679] RAX: 00007fe93fce7000 RBX: 0000000000020000 RCX: 0000000000458dfa [ 362.506568][T17679] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 362.516577][T17679] RBP: 00007fff1eaf5ab0 R08: ffffffffffffffff R09: 0000000000000000 [ 362.524571][T17679] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff1eaf5ba0 [ 362.532537][T17679] R13: 00007fe93fd07700 R14: 0000000000000001 R15: 000000000073bfac [ 362.541952][T17679] memory: usage 9412kB, limit 0kB, failcnt 68 [ 362.548256][T17679] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 362.558399][T17679] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 362.566978][T17679] Memory cgroup stats for /syz2: cache:1460KB rss:4212KB rss_huge:4096KB shmem:1188KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:520KB active_anon:5048KB inactive_file:0KB active_file:4KB unevictable:0KB 11:05:55 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='/\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 11:05:55 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x5a8bc343548ca1c1, 0x1, 0x1ff, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeec8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59, 0x0, 0x1}, 0x20) r7 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r8 = gettid() r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x1000}, [@jmp={0x5, 0x2, 0x6, 0x0, 0xd, 0x50, 0xfffffffffffffffc}]}, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0xc, r6, 0x8, &(0x7f0000000240)={0x6, 0x9}, 0x8, 0x10, &(0x7f0000000300)={0x1f, 0x40, 0x6, 0x401}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000480)=r9, 0x4) write$cgroup_pid(r3, &(0x7f0000000540)=r8, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) r10 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x3, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000580)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r10) 11:05:55 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='/\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) [ 362.589652][T17679] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=17679,uid=0 [ 362.606494][T17679] Memory cgroup out of memory: Killed process 17679 (syz-executor.2) total-vm:72584kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 362.673917][ T1042] oom_reaper: reaped process 17679 (syz-executor.2), now anon-rss:0kB, file-rss:34876kB, shmem-rss:0kB [ 362.674003][T17678] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 362.733391][T17678] CPU: 1 PID: 17678 Comm: syz-executor.5 Not tainted 5.1.0+ #4 [ 362.740987][T17678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.751081][T17678] Call Trace: [ 362.754394][T17678] dump_stack+0x172/0x1f0 [ 362.758741][T17678] dump_header+0x10f/0xb6c [ 362.763194][T17678] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 362.769023][T17678] ? ___ratelimit+0x60/0x595 [ 362.773637][T17678] ? do_raw_spin_unlock+0x57/0x270 [ 362.778789][T17678] oom_kill_process.cold+0x10/0x15 [ 362.783920][T17678] out_of_memory+0x79a/0x1280 [ 362.788660][T17678] ? oom_killer_disable+0x280/0x280 [ 362.793874][T17678] ? find_held_lock+0x35/0x130 [ 362.798667][T17678] mem_cgroup_out_of_memory+0x1ca/0x230 [ 362.804263][T17678] ? memcg_event_wake+0x230/0x230 [ 362.809662][T17678] ? do_raw_spin_unlock+0x57/0x270 [ 362.814804][T17678] ? _raw_spin_unlock+0x2d/0x50 [ 362.819769][T17678] try_charge+0x102c/0x15c0 [ 362.824626][T17678] ? find_held_lock+0x35/0x130 [ 362.829692][T17678] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 362.835237][T17678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 362.841583][T17678] ? kasan_check_read+0x11/0x20 [ 362.846442][T17678] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 362.851980][T17678] mem_cgroup_try_charge+0x24d/0x5e0 [ 362.857351][T17678] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 362.862983][T17678] __handle_mm_fault+0x1e1f/0x3ec0 [ 362.868105][T17678] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 362.873638][T17678] ? find_held_lock+0x35/0x130 [ 362.878418][T17678] ? handle_mm_fault+0x322/0xb30 [ 362.883349][T17678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 362.889770][T17678] ? kasan_check_read+0x11/0x20 [ 362.894883][T17678] handle_mm_fault+0x43f/0xb30 [ 362.899645][T17678] __do_page_fault+0x5ef/0xda0 [ 362.904421][T17678] do_page_fault+0x71/0x581 [ 362.908923][T17678] ? page_fault+0x8/0x30 [ 362.913616][T17678] page_fault+0x1e/0x30 [ 362.917759][T17678] RIP: 0033:0x4107bf [ 362.921913][T17678] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 362.941565][T17678] RSP: 002b:00007ffcc8226e00 EFLAGS: 00010206 [ 362.947825][T17678] RAX: 00007f4f7d47e000 RBX: 0000000000020000 RCX: 0000000000458dfa [ 362.956305][T17678] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 362.966534][T17678] RBP: 00007ffcc8226ee0 R08: ffffffffffffffff R09: 0000000000000000 [ 362.974520][T17678] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcc8226fd0 [ 362.982503][T17678] R13: 00007f4f7d49e700 R14: 0000000000000001 R15: 000000000073bfac [ 362.996600][T17678] memory: usage 11872kB, limit 0kB, failcnt 49 [ 363.003366][T17678] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 363.010846][T17678] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 363.018408][T17678] Memory cgroup stats for /syz5: cache:4012KB rss:4236KB rss_huge:4096KB shmem:3960KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:8276KB inactive_file:0KB active_file:4KB unevictable:0KB [ 363.040872][T17678] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=17678,uid=0 [ 363.044039][ T27] audit: type=1804 audit(1557399955.479:239): pid=17684 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir391231652/syzkaller.vfO9Nt/0/memory.events" dev="sda1" ino=16568 res=1 [ 363.057312][T17678] Memory cgroup out of memory: Killed process 17678 (syz-executor.5) total-vm:72584kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 363.098876][ T1042] oom_reaper: reaped process 17678 (syz-executor.5), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB [ 363.110567][ T27] audit: type=1800 audit(1557399955.479:240): pid=17684 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16568 res=0 11:05:55 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='/\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 11:05:55 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='/\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) [ 363.115186][T17630] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 363.211501][T17630] CPU: 1 PID: 17630 Comm: syz-executor.4 Not tainted 5.1.0+ #4 [ 363.219106][T17630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.229177][T17630] Call Trace: [ 363.232493][T17630] dump_stack+0x172/0x1f0 [ 363.236840][T17630] dump_header+0x10f/0xb6c [ 363.241285][T17630] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 363.247123][T17630] ? ___ratelimit+0x60/0x595 [ 363.251737][T17630] ? do_raw_spin_unlock+0x57/0x270 [ 363.256873][T17630] oom_kill_process.cold+0x10/0x15 [ 363.262006][T17630] out_of_memory+0x79a/0x1280 [ 363.266707][T17630] ? oom_killer_disable+0x280/0x280 [ 363.271917][T17630] ? find_held_lock+0x35/0x130 [ 363.276714][T17630] mem_cgroup_out_of_memory+0x1ca/0x230 [ 363.282274][T17630] ? memcg_event_wake+0x230/0x230 [ 363.287317][T17630] ? do_raw_spin_unlock+0x57/0x270 [ 363.292444][T17630] ? _raw_spin_unlock+0x2d/0x50 [ 363.297319][T17630] try_charge+0x102c/0x15c0 [ 363.301838][T17630] ? find_held_lock+0x35/0x130 [ 363.306905][T17630] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 363.312487][T17630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 363.318756][T17630] ? kasan_check_read+0x11/0x20 [ 363.323633][T17630] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 363.329211][T17630] mem_cgroup_try_charge+0x24d/0x5e0 [ 363.334524][T17630] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 363.340187][T17630] wp_page_copy+0x408/0x1740 [ 363.344852][T17630] ? find_held_lock+0x35/0x130 [ 363.349644][T17630] ? pmd_pfn+0x1d0/0x1d0 [ 363.353920][T17630] ? lock_downgrade+0x880/0x880 [ 363.358879][T17630] ? swp_swapcount+0x540/0x540 [ 363.363770][T17630] ? do_raw_spin_unlock+0x57/0x270 [ 363.368907][T17630] ? kasan_check_read+0x11/0x20 [ 363.373772][T17630] ? do_raw_spin_unlock+0x57/0x270 [ 363.378939][T17630] do_wp_page+0x48e/0x1500 [ 363.383383][T17630] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 363.388797][T17630] __handle_mm_fault+0x22e8/0x3ec0 [ 363.393949][T17630] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 363.399515][T17630] ? find_held_lock+0x35/0x130 [ 363.404302][T17630] ? handle_mm_fault+0x322/0xb30 [ 363.409265][T17630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 363.415615][T17630] ? kasan_check_read+0x11/0x20 [ 363.420482][T17630] handle_mm_fault+0x43f/0xb30 [ 363.425473][T17630] __do_page_fault+0x5ef/0xda0 [ 363.430258][T17630] do_page_fault+0x71/0x581 [ 363.434778][T17630] ? page_fault+0x8/0x30 [ 363.439045][T17630] page_fault+0x1e/0x30 [ 363.443235][T17630] RIP: 0033:0x42ff36 [ 363.447143][T17630] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 [ 363.466865][T17630] RSP: 002b:00007ffc7fc68330 EFLAGS: 00010206 [ 363.472952][T17630] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 363.480938][T17630] RDX: 00000000013d1930 RSI: 00000000013d9970 RDI: 0000000000000003 [ 363.488930][T17630] RBP: 0000000000008041 R08: 0000000000000001 R09: 00000000013d0940 [ 363.496934][T17630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 363.505352][T17630] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 363.518965][T17630] memory: usage 4260kB, limit 0kB, failcnt 28 [ 363.525575][T17630] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 363.534912][T17630] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 363.544051][T17630] Memory cgroup stats for /syz4: cache:20KB rss:20KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 363.592335][T17630] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=17630,uid=0 [ 363.608450][T17630] Memory cgroup out of memory: Killed process 17630 (syz-executor.4) total-vm:72320kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 363.623450][ T1042] oom_reaper: reaped process 17630 (syz-executor.4), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB [ 363.634771][T17637] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 363.647993][T17637] CPU: 0 PID: 17637 Comm: syz-executor.2 Not tainted 5.1.0+ #4 [ 363.655653][T17637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.666016][T17637] Call Trace: [ 363.669329][T17637] dump_stack+0x172/0x1f0 [ 363.673681][T17637] dump_header+0x10f/0xb6c [ 363.678125][T17637] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 363.683948][T17637] ? ___ratelimit+0x60/0x595 [ 363.688663][T17637] ? do_raw_spin_unlock+0x57/0x270 [ 363.693805][T17637] oom_kill_process.cold+0x10/0x15 [ 363.698941][T17637] out_of_memory+0x79a/0x1280 [ 363.703642][T17637] ? oom_killer_disable+0x280/0x280 [ 363.708854][T17637] ? find_held_lock+0x35/0x130 [ 363.713642][T17637] mem_cgroup_out_of_memory+0x1ca/0x230 [ 363.719214][T17637] ? memcg_event_wake+0x230/0x230 [ 363.724265][T17637] ? do_raw_spin_unlock+0x57/0x270 [ 363.729398][T17637] ? _raw_spin_unlock+0x2d/0x50 [ 363.734274][T17637] try_charge+0x102c/0x15c0 [ 363.738789][T17637] ? find_held_lock+0x35/0x130 [ 363.743574][T17637] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 363.749143][T17637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 363.755404][T17637] ? kasan_check_read+0x11/0x20 [ 363.760275][T17637] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 363.765837][T17637] mem_cgroup_try_charge+0x24d/0x5e0 [ 363.771155][T17637] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 363.776812][T17637] wp_page_copy+0x408/0x1740 [ 363.781423][T17637] ? find_held_lock+0x35/0x130 [ 363.786217][T17637] ? pmd_pfn+0x1d0/0x1d0 [ 363.790479][T17637] ? lock_downgrade+0x880/0x880 [ 363.795354][T17637] ? swp_swapcount+0x540/0x540 [ 363.800136][T17637] ? kasan_check_read+0x11/0x20 [ 363.804998][T17637] ? do_raw_spin_unlock+0x57/0x270 [ 363.810124][T17637] do_wp_page+0x48e/0x1500 [ 363.814566][T17637] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 363.819970][T17637] __handle_mm_fault+0x22e8/0x3ec0 [ 363.825106][T17637] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 363.830666][T17637] ? find_held_lock+0x35/0x130 [ 363.835459][T17637] ? handle_mm_fault+0x322/0xb30 [ 363.840423][T17637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 363.846684][T17637] ? kasan_check_read+0x11/0x20 [ 363.851598][T17637] handle_mm_fault+0x43f/0xb30 [ 363.856382][T17637] __do_page_fault+0x5ef/0xda0 [ 363.861169][T17637] do_page_fault+0x71/0x581 [ 363.865683][T17637] ? page_fault+0x8/0x30 [ 363.869940][T17637] page_fault+0x1e/0x30 [ 363.874100][T17637] RIP: 0033:0x4032a2 [ 363.878005][T17637] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 49 85 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 f9 3a 05 00 48 [ 363.897624][T17637] RSP: 002b:00007fff1eaf4b80 EFLAGS: 00010246 [ 363.903713][T17637] RAX: 0000000000000000 RBX: 00000000000586b3 RCX: 0000000000412a80 [ 363.911723][T17637] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007fff1eaf5cb0 [ 363.919824][T17637] RBP: 0000000000000002 R08: 0000000000000001 R09: 000000000144b940 [ 363.927833][T17637] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff1eaf5cb0 [ 363.935828][T17637] R13: 00007fff1eaf5ca0 R14: 0000000000000000 R15: 00007fff1eaf5cb0 11:05:56 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='/\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) [ 363.970335][T17637] memory: usage 4936kB, limit 0kB, failcnt 78 [ 363.994839][T17637] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 364.042555][T17637] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 364.049462][T17637] Memory cgroup stats for /syz2: cache:1460KB rss:44KB rss_huge:0KB shmem:1188KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:520KB active_anon:876KB inactive_file:0KB active_file:0KB unevictable:0KB [ 364.124916][T17637] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=17637,uid=0 [ 364.152751][T17637] Memory cgroup out of memory: Killed process 17637 (syz-executor.2) total-vm:72320kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 364.176188][T17638] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 364.176614][ T1042] oom_reaper: reaped process 17637 (syz-executor.2), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB [ 364.190713][T17638] CPU: 0 PID: 17638 Comm: syz-executor.5 Not tainted 5.1.0+ #4 [ 364.205286][T17638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.215351][T17638] Call Trace: [ 364.218664][T17638] dump_stack+0x172/0x1f0 [ 364.223019][T17638] dump_header+0x10f/0xb6c [ 364.227458][T17638] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 364.233279][T17638] ? ___ratelimit+0x60/0x595 [ 364.237875][T17638] ? do_raw_spin_unlock+0x57/0x270 [ 364.243006][T17638] oom_kill_process.cold+0x10/0x15 [ 364.248130][T17638] out_of_memory+0x79a/0x1280 [ 364.252841][T17638] ? oom_killer_disable+0x280/0x280 [ 364.258061][T17638] ? find_held_lock+0x35/0x130 [ 364.262848][T17638] mem_cgroup_out_of_memory+0x1ca/0x230 [ 364.268410][T17638] ? memcg_event_wake+0x230/0x230 [ 364.271895][ T27] audit: type=1804 audit(1557399956.699:241): pid=17690 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir391231652/syzkaller.vfO9Nt/1/memory.events" dev="sda1" ino=16546 res=1 [ 364.273451][T17638] ? do_raw_spin_unlock+0x57/0x270 [ 364.304102][T17638] ? _raw_spin_unlock+0x2d/0x50 [ 364.309257][T17638] try_charge+0x102c/0x15c0 [ 364.313790][T17638] ? find_held_lock+0x35/0x130 [ 364.318578][T17638] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 364.324166][T17638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 364.330429][T17638] ? kasan_check_read+0x11/0x20 [ 364.331780][ T27] audit: type=1800 audit(1557399956.699:242): pid=17690 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16546 res=0 [ 364.335302][T17638] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 364.369727][T17638] mem_cgroup_try_charge+0x24d/0x5e0 [ 364.375047][T17638] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 364.380735][T17638] __handle_mm_fault+0x1e1f/0x3ec0 [ 364.385872][T17638] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 364.391434][T17638] ? find_held_lock+0x35/0x130 [ 364.397786][T17638] ? handle_mm_fault+0x322/0xb30 [ 364.402758][T17638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 364.409115][T17638] ? kasan_check_read+0x11/0x20 [ 364.414009][T17638] handle_mm_fault+0x43f/0xb30 [ 364.418789][T17638] __do_page_fault+0x5ef/0xda0 [ 364.423659][T17638] do_page_fault+0x71/0x581 [ 364.428172][T17638] ? page_fault+0x8/0x30 [ 364.432422][T17638] page_fault+0x1e/0x30 [ 364.436585][T17638] RIP: 0033:0x4032a2 [ 364.440595][T17638] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 49 85 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 f9 3a 05 00 48 [ 364.460288][T17638] RSP: 002b:00007ffcc8225fb0 EFLAGS: 00010246 [ 364.466364][T17638] RAX: 0000000000000000 RBX: 000000000005873e RCX: 0000000000412a80 11:05:56 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='/\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) [ 364.474326][T17638] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffcc82270e0 [ 364.482284][T17638] RBP: 0000000000000002 R08: 0000000000000001 R09: 00000000020f7940 [ 364.490244][T17638] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcc82270e0 [ 364.498312][T17638] R13: 00007ffcc82270d0 R14: 0000000000000000 R15: 00007ffcc82270e0 [ 364.539729][T17694] IPVS: ftp: loaded support on port[0] = 21 [ 364.563600][T17695] IPVS: ftp: loaded support on port[0] = 21 [ 364.584318][T17638] memory: usage 7496kB, limit 0kB, failcnt 62 [ 364.590541][T17638] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 364.637778][T17638] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 