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", 0xcfa}], 0x1}, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000008540)={0x0, 0xffffffffffffff33, 0x0}, 0x40) 03:04:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\x04\x00\x00\x00$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xb9<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4020940d, &(0x7f0000000000)=0x4) 03:04:13 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000001200)=ANY=[@ANYBLOB='-3'], 0x2) 03:04:13 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="fa0c000016008152915a655267d7d137ab2ff96e27bf28b285fe3903a44a6017edcaa3a2b4dade3baee72569b51366463fedf5e787c05b0cb5927a3a7edfb4d078e9ae1504d489e058be9fafaa633705b6d4bf6a01f2cd9ebf19724a1b0b9760612582bccd3983ce4474844c065e914dab8bbd52a45f431678bfe28633bf7c8dc83df809238ed87f1e393883ef750ce79c6f84e5e5de176e2f26024e4e3a3d8fbdaf3254022f265d8ccc5fd7205d9d9c2c407ec58162523082d81a39c43f782332ba8e82b4107a049cb82bba8b5edd80473844291437b8d22edca68047582e6be601e9df5e60a32c7cd202c5a30b8b606e43362739551cbb013b65e238f41cc00d7900140cf06b7bc9030f2563bcf9d4f4b7f48c79ec1a323d06276a0a3f8846b7c62b66f9709cabcaad234c53f3bc9b11165a6321f1db1057f076cfaebf8fbfa033fdc1dc2c3e314b36b3b3dd50425447da8bc5938ff7a17361100ab0b1ffeab7ac487411824224781eb9cdd4edef57ae91cd61f56a56c0599cfc3a491447207610f242da6cd6b030ae5f35e3181c44ae68665a023759b9ef4358db46107edc49194aed72b62600ec0ae4fc9065be059fc010cd6e6c9ea77c666b5e25693fbcf595e3e57113ff3a0e0c63d0604a16ea5adb8b7b54d47d4d8804612fde571863064528a49bf684d8a880a11afd819f186c177c49cac3ba1e9d1aa7ad0ff36b9e36d73c05b8abcaf96df0bacd2c9653f30ec29e1284af8749a9b2803c2727e992a6e65df192e1875c3e6d3553ffb7cb34ffee8f8ac0123c390454b42a0316952cbc9949376d9320ec207f77c2d5eb9e86d720cf8e9008a9a51932b45cd4cab21414c92d1c20f9e15e3fc16c7ce181e9ab19b01b70343934c823b1215e173405dd225233823cd4a604a77f06b14eb05b860e6cf8790335788c43abe9de1598e9952e5c7e6b2f8b17b1008ff3033e7d1635b008834bdf4054e6195e55000827c6202b227dde06f23ae21c00b371bdb6b7ea47b2e78844b52a77f9f0929790dcd7df2752e4af092d539c87c18751a5eb3eb4d38a2a0e070064b4ffaacff0543b115cc89f6c7e78f12147ebfcf1c80bac8f98deb59cbe670adb4cd1882a7e0ca4ba85ae9d445223ffb32301d46c0c9b05a830cbea0f72294ab3b539e4ed7cac2e22b235e8ceedeb643fb90b061a58368e76036ff3c1828d8a4e21288662afb6f2acab00d734db7ffc8373a928571819ce9ea6cb0956a6093b2b1f65662b76bc6ac8a171451714e1d0e4ff76470c7651d3cf16f37cb5547317e4fef51e4fb471de6ffbb90c2dd4a64266c4c2f75fc62e58ec306fb92212fb262d8b138899a3b53e67cde2f97d94cd2265cc04d32b29edf77e75b1f88372495cb2937f183bfc8604d72efb3af5c1f41b665b25592676b0ad2185478eade7e663e743e0e09cce6224c787ce1d789dc4a9b350bfe3a75f551341b11dd96cdaea17989dad565b16324a69842dc29a0ed16744ea5935598ac8238e146139189927a14d3b2863044b63b468ae75f48fab68ad235c36daffebfe4b468fc9b13198b1a683dcd3b3b4294ba22caddbacf8792d5783bc12e2538e4609e6bb6e9eeab98a06452c252a657f400260458c29fae8879097698c9aba2b2d889fc78f00d0d8271e09e8542b71018be6ff8cb03cb423e79303047d6ce124a00f64461b899bbddc4fe87ff677533391e16c01fa9cd6420bdc856c4c7f057b249ee9817efd6ab2cd02eb887d2631435ef2d5a1c7e57ac046ef615a1285ca89ade18ae69af3b3f8f76ca8aa060e373c0f99424fe1c5fadc72fe145fd2d4e4da4b78597890516857de188fcdaf15e3b0871b346cd39ab772cc25fab49e60c818cde934b137144adfc4fbde3ddbeccce9679f02b66746e822c67b3ed5fdafb4a936a2683b39a002115ecd62220605ca542610a80f2e3530aa89d3ed6ed9c57bbfd5db3a0b62786a608309a355443c616032008f9458b2f10db93e29470192370084e9322c309c9b23333b46d04e79176659503ad4b05deebb3c67d715ee6e84a89002ea6f7f71bf41ad36b42c8ae01c97174dbb641e50641aba60c291a84e906c013087370a5043e07d36fcead378f6c1e6ed3f5ac695124b82b20261cf7c9b82172e09c81d7d39eed72aee5678613a3c671ddd44f2c7c75a3b5d316aa165d56594fccab20903d7f503a08928e76c779918b2463b720ee6367a43e494a1db3ed1a80690e665570c01ce7eb979cdd95d4e1ca51730eb2cd63ffb2a56049601627c9788254945142dce85adbe1eb5997d16cdfe2a3758b13dc6bb121e2206ae64206868c1c5e89a101bc121719ac435dcad093f5f67cefd863cc7c8f3fc8a9dc62a83c115f1ce714b18af067951aa06dd9bb4ed98a820bf4704d156977caa4e6415b2a0df0386e2f6a061bf44abc8a397cf4abdafc51b78ebec9831f3c60fde6e62a1fd082903080aef20ff8de8bc0dced06f627514600539ca7114a088848da4244a85b4cf5b976d3a698c9a568d417e276917baba05d1a02181db2e6cc35986da4ccc63f8cd8e85a4a923dd27e2f499664601fdc44fdf46e2d2880cd5a7ece89c370234c438dcc0b43865cc62bad21e9dc37da758cbe01752f02fd9cbfe98630a30a78bb1239e25cdaba3d45d13cd3e7216d9d8070f3ff1a0cd9a0c91f29974c98f2677ba88c1091bde4be0cd37ea5eeb3b9cd59560a00ddd40bbd60ffb8d4daa973ef0977c18dd4b38a605cee957872dca85787c37b6931293eddb77015faf143d1d28d24822d1a5d134799e8175a38b255aaf0e39b68c7f734e2e1e7044626daa84c9113e86d86ef63c86010000000000000061dcf516c32d49478f7af30d52baa18ea6b0fc286c06b7e4ee019bf3fe74845a652d4a52aaa241a189c411e90e2953863a2bc4124e573607b94cdff19e280731824931a83f056cb5857672619b97ce38081592c0c319ce72e04e9eadce89775cfb5a4b2842663bc79bde565435cbcd46c4d505ceef7dde86512d39d4cb270deb7e79ebf8602bdc0d76c3e833d36ee08be10be634f44056c2f3fd6a328c7cd562e9c96ff7845fc3df81a876bb07f1cc833bed6ca1dc5cf935a4e959db6a4fae6edbc45357d8758faa9cd04cd41eb6efcfbd91658519bf520b90107f767d126854818485e98cb7ef56804de6950bf4e72098a949d14ea0e4e9f2534cf16cac0aeb970fc5c39f37e93910d5c99ac163792260d2280ec5c9a79bf295588ec23f524aae65f800f9c39e338f3d66b1a69e5488e04823eab36ae6ec6a2c5ce133ccd819a2b217b1ab7f4afd1697bb42929b3131358b5421c83f925571934442d0fd0ce3990d4e5d31d8b956f76df3c2f8533e46b892c88692ce009155dd5c7dbe4c86874b95762650f63e4b4aabb41320978b05b80cfe8fa2830904ef6b5c4f7ad46ca5dac151c9077c4d2c6adfe5066a8eb09a9bc6892330ea2b259a53c7137f8498254e1b04bf920c35c5333c4d640b11da60917ae921037b4aedbd6a0fbeeaf88ef6defc830552b4cbe3fe2a844806a48923dd428ea1c8d797bd8e6aabd1d1a8c97c8038b627120a77f4e47fa1f788aa9da268b0ec10fc453cb722685df76547dbf55a16663aa2b2a51e9c52456cccdf682592d1369dd12e3d3cb504e0f2d7004e62c297d5a25d0298045dae8fca8cb795ea57288b85a7e705820087d55ca6c42e920e2aa1174e128622cf64a197fd728cb2949536ba63e8bda8589261f1377caea37302e47228d3708a5666c66ba711d3c0b310a8c47e86d26597299d523c28c90e4feab43e950f398f7b61ccf7e6490d75ba6d8214e2d5ef2d7a088db490e1ebacf4e6eecc896cb1c704f0a8fcdf4ccb5dfa53eaf43d709287f36c10188c19fd59da7d73494de089c1b0a69ee22dcb847001c5317846a876bee1685d11c4db0673ec4c3a12008bb719650525b3c39e2b0469edda93830b3f1bde3e5b0b4637197866bb08c5858cf0d9876e3c7cad54169887bf9c80f9f4be362e1bc8c27f3434e9a918bac355c184bd899b9aebe6be20e70c0c69234342eb8b57aa9ffb7797a32df91cec2bbc90201658ca2297bf1fe68e65363867e1f6ad79b827f363d64fbd3b188d95307d011c4ce5bf4407908c058eeb97ec98dd0ebfdab6b348fa387f2a7573cac25344c983e8fd526c30ee6d59fe99a30c7d7e2864aa22bfa49df5f32da68309cab3ed9c2ce69b6ecb8508ce28a43ebd6c809b8afd07a4606e664965d316f3707a3abee9bcdc32a78031b0171fb565d90c16cd56e5792c0cf618b799715f32538e38f493d4e19ec76fc8a07576a13975706bfc2bb1516c2d18a4385cc37a206eac6c9fb8d073576a1f56d529e407154fdd0c40d079ae44962c26743b4bf5950ac5ee34c5d7bd60b364ce670958112c37b9829bed7e1327356d6b94af3ba020c2337b2dba37d00af8a128a614390cdde62ce871f948427fb5c187df9a1540a5cc71da1a86144acbfd94bf433f744f0c4f2a675eba3ed251c5b11b08dfefc726c0394a9b75121d88467ed4b2cd69819dfe50693a4a4c8370d3af12f41c0067283bbb5a90044a340fc357a11081a6c13bb9c32d9caa448479fd5f0302b6729ca7233094540b14546d6bcc15771c2686279b34f9c0914f5306d0fabd5979266ea01a17a22507e560dbf904dd62c40e2bccb468710ee4c1caf4e786", 0xcfa}], 0x1}, 0x8d0) [ 330.409430][T16735] __nla_validate_parse: 7 callbacks suppressed [ 330.409459][T16735] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.1'. 03:04:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\x04\x00\x00\x00$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xb9<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4020940d, &(0x7f0000000000)=0x4) 03:04:13 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="fa0c000016008152915a655267d7d137ab2ff96e27bf28b285fe3903a44a6017edcaa3a2b4dade3baee72569b51366463fedf5e787c05b0cb5927a3a7edfb4d078e9ae1504d489e058be9fafaa633705b6d4bf6a01f2cd9ebf19724a1b0b9760612582bccd3983ce4474844c065e914dab8bbd52a45f431678bfe28633bf7c8dc83df809238ed87f1e393883ef750ce79c6f84e5e5de176e2f26024e4e3a3d8fbdaf3254022f265d8ccc5fd7205d9d9c2c407ec58162523082d81a39c43f782332ba8e82b4107a049cb82bba8b5edd80473844291437b8d22edca68047582e6be601e9df5e60a32c7cd202c5a30b8b606e43362739551cbb013b65e238f41cc00d7900140cf06b7bc9030f2563bcf9d4f4b7f48c79ec1a323d06276a0a3f8846b7c62b66f9709cabcaad234c53f3bc9b11165a6321f1db1057f076cfaebf8fbfa033fdc1dc2c3e314b36b3b3dd50425447da8bc5938ff7a17361100ab0b1ffeab7ac487411824224781eb9cdd4edef57ae91cd61f56a56c0599cfc3a491447207610f242da6cd6b030ae5f35e3181c44ae68665a023759b9ef4358db46107edc49194aed72b62600ec0ae4fc9065be059fc010cd6e6c9ea77c666b5e25693fbcf595e3e57113ff3a0e0c63d0604a16ea5adb8b7b54d47d4d8804612fde571863064528a49bf684d8a880a11afd819f186c177c49cac3ba1e9d1aa7ad0ff36b9e36d73c05b8abcaf96df0bacd2c9653f30ec29e1284af8749a9b2803c2727e992a6e65df192e1875c3e6d3553ffb7cb34ffee8f8ac0123c390454b42a0316952cbc9949376d9320ec207f77c2d5eb9e86d720cf8e9008a9a51932b45cd4cab21414c92d1c20f9e15e3fc16c7ce181e9ab19b01b70343934c823b1215e173405dd225233823cd4a604a77f06b14eb05b860e6cf8790335788c43abe9de1598e9952e5c7e6b2f8b17b1008ff3033e7d1635b008834bdf4054e6195e55000827c6202b227dde06f23ae21c00b371bdb6b7ea47b2e78844b52a77f9f0929790dcd7df2752e4af092d539c87c18751a5eb3eb4d38a2a0e070064b4ffaacff0543b115cc89f6c7e78f12147ebfcf1c80bac8f98deb59cbe670adb4cd1882a7e0ca4ba85ae9d445223ffb32301d46c0c9b05a830cbea0f72294ab3b539e4ed7cac2e22b235e8ceedeb643fb90b061a58368e76036ff3c1828d8a4e21288662afb6f2acab00d734db7ffc8373a928571819ce9ea6cb0956a6093b2b1f65662b76bc6ac8a171451714e1d0e4ff76470c7651d3cf16f37cb5547317e4fef51e4fb471de6ffbb90c2dd4a64266c4c2f75fc62e58ec306fb92212fb262d8b138899a3b53e67cde2f97d94cd2265cc04d32b29edf77e75b1f88372495cb2937f183bfc8604d72efb3af5c1f41b665b25592676b0ad2185478eade7e663e743e0e09cce6224c787ce1d789dc4a9b350bfe3a75f551341b11dd96cdaea17989dad565b16324a69842dc29a0ed16744ea5935598ac8238e146139189927a14d3b2863044b63b468ae75f48fab68ad235c36daffebfe4b468fc9b13198b1a683dcd3b3b4294ba22caddbacf8792d5783bc12e2538e4609e6bb6e9eeab98a06452c252a657f400260458c29fae8879097698c9aba2b2d889fc78f00d0d8271e09e8542b71018be6ff8cb03cb423e79303047d6ce124a00f64461b899bbddc4fe87ff677533391e16c01fa9cd6420bdc856c4c7f057b249ee9817efd6ab2cd02eb887d2631435ef2d5a1c7e57ac046ef615a1285ca89ade18ae69af3b3f8f76ca8aa060e373c0f99424fe1c5fadc72fe145fd2d4e4da4b78597890516857de188fcdaf15e3b0871b346cd39ab772cc25fab49e60c818cde934b137144adfc4fbde3ddbeccce9679f02b66746e822c67b3ed5fdafb4a936a2683b39a002115ecd62220605ca542610a80f2e3530aa89d3ed6ed9c57bbfd5db3a0b62786a608309a355443c616032008f9458b2f10db93e29470192370084e9322c309c9b23333b46d04e79176659503ad4b05deebb3c67d715ee6e84a89002ea6f7f71bf41ad36b42c8ae01c97174dbb641e50641aba60c291a84e906c013087370a5043e07d36fcead378f6c1e6ed3f5ac695124b82b20261cf7c9b82172e09c81d7d39eed72aee5678613a3c671ddd44f2c7c75a3b5d316aa165d56594fccab20903d7f503a08928e76c779918b2463b720ee6367a43e494a1db3ed1a80690e665570c01ce7eb979cdd95d4e1ca51730eb2cd63ffb2a56049601627c9788254945142dce85adbe1eb5997d16cdfe2a3758b13dc6bb121e2206ae64206868c1c5e89a101bc121719ac435dcad093f5f67cefd863cc7c8f3fc8a9dc62a83c115f1ce714b18af067951aa06dd9bb4ed98a820bf4704d156977caa4e6415b2a0df0386e2f6a061bf44abc8a397cf4abdafc51b78ebec9831f3c60fde6e62a1fd082903080aef20ff8de8bc0dced06f627514600539ca7114a088848da4244a85b4cf5b976d3a698c9a568d417e276917baba05d1a02181db2e6cc35986da4ccc63f8cd8e85a4a923dd27e2f499664601fdc44fdf46e2d2880cd5a7ece89c370234c438dcc0b43865cc62bad21e9dc37da758cbe01752f02fd9cbfe98630a30a78bb1239e25cdaba3d45d13cd3e7216d9d8070f3ff1a0cd9a0c91f29974c98f2677ba88c1091bde4be0cd37ea5eeb3b9cd59560a00ddd40bbd60ffb8d4daa973ef0977c18dd4b38a605cee957872dca85787c37b6931293eddb77015faf143d1d28d24822d1a5d134799e8175a38b255aaf0e39b68c7f734e2e1e7044626daa84c9113e86d86ef63c86010000000000000061dcf516c32d49478f7af30d52baa18ea6b0fc286c06b7e4ee019bf3fe74845a652d4a52aaa241a189c411e90e2953863a2bc4124e573607b94cdff19e280731824931a83f056cb5857672619b97ce38081592c0c319ce72e04e9eadce89775cfb5a4b2842663bc79bde565435cbcd46c4d505ceef7dde86512d39d4cb270deb7e79ebf8602bdc0d76c3e833d36ee08be10be634f44056c2f3fd6a328c7cd562e9c96ff7845fc3df81a876bb07f1cc833bed6ca1dc5cf935a4e959db6a4fae6edbc45357d8758faa9cd04cd41eb6efcfbd91658519bf520b90107f767d126854818485e98cb7ef56804de6950bf4e72098a949d14ea0e4e9f2534cf16cac0aeb970fc5c39f37e93910d5c99ac163792260d2280ec5c9a79bf295588ec23f524aae65f800f9c39e338f3d66b1a69e5488e04823eab36ae6ec6a2c5ce133ccd819a2b217b1ab7f4afd1697bb42929b3131358b5421c83f925571934442d0fd0ce3990d4e5d31d8b956f76df3c2f8533e46b892c88692ce009155dd5c7dbe4c86874b95762650f63e4b4aabb41320978b05b80cfe8fa2830904ef6b5c4f7ad46ca5dac151c9077c4d2c6adfe5066a8eb09a9bc6892330ea2b259a53c7137f8498254e1b04bf920c35c5333c4d640b11da60917ae921037b4aedbd6a0fbeeaf88ef6defc830552b4cbe3fe2a844806a48923dd428ea1c8d797bd8e6aabd1d1a8c97c8038b627120a77f4e47fa1f788aa9da268b0ec10fc453cb722685df76547dbf55a16663aa2b2a51e9c52456cccdf682592d1369dd12e3d3cb504e0f2d7004e62c297d5a25d0298045dae8fca8cb795ea57288b85a7e705820087d55ca6c42e920e2aa1174e128622cf64a197fd728cb2949536ba63e8bda8589261f1377caea37302e47228d3708a5666c66ba711d3c0b310a8c47e86d26597299d523c28c90e4feab43e950f398f7b61ccf7e6490d75ba6d8214e2d5ef2d7a088db490e1ebacf4e6eecc896cb1c704f0a8fcdf4ccb5dfa53eaf43d709287f36c10188c19fd59da7d73494de089c1b0a69ee22dcb847001c5317846a876bee1685d11c4db0673ec4c3a12008bb719650525b3c39e2b0469edda93830b3f1bde3e5b0b4637197866bb08c5858cf0d9876e3c7cad54169887bf9c80f9f4be362e1bc8c27f3434e9a918bac355c184bd899b9aebe6be20e70c0c69234342eb8b57aa9ffb7797a32df91cec2bbc90201658ca2297bf1fe68e65363867e1f6ad79b827f363d64fbd3b188d95307d011c4ce5bf4407908c058eeb97ec98dd0ebfdab6b348fa387f2a7573cac25344c983e8fd526c30ee6d59fe99a30c7d7e2864aa22bfa49df5f32da68309cab3ed9c2ce69b6ecb8508ce28a43ebd6c809b8afd07a4606e664965d316f3707a3abee9bcdc32a78031b0171fb565d90c16cd56e5792c0cf618b799715f32538e38f493d4e19ec76fc8a07576a13975706bfc2bb1516c2d18a4385cc37a206eac6c9fb8d073576a1f56d529e407154fdd0c40d079ae44962c26743b4bf5950ac5ee34c5d7bd60b364ce670958112c37b9829bed7e1327356d6b94af3ba020c2337b2dba37d00af8a128a614390cdde62ce871f948427fb5c187df9a1540a5cc71da1a86144acbfd94bf433f744f0c4f2a675eba3ed251c5b11b08dfefc726c0394a9b75121d88467ed4b2cd69819dfe50693a4a4c8370d3af12f41c0067283bbb5a90044a340fc357a11081a6c13bb9c32d9caa448479fd5f0302b6729ca7233094540b14546d6bcc15771c2686279b34f9c0914f5306d0fabd5979266ea01a17a22507e560dbf904dd62c40e2bccb468710ee4c1caf4e786", 0xcfa}], 0x1}, 0x8d0) [ 330.513415][T16735] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.1'. 03:04:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\x04\x00\x00\x00$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xb9<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4020940d, &(0x7f0000000000)=0x4) 03:04:13 executing program 1: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f00000045c0)={&(0x7f0000004340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000004540)=[{0x0}], 0x1}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)="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", 0xcfa}], 0x1}, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000008540)={0x0, 0xffffffffffffff33, 0x0}, 0x40) 03:04:13 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000001200)=ANY=[@ANYBLOB='-3'], 0x2) [ 330.698216][T16758] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.1'. 03:04:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\x04\x00\x00\x00$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xb9<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4020940d, &(0x7f0000000000)=0x4) 03:04:13 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) close(r0) 03:04:13 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1}, 0x8d0) [ 330.808294][T16758] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.1'. 03:04:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\x04\x00\x00\x00$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xb9<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4020940d, &(0x7f0000000000)=0x4) 03:04:13 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000001200)=ANY=[@ANYBLOB='-3'], 0x2) 03:04:13 executing program 1: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f00000045c0)={&(0x7f0000004340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000004540)=[{0x0}], 0x1}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)="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", 0xcfa}], 0x1}, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000008540)={0x0, 0xffffffffffffff33, 0x0}, 0x40) 03:04:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\x04\x00\x00\x00$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xb9<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4020940d, &(0x7f0000000000)=0x4) 03:04:13 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="fa0c000016008152915a655267d7d137ab2ff96e27bf28b285fe3903a44a6017edcaa3a2b4dade3baee72569b51366463fedf5e787c05b0cb5927a3a7edfb4d078e9ae1504d489e058be9fafaa633705b6d4bf6a01f2cd9ebf19724a1b0b9760612582bccd3983ce4474844c065e914dab8bbd52a45f431678bfe28633bf7c8dc83df809238ed87f1e393883ef750ce79c6f84e5e5de176e2f26024e4e3a3d8fbdaf3254022f265d8ccc5fd7205d9d9c2c407ec58162523082d81a39c43f782332ba8e82b4107a049cb82bba8b5edd80473844291437b8d22edca68047582e6be601e9df5e60a32c7cd202c5a30b8b606e43362739551cbb013b65e238f41cc00d7900140cf06b7bc9030f2563bcf9d4f4b7f48c79ec1a323d06276a0a3f8846b7c62b66f9709cabcaad234c53f3bc9b11165a6321f1db1057f076cfaebf8fbfa033fdc1dc2c3e314b36b3b3dd50425447da8bc5938ff7a17361100ab0b1ffeab7ac487411824224781eb9cdd4edef57ae91cd61f56a56c0599cfc3a491447207610f242da6cd6b030ae5f35e3181c44ae68665a023759b9ef4358db46107edc49194aed72b62600ec0ae4fc9065be059fc010cd6e6c9ea77c666b5e25693fbcf595e3e57113ff3a0e0c63d0604a16ea5adb8b7b54d47d4d8804612fde571863064528a49bf684d8a880a11afd819f186c177c49cac3ba1e9d1aa7ad0ff36b9e36d73c05b8abcaf96df0bacd2c9653f30ec29e1284af8749a9b2803c2727e992a6e65df192e1875c3e6d3553ffb7cb34ffee8f8ac0123c390454b42a0316952cbc9949376d9320ec207f77c2d5eb9e86d720cf8e9008a9a51932b45cd4cab21414c92d1c20f9e15e3fc16c7ce181e9ab19b01b70343934c823b1215e173405dd225233823cd4a604a77f06b14eb05b860e6cf8790335788c43abe9de1598e9952e5c7e6b2f8b17b1008ff3033e7d1635b008834bdf4054e6195e55000827c6202b227dde06f23ae21c00b371bdb6b7ea47b2e78844b52a77f9f0929790dcd7df2752e4af092d539c87c18751a5eb3eb4d38a2a0e070064b4ffaacff0543b115cc89f6c7e78f12147ebfcf1c80bac8f98deb59cbe670adb4cd1882a7e0ca4ba85ae9d445223ffb32301d46c0c9b05a830cbea0f72294ab3b539e4ed7cac2e22b235e8ceedeb643fb90b061a58368e76036ff3c1828d8a4e21288662afb6f2acab00d734db7ffc8373a928571819ce9ea6cb0956a6093b2b1f65662b76bc6ac8a171451714e1d0e4ff76470c7651d3cf16f37cb5547317e4fef51e4fb471de6ffbb90c2dd4a64266c4c2f75fc62e58ec306fb92212fb262d8b138899a3b53e67cde2f97d94cd2265cc04d32b29edf77e75b1f88372495cb2937f183bfc8604d72efb3af5c1f41b665b25592676b0ad2185478eade7e663e743e0e09cce6224c787ce1d789dc4a9b350bfe3a75f551341b11dd96cdaea17989dad565b16324a69842dc29a0ed16744ea5935598ac8238e146139189927a14d3b2863044b63b468ae75f48fab68ad235c36daffebfe4b468fc9b13198b1a683dcd3b3b4294ba22caddbacf8792d5783bc12e2538e4609e6bb6e9eeab98a06452c252a657f400260458c29fae8879097698c9aba2b2d889fc78f00d0d8271e09e8542b71018be6ff8cb03cb423e79303047d6ce124a00f64461b899bbddc4fe87ff677533391e16c01fa9cd6420bdc856c4c7f057b249ee9817efd6ab2cd02eb887d2631435ef2d5a1c7e57ac046ef615a1285ca89ade18ae69af3b3f8f76ca8aa060e373c0f99424fe1c5fadc72fe145fd2d4e4da4b78597890516857de188fcdaf15e3b0871b346cd39ab772cc25fab49e60c818cde934b137144adfc4fbde3ddbeccce9679f02b66746e822c67b3ed5fdafb4a936a2683b39a002115ecd62220605ca542610a80f2e3530aa89d3ed6ed9c57bbfd5db3a0b62786a608309a355443c616032008f9458b2f10db93e29470192370084e9322c309c9b23333b46d04e79176659503ad4b05deebb3c67d715ee6e84a89002ea6f7f71bf41ad36b42c8ae01c97174dbb641e50641aba60c291a84e906c013087370a5043e07d36fcead378f6c1e6ed3f5ac695124b82b20261cf7c9b82172e09c81d7d39eed72aee5678613a3c671ddd44f2c7c75a3b5d316aa165d56594fccab20903d7f503a08928e76c779918b2463b720ee6367a43e494a1db3ed1a80690e665570c01ce7eb979cdd95d4e1ca51730eb2cd63ffb2a56049601627c9788254945142dce85adbe1eb5997d16cdfe2a3758b13dc6bb121e2206ae64206868c1c5e89a101bc121719ac435dcad093f5f67cefd863cc7c8f3fc8a9dc62a83c115f1ce714b18af067951aa06dd9bb4ed98a820bf4704d156977caa4e6415b2a0df0386e2f6a061bf44abc8a397cf4abdafc51b78ebec9831f3c60fde6e62a1fd082903080aef20ff8de8bc0dced06f627514600539ca7114a088848da4244a85b4cf5b976d3a698c9a568d417e276917baba05d1a02181db2e6cc35986da4ccc63f8cd8e85a4a923dd27e2f499664601fdc44fdf46e2d2880cd5a7ece89c370234c438dcc0b43865cc62bad21e9dc37da758cbe01752f02fd9cbfe98630a30a78bb1239e25cdaba3d45d13cd3e7216d9d8070f3ff1a0cd9a0c91f29974c98f2677ba88c1091bde4be0cd37ea5eeb3b9cd59560a00ddd40bbd60ffb8d4daa973ef0977c18dd4b38a605cee957872dca85787c37b6931293eddb77015faf143d1d28d24822d1a5d134799e8175a38b255aaf0e39b68c7f734e2e1e7044626daa84c9113e86d86ef63c86010000000000000061dcf516c32d49478f7af30d52baa18ea6b0fc286c06b7e4ee019bf3fe74845a652d4a52aaa241a189c411e90e2953863a2bc4124e573607b94cdff19e280731824931a83f056cb5857672619b97ce38081592c0c319ce72e04e9eadce89775cfb5a4b2842663bc79bde565435cbcd46c4d505ceef7dde86512d39d4cb270deb7e79ebf8602bdc0d76c3e833d36ee08be10be634f44056c2f3fd6a328c7cd562e9c96ff7845fc3df81a876bb07f1cc833bed6ca1dc5cf935a4e959db6a4fae6edbc45357d8758faa9cd04cd41eb6efcfbd91658519bf520b90107f767d126854818485e98cb7ef56804de6950bf4e72098a949d14ea0e4e9f2534cf16cac0aeb970fc5c39f37e93910d5c99ac163792260d2280ec5c9a79bf295588ec23f524aae65f800f9c39e338f3d66b1a69e5488e04823eab36ae6ec6a2c5ce133ccd819a2b217b1ab7f4afd1697bb42929b3131358b5421c83f925571934442d0fd0ce3990d4e5d31d8b956f76df3c2f8533e46b892c88692ce009155dd5c7dbe4c86874b95762650f63e4b4aabb41320978b05b80cfe8fa2830904ef6b5c4f7ad46ca5dac151c9077c4d2c6adfe5066a8eb09a9bc6892330ea2b259a53c7137f8498254e1b04bf920c35c5333c4d640b11da60917ae921037b4aedbd6a0fbeeaf88ef6defc830552b4cbe3fe2a844806a48923dd428ea1c8d797bd8e6aabd1d1a8c97c8038b627120a77f4e47fa1f788aa9da268b0ec10fc453cb722685df76547dbf55a16663aa2b2a51e9c52456cccdf682592d1369dd12e3d3cb504e0f2d7004e62c297d5a25d0298045dae8fca8cb795ea57288b85a7e705820087d55ca6c42e920e2aa1174e128622cf64a197fd728cb2949536ba63e8bda8589261f1377caea37302e47228d3708a5666c66ba711d3c0b310a8c47e86d26597299d523c28c90e4feab43e950f398f7b61ccf7e6490d75ba6d8214e2d5ef2d7a088db490e1ebacf4e6eecc896cb1c704f0a8fcdf4ccb5dfa53eaf43d709287f36c10188c19fd59da7d73494de089c1b0a69ee22dcb847001c5317846a876bee1685d11c4db0673ec4c3a12008bb719650525b3c39e2b0469edda93830b3f1bde3e5b0b4637197866bb08c5858cf0d9876e3c7cad54169887bf9c80f9f4be362e1bc8c27f3434e9a918bac355c184bd899b9aebe6be20e70c0c69234342eb8b57aa9ffb7797a32df91cec2bbc90201658ca2297bf1fe68e65363867e1f6ad79b827f363d64fbd3b188d95307d011c4ce5bf4407908c058eeb97ec98dd0ebfdab6b348fa387f2a7573cac25344c983e8fd526c30ee6d59fe99a30c7d7e2864aa22bfa49df5f32da68309cab3ed9c2ce69b6ecb8508ce28a43ebd6c809b8afd07a4606e664965d316f3707a3abee9bcdc32a78031b0171fb565d90c16cd56e5792c0cf618b799715f32538e38f493d4e19ec76fc8a07576a13975706bfc2bb1516c2d18a4385cc37a206eac6c9fb8d073576a1f56d529e407154fdd0c40d079ae44962c26743b4bf5950ac5ee34c5d7bd60b364ce670958112c37b9829bed7e1327356d6b94af3ba020c2337b2dba37d00af8a128a614390cdde62ce871f948427fb5c187df9a1540a5cc71da1a86144acbfd94bf433f744f0c4f2a675eba3ed251c5b11b08dfefc726c0394a9b75121d88467ed4b2cd69819dfe50693a4a4c8370d3af12f41c0067283bbb5a90044a340fc357a11081a6c13bb9c32d9caa448479fd5f0302b6729ca7233094540b14546d6bcc15771c2686279b34f9c0914f5306d0fabd5979266ea01a17a22507e560dbf904dd62c40e2bccb468710ee4c1caf4e786", 0xcfa}], 0x1}, 0x8d0) 03:04:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\x04\x00\x00\x00$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xb9<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4020940d, &(0x7f0000000000)=0x4) [ 331.093218][T16783] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.1'. 03:04:14 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000001200)=ANY=[@ANYBLOB='-3'], 0x2) 03:04:14 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x82, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x26000) 03:04:14 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) close(r0) 03:04:14 executing program 1: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f00000045c0)={&(0x7f0000004340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000004540)=[{0x0}], 0x1}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)="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", 0xcfa}], 0x1}, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000008540)={0x0, 0xffffffffffffff33, 0x0}, 0x40) 03:04:14 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) close(r0) 03:04:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000005c0)={'hwsim0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x2c) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) 03:04:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[], 0x0}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x13, 0x0, 0x62, 0x0, 0x4, 0x14809, 0x8, 0x5, 0x8, 0x0, 0xcb91, 0x5, 0xffffffffffffcb47, 0x4, 0x3ff, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x6, 0x5, 0x400, 0x0, 0x1bcc, 0x0, 0x8000, 0x7, 0x4, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x7ff, 0x9}, r2, 0x0, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuacct.usage\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 331.416268][T16808] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.1'. [ 331.478482][T16808] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.1'. 03:04:14 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) close(r0) 03:04:14 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='GPL*\x00'}, 0x30) write$cgroup_pid(r1, &(0x7f0000000300)=r2, 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg$kcm(r3, &(0x7f0000012280)={&(0x7f0000010fc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000011200)=[{&(0x7f0000011040)=""/33, 0x21}, {&(0x7f0000011080)=""/26, 0x1a}, {&(0x7f00000110c0)=""/66, 0x42}, {&(0x7f0000011140)=""/79, 0x4f}, {&(0x7f00000111c0)=""/57, 0x39}], 0x5, &(0x7f0000011280)=""/4096, 0x1000}, 0x101) bpf$MAP_CREATE(0x0, &(0x7f00000122c0)={0xd, 0x2, 0xfffffffffffffffb, 0x7fffffff, 0x8, r0, 0x6, [], r6, r3, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4, 0x8000, 0x0, 0xfffffffffffffff9, 0x0, 0x1, 0x2001, 0x1, 0xaef, 0x847, 0x1, 0x3, 0x3, 0x3, 0x7fff, 0x0, 0x9, 0x6, 0x6, 0xffffffff00000000, 0x6eaf876e, 0x7, 0x3f, 0x5bb9, 0x6, 0x0, 0x33c000000000000, 0x3, 0x80000001, 0x6, 0x100000000, 0x1ff, 0x5, 0x3f, 0x1, 0x80000001, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000340)}, 0x510, 0x148abad2, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x7}, r2, 0x3, r5, 0x8) write$cgroup_type(r5, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="0007000000001ed73f2cf25dbc0100007a00"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc020660b, 0x20000001) openat$cgroup_subtree(r4, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_type(r3, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 03:04:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[], 0x0}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x13, 0x0, 0x62, 0x0, 0x4, 0x14809, 0x8, 0x5, 0x8, 0x0, 0xcb91, 0x5, 0xffffffffffffcb47, 0x4, 0x3ff, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x6, 0x5, 0x400, 0x0, 0x1bcc, 0x0, 0x8000, 0x7, 0x4, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x7ff, 0x9}, r2, 0x0, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuacct.usage\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:04:14 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) close(r0) 03:04:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000005c0)={'hwsim0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x2c) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) 03:04:14 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x82, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x26000) 03:04:14 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) close(r0) 03:04:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[], 0x0}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x13, 0x0, 0x62, 0x0, 0x4, 0x14809, 0x8, 0x5, 0x8, 0x0, 0xcb91, 0x5, 0xffffffffffffcb47, 0x4, 0x3ff, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x6, 0x5, 0x400, 0x0, 0x1bcc, 0x0, 0x8000, 0x7, 0x4, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x7ff, 0x9}, r2, 0x0, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuacct.usage\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:04:14 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) close(r0) 03:04:14 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x82, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x26000) 03:04:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000005c0)={'hwsim0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x2c) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) 03:04:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[], 0x0}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x13, 0x0, 0x62, 0x0, 0x4, 0x14809, 0x8, 0x5, 0x8, 0x0, 0xcb91, 0x5, 0xffffffffffffcb47, 0x4, 0x3ff, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x6, 0x5, 0x400, 0x0, 0x1bcc, 0x0, 0x8000, 0x7, 0x4, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x7ff, 0x9}, r2, 0x0, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuacct.usage\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:04:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000005c0)={'hwsim0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x2c) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) 03:04:15 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='GPL*\x00'}, 0x30) write$cgroup_pid(r1, &(0x7f0000000300)=r2, 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg$kcm(r3, &(0x7f0000012280)={&(0x7f0000010fc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000011200)=[{&(0x7f0000011040)=""/33, 0x21}, {&(0x7f0000011080)=""/26, 0x1a}, {&(0x7f00000110c0)=""/66, 0x42}, {&(0x7f0000011140)=""/79, 0x4f}, {&(0x7f00000111c0)=""/57, 0x39}], 0x5, &(0x7f0000011280)=""/4096, 0x1000}, 0x101) bpf$MAP_CREATE(0x0, &(0x7f00000122c0)={0xd, 0x2, 0xfffffffffffffffb, 0x7fffffff, 0x8, r0, 0x6, [], r6, r3, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4, 0x8000, 0x0, 0xfffffffffffffff9, 0x0, 0x1, 0x2001, 0x1, 0xaef, 0x847, 0x1, 0x3, 0x3, 0x3, 0x7fff, 0x0, 0x9, 0x6, 0x6, 0xffffffff00000000, 0x6eaf876e, 0x7, 0x3f, 0x5bb9, 0x6, 0x0, 0x33c000000000000, 0x3, 0x80000001, 0x6, 0x100000000, 0x1ff, 0x5, 0x3f, 0x1, 0x80000001, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000340)}, 0x510, 0x148abad2, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x7}, r2, 0x3, r5, 0x8) write$cgroup_type(r5, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="0007000000001ed73f2cf25dbc0100007a00"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc020660b, 0x20000001) openat$cgroup_subtree(r4, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_type(r3, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 03:04:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x82, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x26000) 03:04:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[], 0x0}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x13, 0x0, 0x62, 0x0, 0x4, 0x14809, 0x8, 0x5, 0x8, 0x0, 0xcb91, 0x5, 0xffffffffffffcb47, 0x4, 0x3ff, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x6, 0x5, 0x400, 0x0, 0x1bcc, 0x0, 0x8000, 0x7, 0x4, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x7ff, 0x9}, r2, 0x0, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuacct.usage\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:04:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[], 0x0}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x13, 0x0, 0x62, 0x0, 0x4, 0x14809, 0x8, 0x5, 0x8, 0x0, 0xcb91, 0x5, 0xffffffffffffcb47, 0x4, 0x3ff, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x6, 0x5, 0x400, 0x0, 0x1bcc, 0x0, 0x8000, 0x7, 0x4, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x7ff, 0x9}, r2, 0x0, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuacct.usage\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:04:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000005c0)={'hwsim0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x2c) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) 03:04:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000005c0)={'hwsim0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x2c) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) 03:04:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[], 0x0}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x13, 0x0, 0x62, 0x0, 0x4, 0x14809, 0x8, 0x5, 0x8, 0x0, 0xcb91, 0x5, 0xffffffffffffcb47, 0x4, 0x3ff, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x6, 0x5, 0x400, 0x0, 0x1bcc, 0x0, 0x8000, 0x7, 0x4, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x7ff, 0x9}, r2, 0x0, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuacct.usage\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:04:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[], 0x0}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x13, 0x0, 0x62, 0x0, 0x4, 0x14809, 0x8, 0x5, 0x8, 0x0, 0xcb91, 0x5, 0xffffffffffffcb47, 0x4, 0x3ff, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x6, 0x5, 0x400, 0x0, 0x1bcc, 0x0, 0x8000, 0x7, 0x4, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x7ff, 0x9}, r2, 0x0, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuacct.usage\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:04:15 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='GPL*\x00'}, 0x30) write$cgroup_pid(r1, &(0x7f0000000300)=r2, 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg$kcm(r3, &(0x7f0000012280)={&(0x7f0000010fc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000011200)=[{&(0x7f0000011040)=""/33, 0x21}, {&(0x7f0000011080)=""/26, 0x1a}, {&(0x7f00000110c0)=""/66, 0x42}, {&(0x7f0000011140)=""/79, 0x4f}, {&(0x7f00000111c0)=""/57, 0x39}], 0x5, &(0x7f0000011280)=""/4096, 0x1000}, 0x101) bpf$MAP_CREATE(0x0, &(0x7f00000122c0)={0xd, 0x2, 0xfffffffffffffffb, 0x7fffffff, 0x8, r0, 0x6, [], r6, r3, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4, 0x8000, 0x0, 0xfffffffffffffff9, 0x0, 0x1, 0x2001, 0x1, 0xaef, 0x847, 0x1, 0x3, 0x3, 0x3, 0x7fff, 0x0, 0x9, 0x6, 0x6, 0xffffffff00000000, 0x6eaf876e, 0x7, 0x3f, 0x5bb9, 0x6, 0x0, 0x33c000000000000, 0x3, 0x80000001, 0x6, 0x100000000, 0x1ff, 0x5, 0x3f, 0x1, 0x80000001, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000340)}, 0x510, 0x148abad2, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x7}, r2, 0x3, r5, 0x8) write$cgroup_type(r5, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="0007000000001ed73f2cf25dbc0100007a00"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc020660b, 0x20000001) openat$cgroup_subtree(r4, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_type(r3, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 03:04:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000005c0)={'hwsim0\x00', @remote}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x2c) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r0}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) 03:04:15 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='GPL*\x00'}, 0x30) write$cgroup_pid(r1, &(0x7f0000000300)=r2, 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg$kcm(r3, &(0x7f0000012280)={&(0x7f0000010fc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000011200)=[{&(0x7f0000011040)=""/33, 0x21}, {&(0x7f0000011080)=""/26, 0x1a}, {&(0x7f00000110c0)=""/66, 0x42}, {&(0x7f0000011140)=""/79, 0x4f}, {&(0x7f00000111c0)=""/57, 0x39}], 0x5, &(0x7f0000011280)=""/4096, 0x1000}, 0x101) bpf$MAP_CREATE(0x0, &(0x7f00000122c0)={0xd, 0x2, 0xfffffffffffffffb, 0x7fffffff, 0x8, r0, 0x6, [], r6, r3, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4, 0x8000, 0x0, 0xfffffffffffffff9, 0x0, 0x1, 0x2001, 0x1, 0xaef, 0x847, 0x1, 0x3, 0x3, 0x3, 0x7fff, 0x0, 0x9, 0x6, 0x6, 0xffffffff00000000, 0x6eaf876e, 0x7, 0x3f, 0x5bb9, 0x6, 0x0, 0x33c000000000000, 0x3, 0x80000001, 0x6, 0x100000000, 0x1ff, 0x5, 0x3f, 0x1, 0x80000001, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000340)}, 0x510, 0x148abad2, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x7}, r2, 0x3, r5, 0x8) write$cgroup_type(r5, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="0007000000001ed73f2cf25dbc0100007a00"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc020660b, 0x20000001) openat$cgroup_subtree(r4, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_type(r3, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 