364.663519][T17638] Memory cgroup stats for /syz5: cache:4012KB rss:76KB rss_huge:0KB shmem:3960KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4108KB inactive_file:0KB active_file:4KB unevictable:0KB [ 364.721733][T17638] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=17638,uid=0 [ 364.772227][T17638] Memory cgroup out of memory: Killed process 17638 (syz-executor.5) total-vm:72320kB, anon-rss:72kB, file-rss:34824kB, shmem-rss:0kB [ 364.819694][ T1042] oom_reaper: reaped process 17638 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 11:05:57 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='/\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 11:05:57 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='/\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 11:05:57 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='/\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 11:05:57 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='/\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 11:05:57 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='/\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) [ 365.443027][ T27] audit: type=1804 audit(1557399957.879:243): pid=17699 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir391231652/syzkaller.vfO9Nt/2/memory.events" dev="sda1" ino=16546 res=1 [ 365.519335][ T27] audit: type=1800 audit(1557399957.879:244): pid=17699 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16546 res=0 [ 366.181511][T17695] chnl_net:caif_netlink_parms(): no params data found [ 366.214711][T17694] chnl_net:caif_netlink_parms(): no params data found [ 366.338771][T17695] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.374159][T17695] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.406901][T17695] device bridge_slave_0 entered promiscuous mode [ 366.423925][T17694] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.431064][T17694] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.450319][T17694] device bridge_slave_0 entered promiscuous mode [ 366.483682][T17695] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.495346][T17695] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.511777][ T27] audit: type=1804 audit(1557399958.939:245): pid=17704 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir391231652/syzkaller.vfO9Nt/3/memory.events" dev="sda1" ino=16526 res=1 [ 366.573117][ T27] audit: type=1800 audit(1557399958.939:246): pid=17704 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16526 res=0 [ 366.609971][T17695] device bridge_slave_1 entered promiscuous mode [ 366.640166][T17694] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.651805][T17694] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.660045][T17694] device bridge_slave_1 entered promiscuous mode [ 366.709969][T17695] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 366.733153][T17711] IPVS: ftp: loaded support on port[0] = 21 [ 366.739508][T17695] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 366.750384][T17712] IPVS: ftp: loaded support on port[0] = 21 [ 366.789775][T17694] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 366.806401][T17695] team0: Port device team_slave_0 added [ 366.817247][T17695] team0: Port device team_slave_1 added [ 366.825343][T17694] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 366.871889][T17694] team0: Port device team_slave_0 added [ 366.881866][T17694] team0: Port device team_slave_1 added [ 366.955214][T17695] device hsr_slave_0 entered promiscuous mode [ 367.002030][T17695] device hsr_slave_1 entered promiscuous mode [ 368.805248][T17694] device hsr_slave_0 entered promiscuous mode [ 368.862209][T17694] device hsr_slave_1 entered promiscuous mode [ 370.116882][T17711] chnl_net:caif_netlink_parms(): no params data found [ 370.145577][T17712] chnl_net:caif_netlink_parms(): no params data found [ 370.783520][T17711] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.790755][T17711] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.799326][T17711] device bridge_slave_0 entered promiscuous mode [ 370.828599][T17711] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.836537][T17711] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.845265][T17711] device bridge_slave_1 entered promiscuous mode [ 370.868579][T17712] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.877264][T17712] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.885995][T17712] device bridge_slave_0 entered promiscuous mode [ 370.894973][T17712] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.903737][T17712] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.912256][T17712] device bridge_slave_1 entered promiscuous mode [ 370.951047][T17712] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 370.968394][T17712] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 371.584132][T17711] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 371.596272][T17711] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 371.621096][T17712] team0: Port device team_slave_0 added [ 371.640537][T17695] 8021q: adding VLAN 0 to HW filter on device bond0 [ 371.658992][T17694] 8021q: adding VLAN 0 to HW filter on device bond0 [ 371.669216][T17712] team0: Port device team_slave_1 added [ 372.275633][T17711] team0: Port device team_slave_0 added [ 372.303482][T17695] 8021q: adding VLAN 0 to HW filter on device team0 [ 372.317251][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 372.325437][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 372.335352][T17711] team0: Port device team_slave_1 added [ 372.944712][T17694] 8021q: adding VLAN 0 to HW filter on device team0 [ 372.953947][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 372.967809][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 372.975979][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 372.985563][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 