03:04:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[], 0x0}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x13, 0x0, 0x62, 0x0, 0x4, 0x14809, 0x8, 0x5, 0x8, 0x0, 0xcb91, 0x5, 0xffffffffffffcb47, 0x4, 0x3ff, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x6, 0x5, 0x400, 0x0, 0x1bcc, 0x0, 0x8000, 0x7, 0x4, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x7ff, 0x9}, r2, 0x0, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuacct.usage\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:04:16 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='GPL*\x00'}, 0x30) write$cgroup_pid(r1, &(0x7f0000000300)=r2, 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg$kcm(r3, &(0x7f0000012280)={&(0x7f0000010fc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000011200)=[{&(0x7f0000011040)=""/33, 0x21}, {&(0x7f0000011080)=""/26, 0x1a}, {&(0x7f00000110c0)=""/66, 0x42}, {&(0x7f0000011140)=""/79, 0x4f}, {&(0x7f00000111c0)=""/57, 0x39}], 0x5, &(0x7f0000011280)=""/4096, 0x1000}, 0x101) bpf$MAP_CREATE(0x0, &(0x7f00000122c0)={0xd, 0x2, 0xfffffffffffffffb, 0x7fffffff, 0x8, r0, 0x6, [], r6, r3, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4, 0x8000, 0x0, 0xfffffffffffffff9, 0x0, 0x1, 0x2001, 0x1, 0xaef, 0x847, 0x1, 0x3, 0x3, 0x3, 0x7fff, 0x0, 0x9, 0x6, 0x6, 0xffffffff00000000, 0x6eaf876e, 0x7, 0x3f, 0x5bb9, 0x6, 0x0, 0x33c000000000000, 0x3, 0x80000001, 0x6, 0x100000000, 0x1ff, 0x5, 0x3f, 0x1, 0x80000001, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000340)}, 0x510, 0x148abad2, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x7}, r2, 0x3, r5, 0x8) write$cgroup_type(r5, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="0007000000001ed73f2cf25dbc0100007a00"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc020660b, 0x20000001) openat$cgroup_subtree(r4, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_type(r3, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 03:04:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[], 0x0}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x13, 0x0, 0x62, 0x0, 0x4, 0x14809, 0x8, 0x5, 0x8, 0x0, 0xcb91, 0x5, 0xffffffffffffcb47, 0x4, 0x3ff, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x6, 0x5, 0x400, 0x0, 0x1bcc, 0x0, 0x8000, 0x7, 0x4, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x7ff, 0x9}, r2, 0x0, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuacct.usage\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:04:16 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='GPL*\x00'}, 0x30) write$cgroup_pid(r1, &(0x7f0000000300)=r2, 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg$kcm(r3, &(0x7f0000012280)={&(0x7f0000010fc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000011200)=[{&(0x7f0000011040)=""/33, 0x21}, {&(0x7f0000011080)=""/26, 0x1a}, {&(0x7f00000110c0)=""/66, 0x42}, {&(0x7f0000011140)=""/79, 0x4f}, {&(0x7f00000111c0)=""/57, 0x39}], 0x5, &(0x7f0000011280)=""/4096, 0x1000}, 0x101) bpf$MAP_CREATE(0x0, &(0x7f00000122c0)={0xd, 0x2, 0xfffffffffffffffb, 0x7fffffff, 0x8, r0, 0x6, [], r6, r3, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4, 0x8000, 0x0, 0xfffffffffffffff9, 0x0, 0x1, 0x2001, 0x1, 0xaef, 0x847, 0x1, 0x3, 0x3, 0x3, 0x7fff, 0x0, 0x9, 0x6, 0x6, 0xffffffff00000000, 0x6eaf876e, 0x7, 0x3f, 0x5bb9, 0x6, 0x0, 0x33c000000000000, 0x3, 0x80000001, 0x6, 0x100000000, 0x1ff, 0x5, 0x3f, 0x1, 0x80000001, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000340)}, 0x510, 0x148abad2, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x7}, r2, 0x3, r5, 0x8) write$cgroup_type(r5, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="0007000000001ed73f2cf25dbc0100007a00"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc020660b, 0x20000001) openat$cgroup_subtree(r4, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_type(r3, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 03:04:16 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='GPL*\x00'}, 0x30) write$cgroup_pid(r1, &(0x7f0000000300)=r2, 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg$kcm(r3, &(0x7f0000012280)={&(0x7f0000010fc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000011200)=[{&(0x7f0000011040)=""/33, 0x21}, {&(0x7f0000011080)=""/26, 0x1a}, {&(0x7f00000110c0)=""/66, 0x42}, {&(0x7f0000011140)=""/79, 0x4f}, {&(0x7f00000111c0)=""/57, 0x39}], 0x5, &(0x7f0000011280)=""/4096, 0x1000}, 0x101) bpf$MAP_CREATE(0x0, &(0x7f00000122c0)={0xd, 0x2, 0xfffffffffffffffb, 0x7fffffff, 0x8, r0, 0x6, [], r6, r3, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4, 0x8000, 0x0, 0xfffffffffffffff9, 0x0, 0x1, 0x2001, 0x1, 0xaef, 0x847, 0x1, 0x3, 0x3, 0x3, 0x7fff, 0x0, 0x9, 0x6, 0x6, 0xffffffff00000000, 0x6eaf876e, 0x7, 0x3f, 0x5bb9, 0x6, 0x0, 0x33c000000000000, 0x3, 0x80000001, 0x6, 0x100000000, 0x1ff, 0x5, 0x3f, 0x1, 0x80000001, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000340)}, 0x510, 0x148abad2, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x7}, r2, 0x3, r5, 0x8) write$cgroup_type(r5, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="0007000000001ed73f2cf25dbc0100007a00"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc020660b, 0x20000001) openat$cgroup_subtree(r4, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_type(r3, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 03:04:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[], 0x0}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x13, 0x0, 0x62, 0x0, 0x4, 0x14809, 0x8, 0x5, 0x8, 0x0, 0xcb91, 0x5, 0xffffffffffffcb47, 0x4, 0x3ff, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x6, 0x5, 0x400, 0x0, 0x1bcc, 0x0, 0x8000, 0x7, 0x4, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x7ff, 0x9}, r2, 0x0, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuacct.usage\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:04:16 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='GPL*\x00'}, 0x30) write$cgroup_pid(r1, &(0x7f0000000300)=r2, 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg$kcm(r3, &(0x7f0000012280)={&(0x7f0000010fc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000011200)=[{&(0x7f0000011040)=""/33, 0x21}, {&(0x7f0000011080)=""/26, 0x1a}, {&(0x7f00000110c0)=""/66, 0x42}, {&(0x7f0000011140)=""/79, 0x4f}, {&(0x7f00000111c0)=""/57, 0x39}], 0x5, &(0x7f0000011280)=""/4096, 0x1000}, 0x101) bpf$MAP_CREATE(0x0, &(0x7f00000122c0)={0xd, 0x2, 0xfffffffffffffffb, 0x7fffffff, 0x8, r0, 0x6, [], r6, r3, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4, 0x8000, 0x0, 0xfffffffffffffff9, 0x0, 0x1, 0x2001, 0x1, 0xaef, 0x847, 0x1, 0x3, 0x3, 0x3, 0x7fff, 0x0, 0x9, 0x6, 0x6, 0xffffffff00000000, 0x6eaf876e, 0x7, 0x3f, 0x5bb9, 0x6, 0x0, 0x33c000000000000, 0x3, 0x80000001, 0x6, 0x100000000, 0x1ff, 0x5, 0x3f, 0x1, 0x80000001, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000340)}, 0x510, 0x148abad2, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x7}, r2, 0x3, r5, 0x8) write$cgroup_type(r5, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="0007000000001ed73f2cf25dbc0100007a00"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc020660b, 0x20000001) openat$cgroup_subtree(r4, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_type(r3, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 03:04:16 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='GPL*\x00'}, 0x30) write$cgroup_pid(r1, &(0x7f0000000300)=r2, 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg$kcm(r3, &(0x7f0000012280)={&(0x7f0000010fc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000011200)=[{&(0x7f0000011040)=""/33, 0x21}, {&(0x7f0000011080)=""/26, 0x1a}, {&(0x7f00000110c0)=""/66, 0x42}, {&(0x7f0000011140)=""/79, 0x4f}, {&(0x7f00000111c0)=""/57, 0x39}], 0x5, &(0x7f0000011280)=""/4096, 0x1000}, 0x101) bpf$MAP_CREATE(0x0, &(0x7f00000122c0)={0xd, 0x2, 0xfffffffffffffffb, 0x7fffffff, 0x8, r0, 0x6, [], r6, r3, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4, 0x8000, 0x0, 0xfffffffffffffff9, 0x0, 0x1, 0x2001, 0x1, 0xaef, 0x847, 0x1, 0x3, 0x3, 0x3, 0x7fff, 0x0, 0x9, 0x6, 0x6, 0xffffffff00000000, 0x6eaf876e, 0x7, 0x3f, 0x5bb9, 0x6, 0x0, 0x33c000000000000, 0x3, 0x80000001, 0x6, 0x100000000, 0x1ff, 0x5, 0x3f, 0x1, 0x80000001, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000340)}, 0x510, 0x148abad2, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x7}, r2, 0x3, r5, 0x8) write$cgroup_type(r5, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="0007000000001ed73f2cf25dbc0100007a00"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc020660b, 0x20000001) openat$cgroup_subtree(r4, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_type(r3, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 03:04:16 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='GPL*\x00'}, 0x30) write$cgroup_pid(r1, &(0x7f0000000300)=r2, 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg$kcm(r3, &(0x7f0000012280)={&(0x7f0000010fc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000011200)=[{&(0x7f0000011040)=""/33, 0x21}, {&(0x7f0000011080)=""/26, 0x1a}, {&(0x7f00000110c0)=""/66, 0x42}, {&(0x7f0000011140)=""/79, 0x4f}, {&(0x7f00000111c0)=""/57, 0x39}], 0x5, &(0x7f0000011280)=""/4096, 0x1000}, 0x101) bpf$MAP_CREATE(0x0, &(0x7f00000122c0)={0xd, 0x2, 0xfffffffffffffffb, 0x7fffffff, 0x8, r0, 0x6, [], r6, r3, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4, 0x8000, 0x0, 0xfffffffffffffff9, 0x0, 0x1, 0x2001, 0x1, 0xaef, 0x847, 0x1, 0x3, 0x3, 0x3, 0x7fff, 0x0, 0x9, 0x6, 0x6, 0xffffffff00000000, 0x6eaf876e, 0x7, 0x3f, 0x5bb9, 0x6, 0x0, 0x33c000000000000, 0x3, 0x80000001, 0x6, 0x100000000, 0x1ff, 0x5, 0x3f, 0x1, 0x80000001, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000340)}, 0x510, 0x148abad2, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x7}, r2, 0x3, r5, 0x8) write$cgroup_type(r5, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="0007000000001ed73f2cf25dbc0100007a00"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc020660b, 0x20000001) openat$cgroup_subtree(r4, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_type(r3, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 03:04:16 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='GPL*\x00'}, 0x30) write$cgroup_pid(r1, &(0x7f0000000300)=r2, 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg$kcm(r3, &(0x7f0000012280)={&(0x7f0000010fc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000011200)=[{&(0x7f0000011040)=""/33, 0x21}, {&(0x7f0000011080)=""/26, 0x1a}, {&(0x7f00000110c0)=""/66, 0x42}, {&(0x7f0000011140)=""/79, 0x4f}, {&(0x7f00000111c0)=""/57, 0x39}], 0x5, &(0x7f0000011280)=""/4096, 0x1000}, 0x101) bpf$MAP_CREATE(0x0, &(0x7f00000122c0)={0xd, 0x2, 0xfffffffffffffffb, 0x7fffffff, 0x8, r0, 0x6, [], r6, r3, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4, 0x8000, 0x0, 0xfffffffffffffff9, 0x0, 0x1, 0x2001, 0x1, 0xaef, 0x847, 0x1, 0x3, 0x3, 0x3, 0x7fff, 0x0, 0x9, 0x6, 0x6, 0xffffffff00000000, 0x6eaf876e, 0x7, 0x3f, 0x5bb9, 0x6, 0x0, 0x33c000000000000, 0x3, 0x80000001, 0x6, 0x100000000, 0x1ff, 0x5, 0x3f, 0x1, 0x80000001, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000340)}, 0x510, 0x148abad2, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x7}, r2, 0x3, r5, 0x8) write$cgroup_type(r5, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="0007000000001ed73f2cf25dbc0100007a00"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc020660b, 0x20000001) openat$cgroup_subtree(r4, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_type(r3, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 03:04:16 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='GPL*\x00'}, 0x30) write$cgroup_pid(r1, &(0x7f0000000300)=r2, 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg$kcm(r3, &(0x7f0000012280)={&(0x7f0000010fc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000011200)=[{&(0x7f0000011040)=""/33, 0x21}, {&(0x7f0000011080)=""/26, 0x1a}, {&(0x7f00000110c0)=""/66, 0x42}, {&(0x7f0000011140)=""/79, 0x4f}, {&(0x7f00000111c0)=""/57, 0x39}], 0x5, &(0x7f0000011280)=""/4096, 0x1000}, 0x101) bpf$MAP_CREATE(0x0, &(0x7f00000122c0)={0xd, 0x2, 0xfffffffffffffffb, 0x7fffffff, 0x8, r0, 0x6, [], r6, r3, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4, 0x8000, 0x0, 0xfffffffffffffff9, 0x0, 0x1, 0x2001, 0x1, 0xaef, 0x847, 0x1, 0x3, 0x3, 0x3, 0x7fff, 0x0, 0x9, 0x6, 0x6, 0xffffffff00000000, 0x6eaf876e, 0x7, 0x3f, 0x5bb9, 0x6, 0x0, 0x33c000000000000, 0x3, 0x80000001, 0x6, 0x100000000, 0x1ff, 0x5, 0x3f, 0x1, 0x80000001, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000340)}, 0x510, 0x148abad2, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x7}, r2, 0x3, r5, 0x8) write$cgroup_type(r5, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="0007000000001ed73f2cf25dbc0100007a00"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc020660b, 0x20000001) openat$cgroup_subtree(r4, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_type(r3, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 03:04:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[], 0x0}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x13, 0x0, 0x62, 0x0, 0x4, 0x14809, 0x8, 0x5, 0x8, 0x0, 0xcb91, 0x5, 0xffffffffffffcb47, 0x4, 0x3ff, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x6, 0x5, 0x400, 0x0, 0x1bcc, 0x0, 0x8000, 0x7, 0x4, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x7ff, 0x9}, r2, 0x0, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuacct.usage\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:04:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[], 0x0}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x13, 0x0, 0x62, 0x0, 0x4, 0x14809, 0x8, 0x5, 0x8, 0x0, 0xcb91, 0x5, 0xffffffffffffcb47, 0x4, 0x3ff, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x6, 0x5, 0x400, 0x0, 0x1bcc, 0x0, 0x8000, 0x7, 0x4, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x7ff, 0x9}, r2, 0x0, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuacct.usage\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:04:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[], 0x0}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x13, 0x0, 0x62, 0x0, 0x4, 0x14809, 0x8, 0x5, 0x8, 0x0, 0xcb91, 0x5, 0xffffffffffffcb47, 0x4, 0x3ff, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x6, 0x5, 0x400, 0x0, 0x1bcc, 0x0, 0x8000, 0x7, 0x4, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x7ff, 0x9}, r2, 0x0, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuacct.usage\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:04:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[], 0x0}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x13, 0x0, 0x62, 0x0, 0x4, 0x14809, 0x8, 0x5, 0x8, 0x0, 0xcb91, 0x5, 0xffffffffffffcb47, 0x4, 0x3ff, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x6, 0x5, 0x400, 0x0, 0x1bcc, 0x0, 0x8000, 0x7, 0x4, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x7ff, 0x9}, r2, 0x0, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuacct.usage\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:04:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[], 0x0}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x13, 0x0, 0x62, 0x0, 0x4, 0x14809, 0x8, 0x5, 0x8, 0x0, 0xcb91, 0x5, 0xffffffffffffcb47, 0x4, 0x3ff, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x6, 0x5, 0x400, 0x0, 0x1bcc, 0x0, 0x8000, 0x7, 0x4, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x7ff, 0x9}, r2, 0x0, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuacct.usage\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:04:17 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='GPL*\x00'}, 0x30) write$cgroup_pid(r1, &(0x7f0000000300)=r2, 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg$kcm(r3, &(0x7f0000012280)={&(0x7f0000010fc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000011200)=[{&(0x7f0000011040)=""/33, 0x21}, {&(0x7f0000011080)=""/26, 0x1a}, {&(0x7f00000110c0)=""/66, 0x42}, {&(0x7f0000011140)=""/79, 0x4f}, {&(0x7f00000111c0)=""/57, 0x39}], 0x5, &(0x7f0000011280)=""/4096, 0x1000}, 0x101) bpf$MAP_CREATE(0x0, &(0x7f00000122c0)={0xd, 0x2, 0xfffffffffffffffb, 0x7fffffff, 0x8, r0, 0x6, [], r6, r3, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4, 0x8000, 0x0, 0xfffffffffffffff9, 0x0, 0x1, 0x2001, 0x1, 0xaef, 0x847, 0x1, 0x3, 0x3, 0x3, 0x7fff, 0x0, 0x9, 0x6, 0x6, 0xffffffff00000000, 0x6eaf876e, 0x7, 0x3f, 0x5bb9, 0x6, 0x0, 0x33c000000000000, 0x3, 0x80000001, 0x6, 0x100000000, 0x1ff, 0x5, 0x3f, 0x1, 0x80000001, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000340)}, 0x510, 0x148abad2, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x7}, r2, 0x3, r5, 0x8) write$cgroup_type(r5, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="0007000000001ed73f2cf25dbc0100007a00"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc020660b, 0x20000001) openat$cgroup_subtree(r4, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_type(r3, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 03:04:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[], 0x0}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x13, 0x0, 0x62, 0x0, 0x4, 0x14809, 0x8, 0x5, 0x8, 0x0, 0xcb91, 0x5, 0xffffffffffffcb47, 0x4, 0x3ff, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x6, 0x5, 0x400, 0x0, 0x1bcc, 0x0, 0x8000, 0x7, 0x4, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x7ff, 0x9}, r2, 0x0, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuacct.usage\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:04:17 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='GPL*\x00'}, 0x30) write$cgroup_pid(r1, &(0x7f0000000300)=r2, 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg$kcm(r3, &(0x7f0000012280)={&(0x7f0000010fc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000011200)=[{&(0x7f0000011040)=""/33, 0x21}, {&(0x7f0000011080)=""/26, 0x1a}, {&(0x7f00000110c0)=""/66, 0x42}, {&(0x7f0000011140)=""/79, 0x4f}, {&(0x7f00000111c0)=""/57, 0x39}], 0x5, &(0x7f0000011280)=""/4096, 0x1000}, 0x101) bpf$MAP_CREATE(0x0, &(0x7f00000122c0)={0xd, 0x2, 0xfffffffffffffffb, 0x7fffffff, 0x8, r0, 0x6, [], r6, r3, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4, 0x8000, 0x0, 0xfffffffffffffff9, 0x0, 0x1, 0x2001, 0x1, 0xaef, 0x847, 0x1, 0x3, 0x3, 0x3, 0x7fff, 0x0, 0x9, 0x6, 0x6, 