372.994683][ T2989] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.001830][ T2989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.010505][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 373.044961][T17712] device hsr_slave_0 entered promiscuous mode [ 373.082414][T17712] device hsr_slave_1 entered promiscuous mode [ 373.155318][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 373.166060][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 373.176023][T15844] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.183262][T15844] bridge0: port 2(bridge_slave_1) entered forwarding state [ 373.193430][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 373.207094][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 373.215824][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 373.225278][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 373.233956][T15844] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.242349][T15844] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.866719][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 373.875038][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 373.886673][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 373.896997][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.904130][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 373.913104][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 373.922091][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 373.930870][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 373.939956][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 373.950409][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 373.995045][T17711] device hsr_slave_0 entered promiscuous mode [ 374.042207][T17711] device hsr_slave_1 entered promiscuous mode [ 374.105170][T14743] device bridge_slave_1 left promiscuous mode [ 374.111425][T14743] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.152792][T14743] device bridge_slave_0 left promiscuous mode [ 374.158994][T14743] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.214300][T14743] device bridge_slave_1 left promiscuous mode [ 374.220472][T14743] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.262806][T14743] device bridge_slave_0 left promiscuous mode [ 374.268996][T14743] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.323073][T14743] device bridge_slave_1 left promiscuous mode [ 374.329264][T14743] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.382806][T14743] device bridge_slave_0 left promiscuous mode [ 374.389178][T14743] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.413181][T14743] device bridge_slave_1 left promiscuous mode [ 374.419367][T14743] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.452572][T14743] device bridge_slave_0 left promiscuous mode [ 374.458746][T14743] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.513181][T14743] device bridge_slave_1 left promiscuous mode [ 374.519365][T14743] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.562511][T14743] device bridge_slave_0 left promiscuous mode [ 374.568690][T14743] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.623886][T14743] device bridge_slave_1 left promiscuous mode [ 374.630139][T14743] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.664692][T14743] device bridge_slave_0 left promiscuous mode [ 374.670948][T14743] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.713034][T14743] device bridge_slave_1 left promiscuous mode [ 374.719215][T14743] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.772559][T14743] device bridge_slave_0 left promiscuous mode [ 374.778783][T14743] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.823136][T14743] device bridge_slave_1 left promiscuous mode [ 374.829326][T14743] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.873412][T14743] device bridge_slave_0 left promiscuous mode [ 374.879683][T14743] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.785108][T14743] device hsr_slave_1 left promiscuous mode [ 390.829211][T14743] device hsr_slave_0 left promiscuous mode [ 390.887300][T14743] team0 (unregistering): Port device team_slave_1 removed [ 390.899109][T14743] team0 (unregistering): Port device team_slave_0 removed [ 390.910920][T14743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 390.949506][T14743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 391.050308][T14743] bond0 (unregistering): Released all slaves [ 391.205269][T14743] device hsr_slave_1 left promiscuous mode [ 391.248678][T14743] device hsr_slave_0 left promiscuous mode [ 391.315378][T14743] team0 (unregistering): Port device team_slave_1 removed [ 391.331331][T14743] team0 (unregistering): Port device team_slave_0 removed [ 391.344240][T14743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 391.386125][T14743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 391.490226][T14743] bond0 (unregistering): Released all slaves [ 391.633963][T14743] device hsr_slave_1 left promiscuous mode [ 391.687882][T14743] device hsr_slave_0 left promiscuous mode [ 391.746996][T14743] team0 (unregistering): Port device team_slave_1 removed [ 391.759057][T14743] team0 (unregistering): Port device team_slave_0 removed [ 391.772922][T14743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 391.848279][T14743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 391.955416][T14743] bond0 (unregistering): Released all slaves [ 392.083949][T14743] device hsr_slave_1 left promiscuous mode [ 392.139109][T14743] device hsr_slave_0 left promiscuous mode [ 392.205013][T14743] team0 (unregistering): Port device team_slave_1 removed [ 392.220924][T14743] team0 (unregistering): Port device team_slave_0 removed [ 392.233040][T14743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 392.280938][T14743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 392.374355][T14743] bond0 (unregistering): Released all slaves [ 392.504000][T14743] device hsr_slave_1 left promiscuous mode [ 392.557848][T14743] device hsr_slave_0 left promiscuous mode [ 392.606311][T14743] team0 (unregistering): Port device team_slave_1 removed [ 392.623471][T14743] team0 (unregistering): Port device team_slave_0 removed [ 392.636068][T14743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 392.678240][T14743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 392.757987][T14743] bond0 (unregistering): Released all slaves [ 392.945461][T14743] device hsr_slave_1 left promiscuous mode [ 392.987875][T14743] device hsr_slave_0 left promiscuous mode [ 393.044985][T14743] team0 (unregistering): Port device team_slave_1 removed [ 393.056780][T14743] team0 (unregistering): Port device team_slave_0 removed [ 393.069775][T14743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 393.110850][T14743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 393.210747][T14743] bond0 (unregistering): Released all slaves [ 393.375468][T14743] device hsr_slave_1 left promiscuous mode [ 393.416218][T14743] device hsr_slave_0 left promiscuous mode [ 393.467686][T14743] team0 (unregistering): Port device team_slave_1 removed [ 393.479611][T14743] team0 (unregistering): Port device team_slave_0 removed [ 393.493847][T14743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 393.548075][T14743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 393.655994][T14743] bond0 (unregistering): Released all slaves [ 393.795342][T14743] device hsr_slave_1 left promiscuous mode [ 393.851031][T14743] device hsr_slave_0 left promiscuous mode [ 393.907538][T14743] team0 (unregistering): Port device team_slave_1 removed [ 393.919345][T14743] team0 (unregistering): Port device team_slave_0 removed [ 393.930986][T14743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 393.966422][T14743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 394.042813][T14743] bond0 (unregistering): Released all slaves [ 394.146623][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 394.157951][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 394.166923][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 394.176202][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 394.185675][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 394.194646][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 394.204241][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 394.213286][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 394.244960][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 394.253611][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 394.262533][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 394.271274][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 394.280044][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 394.289345][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 394.298256][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 394.309021][T17694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 394.326522][T17695] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 394.406498][T17712] 8021q: adding VLAN 0 to HW filter on device bond0 [ 394.437263][T17695] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 394.454114][T17694] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 394.470870][T17712] 8021q: adding VLAN 0 to HW filter on device team0 [ 394.492904][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 394.500954][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 394.556556][T17602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 394.572983][T17602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 394.592401][T17602] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.599514][T17602] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.610527][T17602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 394.619698][T17602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 394.639414][T17602] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.646593][T17602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 394.664955][T17602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 394.674513][T17602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 394.684508][T17602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 394.738445][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 394.768728][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 394.793750][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 394.812622][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 394.821254][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 394.840363][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 394.862352][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 394.882559][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 394.902600][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 394.923895][T17728] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 394.935311][T17711] 8021q: adding VLAN 0 to HW filter on device bond0 [ 394.945993][T17712] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 394.975930][T17711] 8021q: adding VLAN 0 to HW filter on device team0 [ 394.983855][T17728] CPU: 0 PID: 17728 Comm: syz-executor.0 Not tainted 5.1.0+ #4 [ 394.991426][T17728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.001495][T17728] Call Trace: [ 395.004803][T17728] dump_stack+0x172/0x1f0 [ 395.009154][T17728] dump_header+0x10f/0xb6c [ 395.013615][T17728] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 395.019538][T17728] ? ___ratelimit+0x60/0x595 [ 395.024161][T17728] ? do_raw_spin_unlock+0x57/0x270 [ 395.029314][T17728] oom_kill_process.cold+0x10/0x15 [ 395.034794][T17728] out_of_memory+0x79a/0x1280 [ 395.039494][T17728] ? lock_downgrade+0x880/0x880 [ 395.044358][T17728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.050616][T17728] ? oom_killer_disable+0x280/0x280 [ 