0xffffffff00000000, 0x6eaf876e, 0x7, 0x3f, 0x5bb9, 0x6, 0x0, 0x33c000000000000, 0x3, 0x80000001, 0x6, 0x100000000, 0x1ff, 0x5, 0x3f, 0x1, 0x80000001, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000340)}, 0x510, 0x148abad2, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x7}, r2, 0x3, r5, 0x8) write$cgroup_type(r5, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="0007000000001ed73f2cf25dbc0100007a00"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc020660b, 0x20000001) openat$cgroup_subtree(r4, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_type(r3, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 03:04:17 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='GPL*\x00'}, 0x30) write$cgroup_pid(r1, &(0x7f0000000300)=r2, 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg$kcm(r3, &(0x7f0000012280)={&(0x7f0000010fc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000011200)=[{&(0x7f0000011040)=""/33, 0x21}, {&(0x7f0000011080)=""/26, 0x1a}, {&(0x7f00000110c0)=""/66, 0x42}, {&(0x7f0000011140)=""/79, 0x4f}, {&(0x7f00000111c0)=""/57, 0x39}], 0x5, &(0x7f0000011280)=""/4096, 0x1000}, 0x101) bpf$MAP_CREATE(0x0, &(0x7f00000122c0)={0xd, 0x2, 0xfffffffffffffffb, 0x7fffffff, 0x8, r0, 0x6, [], r6, r3, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4, 0x8000, 0x0, 0xfffffffffffffff9, 0x0, 0x1, 0x2001, 0x1, 0xaef, 0x847, 0x1, 0x3, 0x3, 0x3, 0x7fff, 0x0, 0x9, 0x6, 0x6, 0xffffffff00000000, 0x6eaf876e, 0x7, 0x3f, 0x5bb9, 0x6, 0x0, 0x33c000000000000, 0x3, 0x80000001, 0x6, 0x100000000, 0x1ff, 0x5, 0x3f, 0x1, 0x80000001, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000340)}, 0x510, 0x148abad2, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x7}, r2, 0x3, r5, 0x8) write$cgroup_type(r5, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="0007000000001ed73f2cf25dbc0100007a00"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc020660b, 0x20000001) openat$cgroup_subtree(r4, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_type(r3, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 03:04:17 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='GPL*\x00'}, 0x30) write$cgroup_pid(r1, &(0x7f0000000300)=r2, 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) recvmsg$kcm(r3, &(0x7f0000012280)={&(0x7f0000010fc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000011200)=[{&(0x7f0000011040)=""/33, 0x21}, {&(0x7f0000011080)=""/26, 0x1a}, {&(0x7f00000110c0)=""/66, 0x42}, {&(0x7f0000011140)=""/79, 0x4f}, {&(0x7f00000111c0)=""/57, 0x39}], 0x5, &(0x7f0000011280)=""/4096, 0x1000}, 0x101) bpf$MAP_CREATE(0x0, &(0x7f00000122c0)={0xd, 0x2, 0xfffffffffffffffb, 0x7fffffff, 0x8, r0, 0x6, [], r6, r3, 0x0, 0x5}, 0x3c) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x4, 0x8000, 0x0, 0xfffffffffffffff9, 0x0, 0x1, 0x2001, 0x1, 0xaef, 0x847, 0x1, 0x3, 0x3, 0x3, 0x7fff, 0x0, 0x9, 0x6, 0x6, 0xffffffff00000000, 0x6eaf876e, 0x7, 0x3f, 0x5bb9, 0x6, 0x0, 0x33c000000000000, 0x3, 0x80000001, 0x6, 0x100000000, 0x1ff, 0x5, 0x3f, 0x1, 0x80000001, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000340)}, 0x510, 0x148abad2, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x7}, r2, 0x3, r5, 0x8) write$cgroup_type(r5, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="0007000000001ed73f2cf25dbc0100007a00"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc020660b, 0x20000001) openat$cgroup_subtree(r4, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_type(r3, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 03:04:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[], 0x0}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x13, 0x0, 0x62, 0x0, 0x4, 0x14809, 0x8, 0x5, 0x8, 0x0, 0xcb91, 0x5, 0xffffffffffffcb47, 0x4, 0x3ff, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x6, 0x5, 0x400, 0x0, 0x1bcc, 0x0, 0x8000, 0x7, 0x4, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x7ff, 0x9}, r2, 0x0, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuacct.usage\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:04:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r2 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[], 0x0}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x13, 0x0, 0x62, 0x0, 0x4, 0x14809, 0x8, 0x5, 0x8, 0x0, 0xcb91, 0x5, 0xffffffffffffcb47, 0x4, 0x3ff, 0x7, 0x0, 0x7, 0x1000, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x6, 0x7, 0x8001, 0x6, 0x5, 0x400, 0x0, 0x1bcc, 0x0, 0x8000, 0x7, 0x4, 0x0, 0x101, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8001, 0x0, 0x3, 0x7ff, 0x9}, r2, 0x0, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f00000002c0)='cpuacct.usage\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)="c12723", 0x3}], 0x1}, 0xfc00) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="88e7", 0x2}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:04:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000440)='lo\x00\x96%\xd6Q\xb9Y\xa9dJ,\x02\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:18 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xb000) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xcbaa60f5) 03:04:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001240)="2e0000002a00810100000000000000cf0500136a5ad31f1b34a6f3cbb30007fff000009a0100000051894d5d1dac", 0x2e}], 0x1}, 0x0) 03:04:18 executing program 4: getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="972b32ec322549e69e193c5e6d443ea80de54d21cd7e12ef26fa4b3c0133c0844ff5f9f97ce293a3df0a29e7f2ff3f9f278aeaccb7f8c2571501aa4b4b424a923b6897cc82835cbe5f7de52e33a8d68b5127de83fb232d849b8c8df80c4ed105abe06dfdcbc939b5ca6aec1b723e37f62f81cef518869f96c0bf7f71bc00afa716236ce5b7985a56a6094b06a76e74d4d551b6b9c6078149dff6174ed74022f7e3578d6af728ec82f9753046725300a7f2e047e5f1c5bf870ef24cdcce08c1fcc6cdc9e18065a7b34de246754e12e56ecda342d1fc7b9d5bcb102398b3fa"], 0x0, 0xde}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000700)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xfffffffffffffc01) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000540)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/32}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0x138, 0x0}, 0xffffffffffffff48) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xb7fbe73a69aa6cf) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000900)) recvmsg(0xffffffffffffffff, 0x0, 0x2000) recvmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)=""/151, 0x97}, {&(0x7f0000000600)=""/226, 0xe2}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000840)=""/158, 0x9e}], 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000004440)={0x3, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xf, 0x7, 0xa}, @call={0x85, 0x0, 0x0, 0x58}, @map={0x18, 0x7}], 0x0, 0x400, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004400)={0x0, 0xa, 0x9f1}, 0x10}, 0x70) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) [ 336.046033][T17050] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 03:04:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001240)="2e0000002a00810100000000000000cf0500136a5ad31f1b34a6f3cbb30007fff000009a0100000051894d5d1dac", 0x2e}], 0x1}, 0x0) [ 336.278908][T17054] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 03:04:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001240)="2e0000002a00810100000000000000cf0500136a5ad31f1b34a6f3cbb30007fff000009a0100000051894d5d1dac", 0x2e}], 0x1}, 0x0) [ 336.434657][T17057] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 03:04:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001240)="2e0000002a00810100000000000000cf0500136a5ad31f1b34a6f3cbb30007fff000009a0100000051894d5d1dac", 0x2e}], 0x1}, 0x0) 03:04:19 executing program 4: getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="972b32ec322549e69e193c5e6d443ea80de54d21cd7e12ef26fa4b3c0133c0844ff5f9f97ce293a3df0a29e7f2ff3f9f278aeaccb7f8c2571501aa4b4b424a923b6897cc82835cbe5f7de52e33a8d68b5127de83fb232d849b8c8df80c4ed105abe06dfdcbc939b5ca6aec1b723e37f62f81cef518869f96c0bf7f71bc00afa716236ce5b7985a56a6094b06a76e74d4d551b6b9c6078149dff6174ed74022f7e3578d6af728ec82f9753046725300a7f2e047e5f1c5bf870ef24cdcce08c1fcc6cdc9e18065a7b34de246754e12e56ecda342d1fc7b9d5bcb102398b3fa"], 0x0, 0xde}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000700)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xfffffffffffffc01) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000540)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/32}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0x138, 0x0}, 0xffffffffffffff48) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xb7fbe73a69aa6cf) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000900)) recvmsg(0xffffffffffffffff, 0x0, 0x2000) recvmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)=""/151, 0x97}, {&(0x7f0000000600)=""/226, 0xe2}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000840)=""/158, 0x9e}], 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000004440)={0x3, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xf, 0x7, 0xa}, @call={0x85, 0x0, 0x0, 0x58}, @map={0x18, 0x7}], 0x0, 0x400, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004400)={0x0, 0xa, 0x9f1}, 0x10}, 0x70) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) [ 336.634539][T17068] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 03:04:19 executing program 4: getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="972b32ec322549e69e193c5e6d443ea80de54d21cd7e12ef26fa4b3c0133c0844ff5f9f97ce293a3df0a29e7f2ff3f9f278aeaccb7f8c2571501aa4b4b424a923b6897cc82835cbe5f7de52e33a8d68b5127de83fb232d849b8c8df80c4ed105abe06dfdcbc939b5ca6aec1b723e37f62f81cef518869f96c0bf7f71bc00afa716236ce5b7985a56a6094b06a76e74d4d551b6b9c6078149dff6174ed74022f7e3578d6af728ec82f9753046725300a7f2e047e5f1c5bf870ef24cdcce08c1fcc6cdc9e18065a7b34de246754e12e56ecda342d1fc7b9d5bcb102398b3fa"], 0x0, 0xde}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000700)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xfffffffffffffc01) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000540)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/32}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0x138, 0x0}, 0xffffffffffffff48) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xb7fbe73a69aa6cf) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000900)) recvmsg(0xffffffffffffffff, 0x0, 0x2000) recvmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)=""/151, 0x97}, {&(0x7f0000000600)=""/226, 0xe2}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000840)=""/158, 0x9e}], 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000004440)={0x3, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xf, 0x7, 0xa}, @call={0x85, 0x0, 0x0, 0x58}, @map={0x18, 0x7}], 0x0, 0x400, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004400)={0x0, 0xa, 0x9f1}, 0x10}, 0x70) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) 03:04:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:20 executing program 2: getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="972b32ec322549e69e193c5e6d443ea80de54d21cd7e12ef26fa4b3c0133c0844ff5f9f97ce293a3df0a29e7f2ff3f9f278aeaccb7f8c2571501aa4b4b424a923b6897cc82835cbe5f7de52e33a8d68b5127de83fb232d849b8c8df80c4ed105abe06dfdcbc939b5ca6aec1b723e37f62f81cef518869f96c0bf7f71bc00afa716236ce5b7985a56a6094b06a76e74d4d551b6b9c6078149dff6174ed74022f7e3578d6af728ec82f9753046725300a7f2e047e5f1c5bf870ef24cdcce08c1fcc6cdc9e18065a7b34de246754e12e56ecda342d1fc7b9d5bcb102398b3fa"], 0x0, 0xde}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000700)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xfffffffffffffc01) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000540)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/32}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0x138, 0x0}, 0xffffffffffffff48) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xb7fbe73a69aa6cf) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000900)) recvmsg(0xffffffffffffffff, 0x0, 0x2000) recvmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)=""/151, 0x97}, {&(0x7f0000000600)=""/226, 0xe2}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000840)=""/158, 0x9e}], 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000004440)={0x3, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xf, 0x7, 0xa}, @call={0x85, 0x0, 0x0, 0x58}, @map={0x18, 0x7}], 0x0, 0x400, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004400)={0x0, 0xa, 0x9f1}, 0x10}, 0x70) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) 03:04:20 executing program 4: getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="972b32ec322549e69e193c5e6d443ea80de54d21cd7e12ef26fa4b3c0133c0844ff5f9f97ce293a3df0a29e7f2ff3f9f278aeaccb7f8c2571501aa4b4b424a923b6897cc82835cbe5f7de52e33a8d68b5127de83fb232d849b8c8df80c4ed105abe06dfdcbc939b5ca6aec1b723e37f62f81cef518869f96c0bf7f71bc00afa716236ce5b7985a56a6094b06a76e74d4d551b6b9c6078149dff6174ed74022f7e3578d6af728ec82f9753046725300a7f2e047e5f1c5bf870ef24cdcce08c1fcc6cdc9e18065a7b34de246754e12e56ecda342d1fc7b9d5bcb102398b3fa"], 0x0, 0xde}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000700)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xfffffffffffffc01) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000540)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/32}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0x138, 0x0}, 0xffffffffffffff48) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xb7fbe73a69aa6cf) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000900)) recvmsg(0xffffffffffffffff, 0x0, 0x2000) recvmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)=""/151, 0x97}, {&(0x7f0000000600)=""/226, 0xe2}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000840)=""/158, 0x9e}], 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000004440)={0x3, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xf, 0x7, 0xa}, @call={0x85, 0x0, 0x0, 0x58}, @map={0x18, 0x7}], 0x0, 0x400, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004400)={0x0, 0xa, 0x9f1}, 0x10}, 0x70) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) 03:04:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000440)='lo\x00\x96%\xd6Q\xb9Y\xa9dJ,\x02\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000440)='lo\x00\x96%\xd6Q\xb9Y\xa9dJ,\x02\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:20 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xb000) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xcbaa60f5) 03:04:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:20 executing program 2: getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="972b32ec322549e69e193c5e6d443ea80de54d21cd7e12ef26fa4b3c0133c0844ff5f9f97ce293a3df0a29e7f2ff3f9f278aeaccb7f8c2571501aa4b4b424a923b6897cc82835cbe5f7de52e33a8d68b5127de83fb232d849b8c8df80c4ed105abe06dfdcbc939b5ca6aec1b723e37f62f81cef518869f96c0bf7f71bc00afa716236ce5b7985a56a6094b06a76e74d4d551b6b9c6078149dff6174ed74022f7e3578d6af728ec82f9753046725300a7f2e047e5f1c5bf870ef24cdcce08c1fcc6cdc9e18065a7b34de246754e12e56ecda342d1fc7b9d5bcb102398b3fa"], 0x0, 0xde}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000700)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xfffffffffffffc01) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000540)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/32}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0x138, 0x0}, 0xffffffffffffff48) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xb7fbe73a69aa6cf) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000900)) recvmsg(0xffffffffffffffff, 0x0, 0x2000) recvmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)=""/151, 0x97}, {&(0x7f0000000600)=""/226, 0xe2}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000840)=""/158, 0x9e}], 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000004440)={0x3, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xf, 0x7, 0xa}, @call={0x85, 0x0, 0x0, 0x58}, @map={0x18, 0x7}], 0x0, 0x400, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004400)={0x0, 0xa, 0x9f1}, 0x10}, 0x70) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) 03:04:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000440)='lo\x00\x96%\xd6Q\xb9Y\xa9dJ,\x02\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:20 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xb000) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xcbaa60f5) 03:04:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000440)='lo\x00\x96%\xd6Q\xb9Y\xa9dJ,\x02\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:21 executing program 2: getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="972b32ec322549e69e193c5e6d443ea80de54d21cd7e12ef26fa4b3c0133c0844ff5f9f97ce293a3df0a29e7f2ff3f9f278aeaccb7f8c2571501aa4b4b424a923b6897cc82835cbe5f7de52e33a8d68b5127de83fb232d849b8c8df80c4ed105abe06dfdcbc939b5ca6aec1b723e37f62f81cef518869f96c0bf7f71bc00afa716236ce5b7985a56a6094b06a76e74d4d551b6b9c6078149dff6174ed74022f7e3578d6af728ec82f9753046725300a7f2e047e5f1c5bf870ef24cdcce08c1fcc6cdc9e18065a7b34de246754e12e56ecda342d1fc7b9d5bcb102398b3fa"], 0x0, 0xde}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000700)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xfffffffffffffc01) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000540)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/32}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0x138, 0x0}, 0xffffffffffffff48) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xb7fbe73a69aa6cf) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000900)) recvmsg(0xffffffffffffffff, 0x0, 0x2000) recvmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)=""/151, 0x97}, {&(0x7f0000000600)=""/226, 0xe2}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000840)=""/158, 0x9e}], 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000004440)={0x3, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xf, 0x7, 0xa}, @call={0x85, 0x0, 0x0, 0x58}, @map={0x18, 0x7}], 0x0, 0x400, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004400)={0x0, 0xa, 0x9f1}, 0x10}, 0x70) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) 03:04:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:23 