395.055857][T17728] ? find_held_lock+0x35/0x130 [ 395.060659][T17728] mem_cgroup_out_of_memory+0x1ca/0x230 [ 395.066248][T17728] ? memcg_event_wake+0x230/0x230 [ 395.071292][T17728] ? do_raw_spin_unlock+0x57/0x270 [ 395.076422][T17728] ? _raw_spin_unlock+0x2d/0x50 [ 395.081311][T17728] try_charge+0x102c/0x15c0 [ 395.085827][T17728] ? find_held_lock+0x35/0x130 [ 395.090608][T17728] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 395.096177][T17728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.102445][T17728] ? kasan_check_read+0x11/0x20 [ 395.107424][T17728] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 395.112992][T17728] mem_cgroup_try_charge+0x24d/0x5e0 [ 395.118385][T17728] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 395.124041][T17728] __handle_mm_fault+0x1e1f/0x3ec0 [ 395.129261][T17728] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 395.134823][T17728] ? find_held_lock+0x35/0x130 [ 395.139603][T17728] ? handle_mm_fault+0x322/0xb30 [ 395.144569][T17728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.150828][T17728] ? kasan_check_read+0x11/0x20 [ 395.155709][T17728] handle_mm_fault+0x43f/0xb30 [ 395.160493][T17728] __do_page_fault+0x5ef/0xda0 [ 395.165279][T17728] do_page_fault+0x71/0x581 [ 395.170061][T17728] ? page_fault+0x8/0x30 [ 395.174320][T17728] page_fault+0x1e/0x30 [ 395.178485][T17728] RIP: 0033:0x4107bf [ 395.182391][T17728] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 395.202033][T17728] RSP: 002b:00007ffe38ed6320 EFLAGS: 00010206 [ 395.208117][T17728] RAX: 00007f1c74df3000 RBX: 0000000000020000 RCX: 0000000000458dfa [ 395.216191][T17728] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 395.224175][T17728] RBP: 00007ffe38ed6400 R08: ffffffffffffffff R09: 0000000000000000 [ 395.232181][T17728] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe38ed64f0 [ 395.240170][T17728] R13: 00007f1c74e13700 R14: 0000000000000001 R15: 000000000073bfac [ 395.260376][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 395.269101][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 395.295292][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 395.304870][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 395.313553][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.320929][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.329464][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 395.338455][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 395.347915][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.355076][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 395.390483][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 395.423504][T17712] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 395.442318][T17728] memory: usage 6756kB, limit 0kB, failcnt 50 [ 395.448461][T17728] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 395.462776][T17728] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 395.469987][T17728] Memory cgroup stats for /syz0: cache:64KB rss:4168KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4208KB inactive_file:0KB active_file:0KB unevictable:0KB [ 395.470784][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 395.501867][T17728] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=17728,uid=0 [ 395.513173][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 395.519101][T17728] Memory cgroup out of memory: Killed process 17728 (syz-executor.0) total-vm:72584kB, anon-rss:4184kB, file-rss:34816kB, shmem-rss:0kB [ 395.539915][ T27] audit: type=1800 audit(1557399987.959:247): pid=17726 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16576 res=0 [ 395.554669][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 395.565031][ T1042] oom_reaper: reaped process 17728 (syz-executor.0), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB 11:06:28 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='/\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 11:06:28 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='/\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 11:06:28 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000380)=0x4) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='/\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 11:06:28 executing program 0: r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862f681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60", 0x2c}], 0x1}, 0x0) [ 395.612229][T17694] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 395.615171][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 395.630974][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 395.652890][T17694] CPU: 1 PID: 17694 Comm: syz-executor.0 Not tainted 5.1.0+ #4 [ 395.659683][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 395.660475][T17694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.660481][T17694] Call Trace: [ 395.660504][T17694] dump_stack+0x172/0x1f0 [ 395.660528][T17694] dump_header+0x10f/0xb6c [ 395.671544][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 395.680505][T17694] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 395.680522][T17694] ? ___ratelimit+0x60/0x595 [ 395.680536][T17694] ? do_raw_spin_unlock+0x57/0x270 [ 395.680554][T17694] oom_kill_process.cold+0x10/0x15 [ 395.680579][T17694] out_of_memory+0x79a/0x1280 [ 395.684729][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 395.688295][T17694] ? lock_downgrade+0x880/0x880 [ 395.688311][T17694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.688333][T17694] ? oom_killer_disable+0x280/0x280 [ 395.695470][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 395.701775][T17694] ? find_held_lock+0x35/0x130 [ 395.701802][T17694] mem_cgroup_out_of_memory+0x1ca/0x230 [ 395.701817][T17694] ? memcg_event_wake+0x230/0x230 [ 395.701836][T17694] ? do_raw_spin_unlock+0x57/0x270 [ 395.701854][T17694] ? _raw_spin_unlock+0x2d/0x50 [ 395.701876][T17694] try_charge+0x102c/0x15c0 [ 395.790022][T17694] ? find_held_lock+0x35/0x130 [ 395.794821][T17694] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 395.800392][T17694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.806666][T17694] ? kasan_check_read+0x11/0x20 [ 395.811544][T17694] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 395.817126][T17694] mem_cgroup_try_charge+0x24d/0x5e0 [ 395.822437][T17694] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 395.828091][T17694] wp_page_copy+0x408/0x1740 [ 395.832689][T17694] ? find_held_lock+0x35/0x130 [ 395.837498][T17694] ? pmd_pfn+0x1d0/0x1d0 [ 395.841743][T17694] ? lock_downgrade+0x880/0x880 [ 395.846582][T17694] ? swp_swapcount+0x540/0x540 [ 395.851335][T17694] ? do_raw_spin_unlock+0x57/0x270 [ 395.856447][T17694] ? kasan_check_read+0x11/0x20 [ 395.861317][T17694] ? do_raw_spin_unlock+0x57/0x270 [ 395.866455][T17694] do_wp_page+0x48e/0x1500 [ 395.870885][T17694] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 395.877237][T17694] __handle_mm_fault+0x22e8/0x3ec0 [ 395.882377][T17694] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 395.887943][T17694] ? find_held_lock+0x35/0x130 [ 395.892762][T17694] ? handle_mm_fault+0x322/0xb30 [ 395.897701][T17694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.903953][T17694] ? kasan_check_read+0x11/0x20 [ 395.908818][T17694] handle_mm_fault+0x43f/0xb30 [ 395.913578][T17694] __do_page_fault+0x5ef/0xda0 [ 395.918983][T17694] do_page_fault+0x71/0x581 [ 395.923509][T17694] ? page_fault+0x8/0x30 [ 395.927762][T17694] page_fault+0x1e/0x30 [ 395.931922][T17694] RIP: 0033:0x42ff36 [ 395.935905][T17694] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 [ 395.956333][T17694] RSP: 002b:00007ffe38ed5330 EFLAGS: 00010206 [ 395.962385][T17694] RAX: 0000000000019691 RBX: 0000000000713640 RCX: 0000000000008041 [ 395.970347][T17694] RDX: 0000000000f2e930 RSI: 0000000000f36970 RDI: 0000000000000003 [ 395.978432][T17694] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000000f2d940 [ 395.986441][T17694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 395.994420][T17694] R13: 0000000000713698 R14: 0000000000000000 R15: 0000000000002710 [ 396.006045][T17694] memory: usage 2268kB, limit 0kB, failcnt 59 [ 396.046490][T17711] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 396.059590][ T9333] WARNING: CPU: 1 PID: 9333 at net/batman-adv/multicast.c:326 batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 396.070794][ T9333] Kernel panic - not syncing: panic_on_warn set ... [ 396.077410][ T9333] CPU: 1 PID: 9333 Comm: kworker/u4:6 Not tainted 5.1.0+ #4 [ 396.084706][ T9333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.094795][ T9333] Workqueue: bat_events batadv_mcast_mla_update [ 396.101057][ T9333] Call Trace: [ 396.104405][ T9333] dump_stack+0x172/0x1f0 [ 396.108770][ T9333] ? batadv_mcast_mla_tt_retract+0x290/0x3d0 [ 396.114890][ T9333] panic+0x2cb/0x65c [ 396.118806][ T9333] ? __warn_printk+0xf3/0xf3 [ 396.123813][ T9333] ? batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 396.129815][ T9333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.131108][T17694] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 396.136073][ T9333] ? __warn.cold+0x5/0x45 [ 396.136103][ T9333] ? __warn+0xe8/0x1d0 [ 396.136120][ T9333] ? batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 396.136144][ T9333] __warn.cold+0x20/0x45 [ 396.152166][T17711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 396.152343][ T9333] ? batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 396.175707][ T9333] report_bug+0x263/0x2b0 [ 396.180159][ T9333] do_error_trap+0x11b/0x200 [ 396.184842][ T9333] do_invalid_op+0x37/0x50 [ 396.189281][ T9333] ? batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 396.195290][ T9333] invalid_op+0x14/0x20 [ 396.199469][ T9333] RIP: 0010:batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 396.200516][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 396.206099][ T9333] Code: bd 1e 74 fa 4c 8b 7d c0 4d 85 ff 0f 85 c3 fd ff ff e8 ab 1e 74 fa 48 83 c4 38 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 97 1e 74 fa <0f> 0b e9 54 fd ff ff e8 7b 92 ac fa e9 37 fe ff ff 48 89 df e8 8e [ 396.206108][ T9333] RSP: 0018:ffff888091bcfb50 EFLAGS: 00010293 [ 396.206119][ T9333] RAX: ffff88808a014640 RBX: 0000000000000001 RCX: ffffffff86fc67cb [ 396.206126][ T9333] RDX: 0000000000000000 RSI: ffffffff86fc6a79 RDI: 0000000000000007 [ 396.206133][ T9333] RBP: ffff888091bcfbb0 R08: ffff88808a014640 R09: 0000000000000003 [ 396.206141][ T9333] R10: ffffed1015d26bdf R11: ffff8880ae935efb R12: ffff888091bcfc98 [ 396.206159][ T9333] R13: ffff88808c048d08 R14: 0000000000000000 R15: ffff888091bcfd08 [ 396.236814][T17694] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 396.239907][ T9333] ? batadv_mcast_mla_tt_retract+0x5b/0x3d0 [ 396.267661][T15844] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 396.272016][ T9333] ? batadv_mcast_mla_tt_retract+0x309/0x3d0 [ 396.272145][ T9333] ? br_multicast_list_adjacent+0x144/0x690 [ 396.272171][ T9333] ? __local_bh_enable_ip+0x15a/0x270 [ 396.318076][ T9333] batadv_mcast_mla_update+0x553/0x1ec0 [ 396.323655][ T9333] ? kasan_check_read+0x10/0x20 [ 396.327294][T17694] Memory cgroup stats for /syz0: cache:64KB rss:48KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 396.328553][ T9333] ? batadv_mcast_tvlv_ogm_handler+0x210/0x210 [ 396.355481][ T9333] process_one_work+0x98e/0x1790 [ 396.372386][ T9333] ? pwq_dec_nr_in_flight+0x320/0x320 [ 396.377794][ T9333] ? lock_acquire+0x16f/0x3f0 [ 396.378402][T17711] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 396.382601][ T9333] worker_thread+0x98/0xe40 [ 396.382703][ T9333] kthread+0x357/0x430 [ 396.399213][ T9333] ? process_one_work+0x1790/0x1790 [ 396.404523][ T9333] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 396.410803][ T9333] ret_from_fork+0x3a/0x50 [ 396.416818][ T9333] Kernel Offset: disabled [ 396.421292][ T9333] Rebooting in 86400 seconds..