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xb000) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xcbaa60f5) 03:04:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000440)='lo\x00\x96%\xd6Q\xb9Y\xa9dJ,\x02\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000440)='lo\x00\x96%\xd6Q\xb9Y\xa9dJ,\x02\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:27 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:32 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xb000) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xcbaa60f5) 03:04:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:32 executing program 5: getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="972b32ec322549e69e193c5e6d443ea80de54d21cd7e12ef26fa4b3c0133c0844ff5f9f97ce293a3df0a29e7f2ff3f9f278aeaccb7f8c2571501aa4b4b424a923b6897cc82835cbe5f7de52e33a8d68b5127de83fb232d849b8c8df80c4ed105abe06dfdcbc939b5ca6aec1b723e37f62f81cef518869f96c0bf7f71bc00afa716236ce5b7985a56a6094b06a76e74d4d551b6b9c6078149dff6174ed74022f7e3578d6af728ec82f9753046725300a7f2e047e5f1c5bf870ef24cdcce08c1fcc6cdc9e18065a7b34de246754e12e56ecda342d1fc7b9d5bcb102398b3fa"], 0x0, 0xde}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000700)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xfffffffffffffc01) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000540)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/32}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0x138, 0x0}, 0xffffffffffffff48) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xb7fbe73a69aa6cf) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000900)) recvmsg(0xffffffffffffffff, 0x0, 0x2000) recvmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)=""/151, 0x97}, {&(0x7f0000000600)=""/226, 0xe2}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000840)=""/158, 0x9e}], 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000004440)={0x3, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xf, 0x7, 0xa}, @call={0x85, 0x0, 0x0, 0x58}, @map={0x18, 0x7}], 0x0, 0x400, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004400)={0x0, 0xa, 0x9f1}, 0x10}, 0x70) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) 03:04:32 executing program 5: getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="972b32ec322549e69e193c5e6d443ea80de54d21cd7e12ef26fa4b3c0133c0844ff5f9f97ce293a3df0a29e7f2ff3f9f278aeaccb7f8c2571501aa4b4b424a923b6897cc82835cbe5f7de52e33a8d68b5127de83fb232d849b8c8df80c4ed105abe06dfdcbc939b5ca6aec1b723e37f62f81cef518869f96c0bf7f71bc00afa716236ce5b7985a56a6094b06a76e74d4d551b6b9c6078149dff6174ed74022f7e3578d6af728ec82f9753046725300a7f2e047e5f1c5bf870ef24cdcce08c1fcc6cdc9e18065a7b34de246754e12e56ecda342d1fc7b9d5bcb102398b3fa"], 0x0, 0xde}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000700)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xfffffffffffffc01) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000540)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/32}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0x138, 0x0}, 0xffffffffffffff48) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xb7fbe73a69aa6cf) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000900)) recvmsg(0xffffffffffffffff, 0x0, 0x2000) recvmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)=""/151, 0x97}, {&(0x7f0000000600)=""/226, 0xe2}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000840)=""/158, 0x9e}], 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000004440)={0x3, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xf, 0x7, 0xa}, @call={0x85, 0x0, 0x0, 0x58}, @map={0x18, 0x7}], 0x0, 0x400, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004400)={0x0, 0xa, 0x9f1}, 0x10}, 0x70) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) 03:04:32 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xb000) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xcbaa60f5) 03:04:32 executing program 5: getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="972b32ec322549e69e193c5e6d443ea80de54d21cd7e12ef26fa4b3c0133c0844ff5f9f97ce293a3df0a29e7f2ff3f9f278aeaccb7f8c2571501aa4b4b424a923b6897cc82835cbe5f7de52e33a8d68b5127de83fb232d849b8c8df80c4ed105abe06dfdcbc939b5ca6aec1b723e37f62f81cef518869f96c0bf7f71bc00afa716236ce5b7985a56a6094b06a76e74d4d551b6b9c6078149dff6174ed74022f7e3578d6af728ec82f9753046725300a7f2e047e5f1c5bf870ef24cdcce08c1fcc6cdc9e18065a7b34de246754e12e56ecda342d1fc7b9d5bcb102398b3fa"], 0x0, 0xde}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000700)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xfffffffffffffc01) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r0, r1, 0xf, 0x1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000540)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/32}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0x138, 0x0}, 0xffffffffffffff48) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xb7fbe73a69aa6cf) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000900)) recvmsg(0xffffffffffffffff, 0x0, 0x2000) recvmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)=""/151, 0x97}, {&(0x7f0000000600)=""/226, 0xe2}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000840)=""/158, 0x9e}], 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000004440)={0x3, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0xf, 0x7, 0xa}, @call={0x85, 0x0, 0x0, 0x58}, @map={0x18, 0x7}], 0x0, 0x400, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004400)={0x0, 0xa, 0x9f1}, 0x10}, 0x70) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) 03:04:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x4, 0x10000, 0x0, 0x0, 0x9e4, 0x800, 0x2, 0x4, 0x80000001, 0x9f0b, 0x7b6, 0x7fff, 0x1, 0xacf8, 0x84e, 0x0, 0xfffffffffffffff7, 0x6, 0x7, 0x80, 0x6, 0x6, 0xb18, 0x8000, 0x2000000000000000, 0x81, 0x0, 0x7fffffff, 0x7f, 0x81, 0x9, 0x7, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x8000, 0x81, 0x0, 0x0, 0x800, 0xc859, 0x9}, 0x0, 0x0, r0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000380)={0x3, 0x70, 0x0, 0x1, 0x1, 0x9, 0x0, 0x22f0, 0x40048, 0x8, 0x3f8, 0x6, 0x1, 0x20, 0x800, 0xd3, 0xff, 0x10000, 0x80, 0x80000000, 0xffffffff, 0x2, 0x0, 0x3ff, 0x6, 0x3f, 0x0, 0x9, 0x8f33, 0x81, 0x8, 0x3, 0x7, 0x9, 0xfffffffffffffd9d, 0x4, 0x8, 0x0, 0x0, 0xc0, 0x4, @perf_bp={0x0, 0xf}, 0x4, 0x200, 0x7, 0x0, 0x800, 0x7f, 0xfc9}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000640)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0x8, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x0, 0x0, 0x8000000000, 0x9, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 03:04:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000002700050ad25a80648c63940d0124fc0010000a400a000000053582c137153e370900088004001700d1bd", 0x2e}], 0x1}, 0x0) [ 350.346110][T17310] validate_nla: 19 callbacks suppressed [ 350.346118][T17310] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 350.361085][T17310] netlink: 'syz-executor.2': attribute type 8 has an invalid length. 03:04:33 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xb000) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xcbaa60f5) 03:04:33 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:04:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000002700050ad25a80648c63940d0124fc0010000a400a000000053582c137153e370900088004001700d1bd", 0x2e}], 0x1}, 0x0) [ 351.851706][T17326] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 351.864253][T17326] netlink: 'syz-executor.2': attribute type 8 has an invalid length. 03:04:34 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:04:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008102e00f80ecdb4cb9f207c804a00d00000088000afb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 03:04:34 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 03:04:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000002700050ad25a80648c63940d0124fc0010000a400a000000053582c137153e370900088004001700d1bd", 0x2e}], 0x1}, 0x0) 03:04:34 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 352.054419][T17335] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. [ 352.074954][T17340] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 352.111062][T17340] netlink: 'syz-executor.2': attribute type 8 has an invalid length. 03:04:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008102e00f80ecdb4cb9f207c804a00d00000088000afb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 03:04:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000002700050ad25a80648c63940d0124fc0010000a400a000000053582c137153e370900088004001700d1bd", 0x2e}], 0x1}, 0x0) [ 352.458202][T17365] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 352.491885][T17347] device nr0 entered promiscuous mode [ 352.501843][T17363] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. [ 352.512281][T17365] netlink: 'syz-executor.2': attribute type 8 has an invalid length. 03:04:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008102e00f80ecdb4cb9f207c804a00d00000088000afb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 03:04:35 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:04:35 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:04:35 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 353.152947][T17377] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. 03:04:36 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:04:36 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:04:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008102e00f80ecdb4cb9f207c804a00d00000088000afb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) [ 353.503249][T17347] device nr0 entered promiscuous mode [ 353.532637][T17399] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. 03:04:36 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 03:04:36 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:04:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:36 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 354.545236][T17438] device nr0 entered promiscuous mode 03:04:37 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:04:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') [ 354.655254][T17443] device nr0 entered promiscuous mode 03:04:37 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 03:04:38 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 03:04:38 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 03:04:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') [ 355.580826][T17488] device nr0 entered promiscuous mode [ 355.995969][T17505] device nr0 entered promiscuous mode [ 356.032360][T17515] device nr0 entered promiscuous mode 03:04:38 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 03:04:38 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 03:04:38 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 03:04:38 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 03:04:39 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 356.789542][T17548] device nr0 entered promiscuous mode [ 356.845061][T17551] device nr0 entered promiscuous mode [ 356.885332][T17553] device nr0 entered promiscuous mode 03:04:39 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 356.926094][T17561] device nr0 entered promiscuous mode [ 357.329367][T17569] device nr0 entered promiscuous mode 03:04:40 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 03:04:40 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 357.616376][T17577] device nr0 entered promiscuous mode 03:04:40 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 03:04:40 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 358.208148][T17589] device nr0 entered promiscuous mode [ 358.265980][T17591] device nr0 entered promiscuous mode 03:04:41 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 03:04:41 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 358.403185][T17601] device nr0 entered promiscuous mode [ 358.817590][T17609] device nr0 entered promiscuous mode 03:04:41 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 359.038915][T17620] device nr0 entered promiscuous mode [ 359.126406][T17624] device nr0 entered promiscuous mode 03:04:42 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 03:04:42 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 03:04:42 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 03:04:42 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 359.841464][T17633] device nr0 entered promiscuous mode [ 359.895958][T17641] device nr0 entered promiscuous mode 03:04:42 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 359.988898][T17648] device nr0 entered promiscuous mode [ 360.409340][T17655] device nr0 entered promiscuous mode [ 360.579397][T17665] device nr0 entered promiscuous mode 03:04:43 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 360.649590][T17670] device nr0 entered promiscuous mode 03:04:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') [ 361.388030][T17682] device nr0 entered promiscuous mode 03:04:44 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 03:04:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:44 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 03:04:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') [ 362.018853][T17726] device nr0 entered promiscuous mode 03:04:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') [ 362.073643][T17738] device nr0 entered promiscuous mode 03:04:44 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000240)=@raw=[@exit, @map={0x18, 0xe, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x0, 0x1, [], 0x0, 0x1f, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0x0, 0x0}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139"], 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x771, 0x7, 0x1169, 0xffff, 0x0, 0x5, 0x804, 0xe, 0x1de6000000000, 0xbdf7, 0x9, 0x0, 0x1, 0x0, 0x81, 0x101, 0x8000, 0x5, 0x101, 0x80, 0xa453, 0x7, 0x7, 0x8, 0x8, 0x8, 0x8, 0x0, 0x2, 0x7, 0x0, 0x9, 0x4, 0x0, 0x7, 0x7, 0x0, 0xfffffffffffff000, 0x0, @perf_config_ext={0x2, 0x8}, 0x8, 0x7fffffff, 0x8, 0x4, 0x9, 0x7, 0x5}, 0xffffffffffffffff, 0x6, r4, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r3, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 03:04:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') [ 362.720037][T17774] device nr0 entered promiscuous mode 03:04:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:45 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:04:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:04:46 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:04:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:46 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:04:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000480)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/65, 0x41}, {&(0x7f0000000940)=""/156, 0x9c}], 0x2}, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) getpid() socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000580)=r1, 0x4) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000ac0)=@ethernet={0x0, @local}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/101, 0x65}, {&(0x7f00000005c0)=""/18, 0x12}], 0x2, &(0x7f0000000c80)=""/139, 0x8b}, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmsg$kcm(r4, &(0x7f0000006fc0)={&(0x7f00000049c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000004a40)=""/4096, 0x1000}, {&(0x7f0000005a40)=""/4096, 0x1000}, {&(0x7f0000006a40)=""/156, 0x9c}, {&(0x7f0000006b00)=""/144, 0x90}, {&(0x7f0000006bc0)=""/217, 0xd9}, {&(0x7f0000006cc0)=""/41, 0x29}, {&(0x7f0000006d00)=""/18, 0x12}, {&(0x7f0000006d40)=""/47, 0x2f}, {&(0x7f0000006d80)=""/117, 0x75}], 0x9, &(0x7f0000006ec0)=""/205, 0xcd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007080)={0x19, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000020000000000000020000000850000004e000000087a0001fcffff009500"/56], 0x0, 0x100000001, 0x8e, &(0x7f0000000a00)=""/142, 0x41f00, 0x1, [], r5, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000007000)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000007040)={0x5, 0x0, 0x4, 0x44}, 0x10}, 0x70) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x4000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000300)=@isdn={0x22, 0x1, 0x9, 0x6, 0x8}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="93ade544a47528941615a6f10af480a3badc94788999c272e3f98462c558b0e130894be87f4bbba3db3f84540189d83aad4334253448be", 0x37}], 0x1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x6000000000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 03:04:47 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:04:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:04:47 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:04:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:04:47 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) 03:04:47 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x46, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001740)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) [ 365.047548][T17905] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 365.078480][T17905] CPU: 1 PID: 17905 Comm: syz-executor.5 Not tainted 5.2.0-rc2+ #20 [ 365.086511][T17905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.096574][T17905] Call Trace: [ 365.099922][T17905] dump_stack+0x172/0x1f0 [ 365.104314][T17905] dump_header+0x10f/0xb6c [ 365.108768][T17905] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 365.114601][T17905] ? ___ratelimit+0x60/0x595 [ 365.119215][T17905] ? do_raw_spin_unlock+0x57/0x270 [ 365.124367][T17905] oom_kill_process.cold+0x10/0x15 [ 365.129543][T17905] out_of_memory+0x79a/0x1280 [ 365.134262][T17905] ? __sched_text_start+0x8/0x8 [ 365.139143][T17905] ? oom_killer_disable+0x280/0x280 [ 365.144425][T17905] mem_cgroup_out_of_memory+0x1ca/0x230 [ 365.150093][T17905] ? memcg_event_wake+0x230/0x230 [ 365.155171][T17905] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 365.161006][T17905] ? cgroup_file_notify+0x140/0x1b0 [ 365.166240][T17905] memory_max_write+0x169/0x300 [ 365.171124][T17905] ? mem_cgroup_write+0x360/0x360 [ 365.176189][T17905] ? lock_acquire+0x16f/0x3f0 [ 365.180886][T17905] ? kernfs_fop_write+0x227/0x480 [ 365.185958][T17905] cgroup_file_write+0x241/0x790 [ 365.190937][T17905] ? mem_cgroup_write+0x360/0x360 [ 365.196011][T17905] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 365.201687][T17905] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 365.207338][T17905] kernfs_fop_write+0x2b8/0x480 [ 365.212259][T17905] __vfs_write+0x8a/0x110 [ 365.216595][T17905] ? kernfs_fop_open+0xd80/0xd80 [ 365.221547][T17905] vfs_write+0x20c/0x580 [ 365.225807][T17905] ksys_write+0x14f/0x290 [ 365.230168][T17905] ? __ia32_sys_read+0xb0/0xb0 [ 365.234942][T17905] ? do_syscall_64+0x26/0x680 [ 365.239619][T17905] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.245686][T17905] ? do_syscall_64+0x26/0x680 [ 365.250379][T17905] __x64_sys_write+0x73/0xb0 [ 365.255009][T17905] do_syscall_64+0xfd/0x680 [ 365.259576][T17905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.265472][T17905] RIP: 0033:0x4592c9 [ 365.269397][T17905] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 365.289007][T17905] RSP: 002b:00007feab2bf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 03:04:48 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x46, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001740)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) [ 365.297438][T17905] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 365.305425][T17905] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 365.313402][T17905] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 365.321373][T17905] R10: 0000000000000000 R11: 0000000000000246 R12: 00007feab2bf46d4 [ 365.329358][T17905] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff 03:04:48 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 365.410542][T17905] memory: usage 6112kB, limit 0kB, failcnt 26 03:04:48 executing program 4: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x46, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001740)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) 03:04:48 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:04:48 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x46, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001740)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) [ 365.475149][T17905] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 03:04:48 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:04:48 executing program 4: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x46, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001740)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) 03:04:48 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x46, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001740)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) [ 365.753688][T17905] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 365.800589][T17905] Memory cgroup stats for /syz5: cache:120KB rss:2260KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2188KB inactive_file:132KB active_file:0KB unevictable:0KB [ 365.833960][T17905] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=17903,uid=0 03:04:48 executing program 4: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x46, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001740)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) [ 365.966753][T17905] Memory cgroup out of memory: Killed process 17903 (syz-executor.5) total-vm:72708kB, anon-rss:2148kB, file-rss:34816kB, shmem-rss:0kB 03:04:48 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f00000045c0)={&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @remote, 0x1d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)="dd", 0x1}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000002f40)={0x0, 0xd, 0x0}, 0x40010102) setsockopt$sock_attach_bpf(r1, 0x1, 0x7, &(0x7f0000000080), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 366.090881][ T1044] oom_reaper: reaped process 17903 (syz-executor.5), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB 03:04:48 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) 03:04:48 executing program 0: recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) socket$kcm(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="24000000140081ae08060804000f000010ff0100000060003f01546fabca1b4e7d06a6bd", 0x24}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) socket$kcm(0x10, 0x3, 0x0) close(0xffffffffffffffff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) 03:04:48 executing program 4: r0 = socket$kcm(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x5, &(0x7f0000002340), 0x20002344) 03:04:48 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0xab) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 366.250789][T15305] syz-executor.5 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 366.306952][T15305] CPU: 0 PID: 15305 Comm: syz-executor.5 Not tainted 5.2.0-rc2+ #20 [ 366.314933][T15305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.314938][T15305] Call Trace: [ 366.314957][T15305] dump_stack+0x172/0x1f0 [ 366.314979][T15305] dump_header+0x10f/0xb6c [ 366.314996][T15305] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 366.315011][T15305] ? ___ratelimit+0x60/0x595 [ 366.315025][T15305] ? do_raw_spin_unlock+0x57/0x270 03:04:49 executing program 4: r0 = socket$kcm(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x5, &(0x7f0000002340), 0x20002344) [ 366.315043][T15305] oom_kill_process.cold+0x10/0x15 [ 366.315060][T15305] out_of_memory+0x79a/0x1280 [ 366.315077][T15305] ? lock_downgrade+0x880/0x880 [ 366.315091][T15305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 366.315107][T15305] ? oom_killer_disable+0x280/0x280 [ 366.315124][T15305] ? find_held_lock+0x35/0x130 [ 366.332845][T15305] mem_cgroup_out_of_memory+0x1ca/0x230 [ 366.332861][T15305] ? memcg_event_wake+0x230/0x230 [ 366.332881][T15305] ? do_raw_spin_unlock+0x57/0x270 [ 366.332896][T15305] ? _raw_spin_unlock+0x2d/0x50 [ 366.332917][T15305] try_charge+0x102c/0x15c0 [ 366.389011][T15305] ? find_held_lock+0x35/0x130 [ 366.408475][T15305] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 366.408490][T15305] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 366.408507][T15305] ? find_held_lock+0x35/0x130 [ 366.429137][T15305] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 366.434752][T15305] __memcg_kmem_charge_memcg+0x7c/0x130 [ 366.440313][T15305] ? memcg_kmem_put_cache+0xb0/0xb0 [ 366.445531][T15305] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 366.451088][T15305] __memcg_kmem_charge+0x136/0x300 03:04:49 executing program 4: r0 = socket$kcm(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x5, &(0x7f0000002340), 0x20002344) [ 366.456214][T15305] __alloc_pages_nodemask+0x4bd/0x8d0 [ 366.461593][T15305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 366.467850][T15305] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 366.473679][T15305] ? copy_process.part.0+0x43f7/0x6790 [ 366.479168][T15305] ? lockdep_hardirqs_on+0x418/0x5d0 [ 366.484470][T15305] ? trace_hardirqs_on+0x67/0x220 [ 366.489500][T15305] ? kasan_check_read+0x11/0x20 [ 366.494371][T15305] copy_process.part.0+0x4a0/0x6790 [ 366.499592][T15305] ? __might_fault+0x12b/0x1e0 03:04:49 executing program 4: r0 = socket$kcm(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x5, &(0x7f0000002340), 0x20002344) [ 366.504383][T15305] ? __cleanup_sighand+0x60/0x60 [ 366.509339][T15305] ? lock_downgrade+0x880/0x880 [ 366.514236][T15305] _do_fork+0x25d/0xfe0 [ 366.518426][T15305] ? copy_init_mm+0x20/0x20 [ 366.522961][T15305] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 366.528437][T15305] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 366.533913][T15305] ? do_syscall_64+0x26/0x680 [ 366.538618][T15305] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.544698][T15305] ? do_syscall_64+0x26/0x680 [ 366.549380][T15305] __x64_sys_clone+0xbf/0x150 [ 366.554079][T15305] do_syscall_64+0xfd/0x680 [ 366.558577][T15305] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.564461][T15305] RIP: 0033:0x45789a [ 366.568357][T15305] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 366.587947][T15305] RSP: 002b:00007ffc93729560 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 366.596347][T15305] RAX: ffffffffffffffda RBX: 00007ffc93729560 RCX: 000000000045789a 03:04:49 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x5, &(0x7f0000002340), 0x20002344) [ 366.604311][T15305] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 366.612268][T15305] RBP: 00007ffc937295a0 R08: 0000000000000001 R09: 0000555555ed9940 [ 366.620224][T15305] R10: 0000555555ed9c10 R11: 0000000000000246 R12: 0000000000000001 [ 366.628203][T15305] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffc937295f0 [ 366.643051][T15305] memory: usage 3668kB, limit 0kB, failcnt 43 [ 366.649141][T15305] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 03:04:49 executing program 0: recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) socket$kcm(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="24000000140081ae08060804000f000010ff0100000060003f01546fabca1b4e7d06a6bd", 0x24}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) socket$kcm(0x10, 0x3, 0x0) close(0xffffffffffffffff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) [ 366.682067][T15305] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 366.699541][T15305] Memory cgroup stats for /syz5: cache:120KB rss:100KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:100KB inactive_file:132KB active_file:0KB unevictable:0KB [ 366.740167][T15305] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15305,uid=0 03:04:49 executing program 4: recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) socket$kcm(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="24000000140081ae08060804000f000010ff0100000060003f01546fabca1b4e7d06a6bd", 0x24}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) socket$kcm(0x10, 0x3, 0x0) close(0xffffffffffffffff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) [ 366.792109][T15305] Memory cgroup out of memory: Killed process 15305 (syz-executor.5) total-vm:72444kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB [ 366.813205][ T1044] oom_reaper: reaped process 15305 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 03:04:49 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) [ 366.930126][ C1] net_ratelimit: 4 callbacks suppressed [ 366.930134][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 366.941506][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:04:49 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f00000045c0)={&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @remote, 0x1d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)="dd", 0x1}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000002f40)={0x0, 0xd, 0x0}, 0x40010102) setsockopt$sock_attach_bpf(r1, 0x1, 0x7, &(0x7f0000000080), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 367.147822][T17986] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 367.159568][T17986] CPU: 1 PID: 17986 Comm: syz-executor.1 Not tainted 5.2.0-rc2+ #20 [ 367.167558][T17986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.177605][T17986] Call Trace: [ 367.180932][T17986] dump_stack+0x172/0x1f0 [ 367.185285][T17986] dump_header+0x10f/0xb6c [ 367.189714][T17986] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 367.195539][T17986] ? ___ratelimit+0x60/0x595 [ 367.200133][T17986] ? do_raw_spin_unlock+0x57/0x270 [ 367.205256][T17986] oom_kill_process.cold+0x10/0x15 [ 367.210379][T17986] out_of_memory+0x79a/0x1280 [ 367.215057][T17986] ? __sched_text_start+0x8/0x8 [ 367.219910][T17986] ? oom_killer_disable+0x280/0x280 [ 367.225116][T17986] mem_cgroup_out_of_memory+0x1ca/0x230 [ 367.230660][T17986] ? memcg_event_wake+0x230/0x230 [ 367.235688][T17986] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 367.241500][T17986] ? cgroup_file_notify+0x140/0x1b0 [ 367.246702][T17986] memory_max_write+0x169/0x300 [ 367.251577][T17986] ? mem_cgroup_write+0x360/0x360 [ 367.256603][T17986] ? mem_cgroup_write+0x360/0x360 [ 367.261648][T17986] ? cgroup_file_write+0x1e2/0x790 [ 367.266762][T17986] cgroup_file_write+0x241/0x790 [ 367.271701][T17986] ? mem_cgroup_write+0x360/0x360 [ 367.276723][T17986] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 367.282369][T17986] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 367.288001][T17986] kernfs_fop_write+0x2b8/0x480 [ 367.292850][T17986] __vfs_write+0x8a/0x110 [ 367.297177][T17986] ? kernfs_fop_open+0xd80/0xd80 [ 367.302134][T17986] vfs_write+0x20c/0x580 [ 367.306399][T17986] ksys_write+0x14f/0x290 [ 367.310740][T17986] ? __ia32_sys_read+0xb0/0xb0 [ 367.315503][T17986] ? do_syscall_64+0x26/0x680 [ 367.320192][T17986] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.326251][T17986] ? do_syscall_64+0x26/0x680 [ 367.330953][T17986] __x64_sys_write+0x73/0xb0 [ 367.335538][T17986] do_syscall_64+0xfd/0x680 [ 367.340046][T17986] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.345940][T17986] RIP: 0033:0x4592c9 [ 367.349831][T17986] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 367.369425][T17986] RSP: 002b:00007ff057711c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 367.377836][T17986] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 367.385814][T17986] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 367.393785][T17986] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 367.401748][T17986] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff0577126d4 [ 367.409718][T17986] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 367.426581][T17986] memory: usage 5908kB, limit 0kB, failcnt 42 [ 367.432894][T17986] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 367.440971][T17986] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 367.447879][T17986] Memory cgroup stats for [ 367.447957][T17986] /syz1: cache:288KB rss:2120KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2120KB inactive_file:0KB active_file:0KB unevictable:0KB [ 367.471740][T17986] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=17985,uid=0 [ 367.488086][T17986] Memory cgroup out of memory: Killed process 17985 (syz-executor.1) total-vm:72576kB, anon-rss:2192kB, file-rss:35772kB, shmem-rss:0kB [ 367.504938][ T1044] oom_reaper: reaped process 17985 (syz-executor.1), now anon-rss:0kB, file-rss:34812kB, shmem-rss:0kB 03:04:50 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) 03:04:50 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x5, &(0x7f0000002340), 0x20002344) 03:04:50 executing program 0: recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) socket$kcm(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="24000000140081ae08060804000f000010ff0100000060003f01546fabca1b4e7d06a6bd", 0x24}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) socket$kcm(0x10, 0x3, 0x0) close(0xffffffffffffffff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) 03:04:50 executing program 4: recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) socket$kcm(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="24000000140081ae08060804000f000010ff0100000060003f01546fabca1b4e7d06a6bd", 0x24}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) socket$kcm(0x10, 0x3, 0x0) close(0xffffffffffffffff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) 03:04:50 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) 03:04:50 executing program 4: recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) socket$kcm(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="24000000140081ae08060804000f000010ff0100000060003f01546fabca1b4e7d06a6bd", 0x24}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) socket$kcm(0x10, 0x3, 0x0) close(0xffffffffffffffff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) 03:04:50 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x5, &(0x7f0000002340), 0x20002344) 03:04:50 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) [ 367.696443][T15385] syz-executor.1 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 367.765990][T15385] CPU: 0 PID: 15385 Comm: syz-executor.1 Not tainted 5.2.0-rc2+ #20 [ 367.774005][T15385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.784062][T15385] Call Trace: [ 367.787354][T15385] dump_stack+0x172/0x1f0 [ 367.791702][T15385] dump_header+0x10f/0xb6c [ 367.796126][T15385] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 367.801938][T15385] ? ___ratelimit+0x60/0x595 [ 367.806531][T15385] ? do_raw_spin_unlock+0x57/0x270 [ 367.811650][T15385] oom_kill_process.cold+0x10/0x15 [ 367.816772][T15385] out_of_memory+0x79a/0x1280 [ 367.821454][T15385] ? lock_downgrade+0x880/0x880 [ 367.826319][T15385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 367.832557][T15385] ? oom_killer_disable+0x280/0x280 [ 367.837760][T15385] ? find_held_lock+0x35/0x130 [ 367.842530][T15385] mem_cgroup_out_of_memory+0x1ca/0x230 [ 367.848070][T15385] ? memcg_event_wake+0x230/0x230 [ 367.853094][T15385] ? do_raw_spin_unlock+0x57/0x270 [ 367.858204][T15385] ? _raw_spin_unlock+0x2d/0x50 [ 367.863055][T15385] try_charge+0x102c/0x15c0 [ 367.867551][T15385] ? find_held_lock+0x35/0x130 [ 367.872320][T15385] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 367.877866][T15385] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 367.883418][T15385] ? find_held_lock+0x35/0x130 [ 367.888181][T15385] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 367.893732][T15385] __memcg_kmem_charge_memcg+0x7c/0x130 [ 367.899288][T15385] ? memcg_kmem_put_cache+0xb0/0xb0 [ 367.904502][T15385] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 367.910060][T15385] __memcg_kmem_charge+0x136/0x300 [ 367.915209][T15385] __alloc_pages_nodemask+0x4bd/0x8d0 [ 367.920589][T15385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 367.926840][T15385] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 367.932567][T15385] ? copy_process.part.0+0x43f7/0x6790 [ 367.938034][T15385] ? lockdep_hardirqs_on+0x418/0x5d0 [ 367.943321][T15385] ? trace_hardirqs_on+0x67/0x220 [ 367.948341][T15385] ? kasan_check_read+0x11/0x20 [ 367.953197][T15385] copy_process.part.0+0x4a0/0x6790 [ 367.958403][T15385] ? __might_fault+0x12b/0x1e0 [ 367.963173][T15385] ? __cleanup_sighand+0x60/0x60 [ 367.968111][T15385] ? lock_downgrade+0x880/0x880 [ 367.972974][T15385] _do_fork+0x25d/0xfe0 [ 367.977132][T15385] ? copy_init_mm+0x20/0x20 [ 367.981638][T15385] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 367.987602][T15385] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 367.993061][T15385] ? do_syscall_64+0x26/0x680 [ 367.997735][T15385] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 368.003794][T15385] ? do_syscall_64+0x26/0x680 [ 368.008486][T15385] __x64_sys_clone+0xbf/0x150 03:04:50 executing program 0: recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) socket$kcm(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="24000000140081ae08060804000f000010ff0100000060003f01546fabca1b4e7d06a6bd", 0x24}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) socket$kcm(0x10, 0x3, 0x0) close(0xffffffffffffffff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) [ 368.013166][T15385] do_syscall_64+0xfd/0x680 [ 368.017698][T15385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 368.023584][T15385] RIP: 0033:0x45789a [ 368.027477][T15385] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 368.047072][T15385] RSP: 002b:00007ffd426c4230 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 368.055503][T15385] RAX: ffffffffffffffda RBX: 00007ffd426c4230 RCX: 000000000045789a 03:04:50 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f00000045c0)={&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @remote, 0x1d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)="dd", 0x1}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000002f40)={0x0, 0xd, 0x0}, 0x40010102) setsockopt$sock_attach_bpf(r1, 0x1, 0x7, &(0x7f0000000080), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 368.063479][T15385] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 368.063488][T15385] RBP: 00007ffd426c4270 R08: 0000000000000001 R09: 0000555555dcd940 [ 368.063495][T15385] R10: 0000555555dcdc10 R11: 0000000000000246 R12: 0000000000000001 [ 368.063502][T15385] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffd426c42c0 [ 368.100783][T15385] memory: usage 3564kB, limit 0kB, failcnt 50 [ 368.106857][T15385] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 03:04:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f00000045c0)={&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @remote, 0x1d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)="dd", 0x1}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000002f40)={0x0, 0xd, 0x0}, 0x40010102) setsockopt$sock_attach_bpf(r1, 0x1, 0x7, &(0x7f0000000080), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 368.152499][T15385] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 368.160953][T15385] Memory cgroup stats for /syz1: cache:288KB rss:8KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:8KB inactive_file:0KB active_file:0KB unevictable:0KB [ 368.194745][T15385] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=15385,uid=0 03:04:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f00000045c0)={&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @remote, 0x1d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)="dd", 0x1}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000002f40)={0x0, 0xd, 0x0}, 0x40010102) setsockopt$sock_attach_bpf(r1, 0x1, 0x7, &(0x7f0000000080), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 368.298710][T15385] Memory cgroup out of memory: Killed process 15385 (syz-executor.1) total-vm:72444kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB 03:04:51 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) [ 368.577507][T18028] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 368.588284][T18028] CPU: 1 PID: 18028 Comm: syz-executor.0 Not tainted 5.2.0-rc2+ #20 [ 368.596280][T18028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.606331][T18028] Call Trace: [ 368.609628][T18028] dump_stack+0x172/0x1f0 [ 368.613967][T18028] dump_header+0x10f/0xb6c [ 368.618391][T18028] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 368.624200][T18028] ? ___ratelimit+0x60/0x595 [ 368.628792][T18028] ? do_raw_spin_unlock+0x57/0x270 [ 368.633909][T18028] oom_kill_process.cold+0x10/0x15 [ 368.639044][T18028] out_of_memory+0x79a/0x1280 [ 368.643736][T18028] ? __sched_text_start+0x8/0x8 [ 368.648584][T18028] ? oom_killer_disable+0x280/0x280 [ 368.653790][T18028] mem_cgroup_out_of_memory+0x1ca/0x230 [ 368.659331][T18028] ? memcg_event_wake+0x230/0x230 [ 368.664380][T18028] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 368.670213][T18028] ? cgroup_file_notify+0x140/0x1b0 [ 368.675444][T18028] memory_max_write+0x169/0x300 [ 368.680309][T18028] ? mem_cgroup_write+0x360/0x360 [ 368.685325][T18028] ? lock_acquire+0x16f/0x3f0 [ 368.690001][T18028] ? kernfs_fop_write+0x227/0x480 [ 368.695028][T18028] cgroup_file_write+0x241/0x790 [ 368.699963][T18028] ? mem_cgroup_write+0x360/0x360 [ 368.704987][T18028] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 368.710626][T18028] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 368.716259][T18028] kernfs_fop_write+0x2b8/0x480 [ 368.721112][T18028] __vfs_write+0x8a/0x110 [ 368.725462][T18028] ? kernfs_fop_open+0xd80/0xd80 [ 368.730406][T18028] vfs_write+0x20c/0x580 [ 368.734677][T18028] ksys_write+0x14f/0x290 [ 368.739028][T18028] ? __ia32_sys_read+0xb0/0xb0 [ 368.743808][T18028] __x64_sys_write+0x73/0xb0 [ 368.748397][T18028] ? do_syscall_64+0x5b/0x680 [ 368.753073][T18028] do_syscall_64+0xfd/0x680 [ 368.757588][T18028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 368.763490][T18028] RIP: 0033:0x4592c9 [ 368.767384][T18028] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 368.787007][T18028] RSP: 002b:00007f5bd4e64c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 368.795417][T18028] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 368.803371][T18028] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 368.811334][T18028] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 368.819293][T18028] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5bd4e656d4 [ 368.827303][T18028] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 368.840484][T18028] memory: usage 6020kB, limit 0kB, failcnt 38 [ 368.846623][T18028] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 368.854770][T18028] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 368.862497][T18028] Memory cgroup stats for /syz0: cache:12KB [ 368.862595][T18028] rss:2280KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2212KB inactive_file:0KB active_file:0KB unevictable:0KB [ 368.886468][T18028] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=18027,uid=0 [ 368.904944][T18028] Memory cgroup out of memory: Killed process 18027 (syz-executor.0) total-vm:72576kB, anon-rss:2148kB, file-rss:34816kB, shmem-rss:0kB 03:04:51 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f00000045c0)={&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @remote, 0x1d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)="dd", 0x1}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000002f40)={0x0, 0xd, 0x0}, 0x40010102) setsockopt$sock_attach_bpf(r1, 0x1, 0x7, &(0x7f0000000080), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 368.925139][ T1044] oom_reaper: reaped process 18027 (syz-executor.0), now anon-rss:0kB, file-rss:34876kB, shmem-rss:0kB 03:04:51 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) 03:04:51 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) [ 369.053304][T15329] syz-executor.0 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 369.077023][T15329] CPU: 0 PID: 15329 Comm: syz-executor.0 Not tainted 5.2.0-rc2+ #20 [ 369.085046][T15329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.095100][T15329] Call Trace: [ 369.098390][T15329] dump_stack+0x172/0x1f0 [ 369.102738][T15329] dump_header+0x10f/0xb6c [ 369.107168][T15329] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 369.112981][T15329] ? ___ratelimit+0x60/0x595 [ 369.117580][T15329] ? do_raw_spin_unlock+0x57/0x270 [ 369.122703][T15329] oom_kill_process.cold+0x10/0x15 [ 369.127815][T15329] out_of_memory+0x79a/0x1280 [ 369.132494][T15329] ? lock_downgrade+0x880/0x880 [ 369.137340][T15329] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 369.143586][T15329] ? oom_killer_disable+0x280/0x280 [ 369.148819][T15329] ? find_held_lock+0x35/0x130 [ 369.153592][T15329] mem_cgroup_out_of_memory+0x1ca/0x230 [ 369.159143][T15329] ? memcg_event_wake+0x230/0x230 [ 369.164172][T15329] ? do_raw_spin_unlock+0x57/0x270 [ 369.169281][T15329] ? _raw_spin_unlock+0x2d/0x50 [ 369.174125][T15329] try_charge+0x102c/0x15c0 [ 369.178621][T15329] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 369.184172][T15329] ? rcu_read_lock_sched_held+0x110/0x130 [ 369.189907][T15329] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 369.195448][T15329] __memcg_kmem_charge_memcg+0x7c/0x130 [ 369.200980][T15329] ? memcg_kmem_put_cache+0xb0/0xb0 [ 369.206174][T15329] ? cache_grow_begin+0x3d6/0x650 [ 369.211203][T15329] ? lockdep_hardirqs_on+0x418/0x5d0 [ 369.216476][T15329] ? trace_hardirqs_on+0x67/0x220 [ 369.221500][T15329] cache_grow_begin+0x402/0x650 [ 369.226347][T15329] ? __cpuset_node_allowed+0x136/0x540 [ 369.231804][T15329] fallback_alloc+0x1fd/0x2d0 [ 369.236486][T15329] ____cache_alloc_node+0x1be/0x1e0 [ 369.241675][T15329] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 369.247917][T15329] kmem_cache_alloc_node+0xe3/0x710 [ 369.253106][T15329] ? lockdep_hardirqs_on+0x418/0x5d0 [ 369.258381][T15329] ? trace_hardirqs_on+0x67/0x220 [ 369.263399][T15329] copy_process.part.0+0x43f7/0x6790 [ 369.268673][T15329] ? __might_fault+0x12b/0x1e0 [ 369.273446][T15329] ? __cleanup_sighand+0x60/0x60 [ 369.278371][T15329] ? lock_downgrade+0x880/0x880 [ 369.283221][T15329] _do_fork+0x25d/0xfe0 [ 369.287379][T15329] ? copy_init_mm+0x20/0x20 [ 369.291878][T15329] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 369.297347][T15329] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 369.302807][T15329] ? do_syscall_64+0x26/0x680 [ 369.307471][T15329] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 369.313536][T15329] ? do_syscall_64+0x26/0x680 [ 369.318227][T15329] __x64_sys_clone+0xbf/0x150 [ 369.322893][T15329] do_syscall_64+0xfd/0x680 [ 369.327397][T15329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 369.333306][T15329] RIP: 0033:0x45789a [ 369.337207][T15329] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 369.356825][T15329] RSP: 002b:00007fff981136b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 369.365235][T15329] RAX: ffffffffffffffda RBX: 00007fff981136b0 RCX: 000000000045789a [ 369.373206][T15329] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 369.381164][T15329] RBP: 00007fff981136f0 R08: 0000000000000001 R09: 000055555617b940 [ 369.389122][T15329] R10: 000055555617bc10 R11: 0000000000000246 R12: 0000000000000001 [ 369.397077][T15329] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fff98113740 03:04:52 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f00000045c0)={&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @remote, 0x1d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)="dd", 0x1}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000002f40)={0x0, 0xd, 0x0}, 0x40010102) setsockopt$sock_attach_bpf(r1, 0x1, 0x7, &(0x7f0000000080), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:04:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f00000045c0)={&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @remote, 0x1d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)="dd", 0x1}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000002f40)={0x0, 0xd, 0x0}, 0x40010102) setsockopt$sock_attach_bpf(r1, 0x1, 0x7, &(0x7f0000000080), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 369.540133][T15329] memory: usage 3664kB, limit 0kB, failcnt 50 [ 369.546238][T15329] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 369.580188][T15329] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 03:04:52 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) [ 369.587035][T15329] Memory cgroup stats for /syz0: cache:12KB rss:168KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:100KB inactive_file:0KB active_file:0KB unevictable:0KB [ 369.616291][T15329] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=15329,uid=0 [ 369.631591][T18043] IPVS: ftp: loaded support on port[0] = 21 [ 369.664261][T15329] Memory cgroup out of memory: Killed process 15329 (syz-executor.0) total-vm:72444kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB [ 369.684371][ T1044] oom_reaper: reaped process 15329 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 370.135947][T18043] chnl_net:caif_netlink_parms(): no params data found [ 370.222308][T18043] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.229381][T18043] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.237103][T18043] device bridge_slave_0 entered promiscuous mode [ 370.329893][T18043] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.338919][T18043] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.352336][T18043] device bridge_slave_1 entered promiscuous mode [ 370.372356][T18043] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 370.382495][T18043] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 370.402286][T18043] team0: Port device team_slave_0 added [ 370.409593][T18043] team0: Port device team_slave_1 added [ 370.462641][T18043] device hsr_slave_0 entered promiscuous mode [ 370.511604][T18043] device hsr_slave_1 entered promiscuous mode [ 370.643201][T18043] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.650281][T18043] bridge0: port 2(bridge_slave_1) entered forwarding state [ 370.657615][T18043] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.664720][T18043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 370.790166][T18054] IPVS: ftp: loaded support on port[0] = 21 [ 370.794490][T18043] 8021q: adding VLAN 0 to HW filter on device bond0 [ 370.891660][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 370.899542][ T3001] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.907317][ T3001] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.963859][T18043] 8021q: adding VLAN 0 to HW filter on device team0 [ 370.975398][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 370.983833][T15162] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.990923][T15162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.048164][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 371.056489][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.063579][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.073719][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 371.082335][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 371.090961][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 371.177868][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 371.189301][T18054] chnl_net:caif_netlink_parms(): no params data found [ 371.203416][T18043] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 371.221355][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 371.229672][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 371.306608][T18043] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 371.328234][T18054] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.338015][T18054] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.346454][T18054] device bridge_slave_0 entered promiscuous mode [ 371.354957][T18054] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.362268][T18054] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.370585][T18054] device bridge_slave_1 entered promiscuous mode [ 371.426049][T18054] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 371.456419][T18054] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 371.534979][T18054] team0: Port device team_slave_0 added [ 371.542736][T18054] team0: Port device team_slave_1 added [ 371.582997][T18062] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 371.593893][T18062] CPU: 0 PID: 18062 Comm: syz-executor.5 Not tainted 5.2.0-rc2+ #20 [ 371.601860][T18062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.611894][T18062] Call Trace: [ 371.615197][T18062] dump_stack+0x172/0x1f0 [ 371.619536][T18062] dump_header+0x10f/0xb6c [ 371.624003][T18062] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 371.629790][T18062] ? ___ratelimit+0x60/0x595 [ 371.634368][T18062] ? do_raw_spin_unlock+0x57/0x270 [ 371.639515][T18062] oom_kill_process.cold+0x10/0x15 [ 371.644611][T18062] out_of_memory+0x79a/0x1280 [ 371.649292][T18062] ? __sched_text_start+0x8/0x8 [ 371.654144][T18062] ? oom_killer_disable+0x280/0x280 [ 371.659362][T18062] mem_cgroup_out_of_memory+0x1ca/0x230 [ 371.664884][T18062] ? memcg_event_wake+0x230/0x230 [ 371.669894][T18062] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 371.675691][T18062] ? cgroup_file_notify+0x140/0x1b0 [ 371.680878][T18062] memory_max_write+0x169/0x300 [ 371.685705][T18062] ? mem_cgroup_write+0x360/0x360 [ 371.690729][T18062] ? mem_cgroup_write+0x360/0x360 [ 371.695749][T18062] ? cgroup_file_write+0x1e2/0x790 [ 371.700863][T18062] cgroup_file_write+0x241/0x790 [ 371.705778][T18062] ? mem_cgroup_write+0x360/0x360 [ 371.710793][T18062] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 371.716450][T18062] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 371.722069][T18062] kernfs_fop_write+0x2b8/0x480 [ 371.726920][T18062] __vfs_write+0x8a/0x110 [ 371.731315][T18062] ? kernfs_fop_open+0xd80/0xd80 [ 371.736262][T18062] vfs_write+0x20c/0x580 [ 371.740511][T18062] ksys_write+0x14f/0x290 [ 371.744865][T18062] ? __ia32_sys_read+0xb0/0xb0 [ 371.749641][T18062] __x64_sys_write+0x73/0xb0 [ 371.754243][T18062] do_syscall_64+0xfd/0x680 [ 371.758738][T18062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.764608][T18062] RIP: 0033:0x4592c9 [ 371.768491][T18062] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 371.788070][T18062] RSP: 002b:00007fb50bc84c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 371.796461][T18062] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 371.804422][T18062] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 371.812377][T18062] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 371.820333][T18062] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb50bc856d4 [ 371.828290][T18062] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 371.840678][T18062] memory: usage 5804kB, limit 0kB, failcnt 46 [ 371.847118][T18062] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 371.859222][T18054] device hsr_slave_0 entered promiscuous mode [ 371.865395][T18062] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 371.872460][T18062] Memory cgroup stats for /syz5: cache:120KB rss:2248KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2248KB inactive_file:132KB active_file:0KB unevictable:0KB [ 371.894054][T18062] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=18061,uid=0 [ 371.909824][T18062] Memory cgroup out of memory: Killed process 18061 (syz-executor.5) total-vm:72580kB, anon-rss:2184kB, file-rss:35776kB, shmem-rss:0kB [ 371.928603][ T1044] oom_reaper: reaped process 18061 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 371.950693][T18054] device hsr_slave_1 entered promiscuous mode 03:04:54 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) 03:04:54 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) 03:04:54 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) 03:04:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f00000045c0)={&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @remote, 0x1d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)="dd", 0x1}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000002f40)={0x0, 0xd, 0x0}, 0x40010102) setsockopt$sock_attach_bpf(r1, 0x1, 0x7, &(0x7f0000000080), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:04:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f00000045c0)={&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @remote, 0x1d}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)="dd", 0x1}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000002f40)={0x0, 0xd, 0x0}, 0x40010102) setsockopt$sock_attach_bpf(r1, 0x1, 0x7, &(0x7f0000000080), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 372.023888][T18043] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 372.039966][T18043] CPU: 1 PID: 18043 Comm: syz-executor.5 Not tainted 5.2.0-rc2+ #20 [ 372.047960][T18043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.058008][T18043] Call Trace: [ 372.061298][T18043] dump_stack+0x172/0x1f0 [ 372.065634][T18043] dump_header+0x10f/0xb6c [ 372.070086][T18043] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 372.075909][T18043] ? ___ratelimit+0x60/0x595 [ 372.080527][T18043] ? do_raw_spin_unlock+0x57/0x270 [ 372.085668][T18043] oom_kill_process.cold+0x10/0x15 [ 372.090804][T18043] out_of_memory+0x79a/0x1280 [ 372.096010][T18043] ? lock_downgrade+0x880/0x880 [ 372.100863][T18043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 372.107107][T18043] ? oom_killer_disable+0x280/0x280 [ 372.112329][T18043] ? find_held_lock+0x35/0x130 [ 372.117105][T18043] mem_cgroup_out_of_memory+0x1ca/0x230 [ 372.122683][T18043] ? memcg_event_wake+0x230/0x230 [ 372.127728][T18043] ? do_raw_spin_unlock+0x57/0x270 [ 372.132855][T18043] ? _raw_spin_unlock+0x2d/0x50 [ 372.137746][T18043] try_charge+0x102c/0x15c0 [ 372.142250][T18043] ? find_held_lock+0x35/0x130 [ 372.147026][T18043] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 372.153278][T18043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 372.159525][T18043] ? kasan_check_read+0x11/0x20 [ 372.164393][T18043] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 372.169939][T18043] mem_cgroup_try_charge+0x24d/0x5e0 [ 372.175234][T18043] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 372.180879][T18043] wp_page_copy+0x416/0x1770 [ 372.185476][T18043] ? do_wp_page+0x486/0x1500 [ 372.190077][T18043] ? pmd_pfn+0x1d0/0x1d0 [ 372.194337][T18043] ? lock_downgrade+0x880/0x880 [ 372.199223][T18043] ? swp_swapcount+0x540/0x540 [ 372.203992][T18043] ? do_raw_spin_unlock+0x57/0x270 [ 372.209105][T18043] ? kasan_check_read+0x11/0x20 [ 372.213956][T18043] ? do_raw_spin_unlock+0x57/0x270 [ 372.219067][T18043] do_wp_page+0x48e/0x1500 [ 372.223488][T18043] ? finish_mkwrite_fault+0x540/0x540 [ 372.228882][T18043] __handle_mm_fault+0x22e3/0x3eb0 [ 372.234041][T18043] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 372.239587][T18043] ? find_held_lock+0x35/0x130 [ 372.244364][T18043] ? handle_mm_fault+0x292/0xa90 [ 372.249323][T18043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 372.255568][T18043] ? kasan_check_read+0x11/0x20 [ 372.260422][T18043] handle_mm_fault+0x3b7/0xa90 [ 372.265212][T18043] __do_page_fault+0x5ef/0xda0 [ 372.270014][T18043] do_page_fault+0x71/0x57d [ 372.274551][T18043] ? page_fault+0x8/0x30 [ 372.278794][T18043] page_fault+0x1e/0x30 [ 372.282944][T18043] RIP: 0033:0x4303a6 [ 372.286836][T18043] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 372.306426][T18043] RSP: 002b:00007ffc612ee350 EFLAGS: 00010206 [ 372.312470][T18043] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 372.320429][T18043] RDX: 000055555606c930 RSI: 0000555556074970 RDI: 0000000000000003 [ 372.328374][T18043] RBP: 0000000000008041 R08: 0000000000000001 R09: 000055555606b940 [ 372.336364][T18043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 372.344336][T18043] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 372.352960][T18043] memory: usage 3472kB, limit 0kB, failcnt 54 [ 372.359276][T18043] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 372.373211][T18043] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 372.382369][T18054] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.389457][T18054] bridge0: port 2(bridge_slave_1) entered forwarding state [ 372.396547][T18043] Memory cgroup stats for /syz5: cache:120KB rss:140KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:140KB inactive_file:132KB active_file:0KB unevictable:0KB [ 372.396821][T18054] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.424465][T18054] bridge0: port 1(bridge_slave_0) entered forwarding state [ 372.435768][T18043] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=18043,uid=0 [ 372.436888][T15162] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.451591][T18043] Memory cgroup out of memory: Killed process 18043 (syz-executor.5) total-vm:72448kB, anon-rss:72kB, file-rss:34828kB, shmem-rss:0kB [ 372.472621][T15162] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.473085][ T1044] oom_reaper: reaped process 18043 (syz-executor.5), now anon-rss:0kB, file-rss:33932kB, shmem-rss:0kB [ 372.486983][T18064] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 372.509983][T18064] CPU: 0 PID: 18064 Comm: syz-executor.3 Not tainted 5.2.0-rc2+ #20 [ 372.517979][T18064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.528029][T18064] Call Trace: [ 372.531296][T18064] dump_stack+0x172/0x1f0 [ 372.535608][T18064] dump_header+0x10f/0xb6c [ 372.540000][T18064] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 372.545781][T18064] ? ___ratelimit+0x60/0x595 [ 372.550344][T18064] ? do_raw_spin_unlock+0x57/0x270 [ 372.555442][T18064] oom_kill_process.cold+0x10/0x15 [ 372.560539][T18064] out_of_memory+0x79a/0x1280 [ 372.565207][T18064] ? retint_kernel+0x2b/0x2b [ 372.569785][T18064] ? oom_killer_disable+0x280/0x280 [ 372.574965][T18064] mem_cgroup_out_of_memory+0x1ca/0x230 [ 372.580486][T18064] ? memcg_event_wake+0x230/0x230 [ 372.585486][T18064] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 372.591266][T18064] ? cgroup_file_notify+0x140/0x1b0 [ 372.596451][T18064] memory_max_write+0x169/0x300 [ 372.601288][T18064] ? mem_cgroup_write+0x360/0x360 [ 372.606286][T18064] ? mem_cgroup_write+0x360/0x360 [ 372.611310][T18064] cgroup_file_write+0x241/0x790 [ 372.616248][T18064] ? mem_cgroup_write+0x360/0x360 [ 372.621251][T18064] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 372.626865][T18064] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 372.632476][T18064] kernfs_fop_write+0x2b8/0x480 [ 372.637316][T18064] __vfs_write+0x8a/0x110 [ 372.641619][T18064] ? kernfs_fop_open+0xd80/0xd80 [ 372.646557][T18064] vfs_write+0x20c/0x580 [ 372.650808][T18064] ksys_write+0x14f/0x290 [ 372.655121][T18064] ? __ia32_sys_read+0xb0/0xb0 [ 372.659859][T18064] ? do_syscall_64+0x26/0x680 [ 372.664526][T18064] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 372.670576][T18064] ? do_syscall_64+0x26/0x680 [ 372.675228][T18064] __x64_sys_write+0x73/0xb0 [ 372.679791][T18064] do_syscall_64+0xfd/0x680 [ 372.684283][T18064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 372.690185][T18064] RIP: 0033:0x4592c9 [ 372.694064][T18064] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 372.713655][T18064] RSP: 002b:00007f764e997c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 372.722043][T18064] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 372.729984][T18064] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 372.737929][T18064] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 372.745888][T18064] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f764e9986d4 [ 372.753856][T18064] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 372.765501][T18064] memory: usage 5764kB, limit 0kB, failcnt 33 [ 372.775038][T18064] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 372.784463][T18064] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 372.792379][T18064] Memory cgroup stats for /syz3 [ 372.792449][T18064] : cache:180KB rss:2292KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2216KB inactive_file:132KB active_file:0KB unevictable:0KB [ 372.818870][T18064] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18063,uid=0 [ 372.838426][T18064] Memory cgroup out of memory: Killed process 18063 (syz-executor.3) total-vm:72576kB, anon-rss:2148kB, file-rss:34816kB, shmem-rss:0kB [ 372.875270][ T1044] oom_reaper: reaped process 18063 (syz-executor.3), now anon-rss:0kB, file-rss:34808kB, shmem-rss:0kB 03:04:55 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) 03:04:56 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) [ 373.217241][T18075] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 373.250975][T18075] CPU: 1 PID: 18075 Comm: syz-executor.2 Not tainted 5.2.0-rc2+ #20 [ 373.258972][T18075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.269023][T18075] Call Trace: [ 373.272320][T18075] dump_stack+0x172/0x1f0 [ 373.276654][T18075] dump_header+0x10f/0xb6c [ 373.281076][T18075] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 373.286909][T18075] ? ___ratelimit+0x60/0x595 [ 373.291500][T18075] ? do_raw_spin_unlock+0x57/0x270 [ 373.296628][T18075] oom_kill_process.cold+0x10/0x15 [ 373.301746][T18075] out_of_memory+0x79a/0x1280 [ 373.306436][T18075] ? retint_kernel+0x2b/0x2b [ 373.311069][T18075] ? oom_killer_disable+0x280/0x280 [ 373.316296][T18075] mem_cgroup_out_of_memory+0x1ca/0x230 [ 373.321851][T18075] ? memcg_event_wake+0x230/0x230 [ 373.326892][T18075] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 373.332717][T18075] ? cgroup_file_notify+0x140/0x1b0 [ 373.337944][T18075] memory_max_write+0x169/0x300 [ 373.342805][T18075] ? mem_cgroup_write+0x360/0x360 [ 373.347841][T18075] ? lock_acquire+0x16f/0x3f0 [ 373.352542][T18075] ? kernfs_fop_write+0x227/0x480 [ 373.357590][T18075] cgroup_file_write+0x241/0x790 [ 373.362529][T18075] ? mem_cgroup_write+0x360/0x360 [ 373.367555][T18075] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 373.373200][T18075] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 373.378830][T18075] kernfs_fop_write+0x2b8/0x480 [ 373.383687][T18075] __vfs_write+0x8a/0x110 [ 373.388013][T18075] ? kernfs_fop_open+0xd80/0xd80 [ 373.392962][T18075] vfs_write+0x20c/0x580 [ 373.397229][T18075] ksys_write+0x14f/0x290 [ 373.401612][T18075] ? __ia32_sys_read+0xb0/0xb0 [ 373.406376][T18075] ? do_syscall_64+0x26/0x680 [ 373.411090][T18075] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.417151][T18075] ? do_syscall_64+0x26/0x680 [ 373.421834][T18075] __x64_sys_write+0x73/0xb0 [ 373.426441][T18075] do_syscall_64+0xfd/0x680 [ 373.430951][T18075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.436835][T18075] RIP: 0033:0x4592c9 [ 373.440730][T18075] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 373.460344][T18075] RSP: 002b:00007fc4e3759c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 373.468760][T18075] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 373.476724][T18075] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 373.484800][T18075] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 373.492767][T18075] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc4e375a6d4 [ 373.500740][T18075] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 373.548675][T18075] memory: usage 5844kB, limit 0kB, failcnt 22 [ 373.556688][T18075] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 373.565819][T18075] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 373.576189][T18075] Memory cgroup stats for /syz2: cache:252KB rss:2304KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:132KB 03:04:56 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) [ 373.577617][T18075] writeback:0KB swap:0KB inactive_anon:0KB active_anon:2228KB inactive_file:132KB active_file:0KB unevictable:0KB [ 373.603037][T18075] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=18074,uid=0 [ 373.627260][T18075] Memory cgroup out of memory: Killed process 18074 (syz-executor.2) total-vm:72576kB, anon-rss:2144kB, file-rss:34816kB, shmem-rss:0kB [ 373.654479][T18079] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 373.654997][ T1044] oom_reaper: reaped process 18074 (syz-executor.2), now anon-rss:0kB, file-rss:34812kB, shmem-rss:0kB [ 373.669599][T18079] CPU: 0 PID: 18079 Comm: syz-executor.4 Not tainted 5.2.0-rc2+ #20 [ 373.683907][T18079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.693978][T18079] Call Trace: [ 373.697266][T18079] dump_stack+0x172/0x1f0 [ 373.701634][T18079] dump_header+0x10f/0xb6c [ 373.706081][T18079] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 373.711880][T18079] ? ___ratelimit+0x60/0x595 [ 373.711895][T18079] ? do_raw_spin_unlock+0x57/0x270 [ 373.711913][T18079] oom_kill_process.cold+0x10/0x15 [ 373.711931][T18079] out_of_memory+0x79a/0x1280 [ 373.711948][T18079] ? retint_kernel+0x2b/0x2b [ 373.711966][T18079] ? oom_killer_disable+0x280/0x280 [ 373.711998][T18079] mem_cgroup_out_of_memory+0x1ca/0x230 [ 373.731458][T18079] ? memcg_event_wake+0x230/0x230 [ 373.731480][T18079] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 373.731508][T18079] ? cgroup_file_notify+0x140/0x1b0 [ 373.731529][T18079] memory_max_write+0x169/0x300 [ 373.731584][T18079] ? mem_cgroup_write+0x360/0x360 [ 373.731614][T18079] ? mem_cgroup_write+0x360/0x360 [ 373.731627][T18079] ? cgroup_file_write+0x1e2/0x790 [ 373.731645][T18079] cgroup_file_write+0x241/0x790 [ 373.731668][T18079] ? mem_cgroup_write+0x360/0x360 [ 373.747024][T18079] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 373.763000][T18079] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 373.763015][T18079] kernfs_fop_write+0x2b8/0x480 [ 373.763032][T18079] __vfs_write+0x8a/0x110 [ 373.763049][T18079] ? kernfs_fop_open+0xd80/0xd80 [ 373.772890][T18079] vfs_write+0x20c/0x580 [ 373.772908][T18079] ksys_write+0x14f/0x290 [ 373.772923][T18079] ? __ia32_sys_read+0xb0/0xb0 [ 373.772939][T18079] ? do_syscall_64+0x26/0x680 [ 373.772953][T18079] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.772965][T18079] ? do_syscall_64+0x26/0x680 [ 373.772984][T18079] __x64_sys_write+0x73/0xb0 [ 373.773000][T18079] do_syscall_64+0xfd/0x680 [ 373.773019][T18079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.773029][T18079] RIP: 0033:0x4592c9 [ 373.773042][T18079] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 373.788152][T18079] RSP: 002b:00007f3f9160fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 373.798851][T18079] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 373.813623][T18079] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 373.813631][T18079] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 373.813639][T18079] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3f916106d4 [ 373.813647][T18079] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 373.827687][T18080] IPVS: ftp: loaded support on port[0] = 21 [ 373.857577][T18054] 8021q: adding VLAN 0 to HW filter on device bond0 [ 373.880524][T18079] memory: usage 6072kB, limit 0kB, failcnt 26 [ 373.965006][T18079] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 373.982756][T18079] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 03:04:56 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) [ 373.996104][T18079] Memory cgroup stats for /syz4: cache:44KB rss:2288KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2212KB inactive_file:132KB active_file:132KB unevictable:0KB [ 374.024832][T18079] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=18078,uid=0 [ 374.049695][T18079] Memory cgroup out of memory: Killed process 18078 (syz-executor.4) total-vm:72576kB, anon-rss:2144kB, file-rss:34816kB, shmem-rss:0kB 03:04:56 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) [ 374.133471][ T1044] oom_reaper: reaped process 18078 (syz-executor.4), now anon-rss:0kB, file-rss:33920kB, shmem-rss:0kB [ 374.136055][T15244] syz-executor.2 invoked oom-killer: gfp_mask=0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), order=3, oom_score_adj=0 [ 374.160255][T15244] CPU: 1 PID: 15244 Comm: syz-executor.2 Not tainted 5.2.0-rc2+ #20 [ 374.168238][T15244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.178280][T15244] Call Trace: [ 374.181571][T15244] dump_stack+0x172/0x1f0 [ 374.185896][T15244] dump_header+0x10f/0xb6c [ 374.190307][T15244] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 374.196103][T15244] ? ___ratelimit+0x60/0x595 [ 374.200698][T15244] ? do_raw_spin_unlock+0x57/0x270 [ 374.205823][T15244] oom_kill_process.cold+0x10/0x15 [ 374.210934][T15244] out_of_memory+0x79a/0x1280 [ 374.215639][T15244] ? lock_downgrade+0x880/0x880 [ 374.220502][T15244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 374.226793][T15244] ? oom_killer_disable+0x280/0x280 [ 374.231991][T15244] ? find_held_lock+0x35/0x130 [ 374.236755][T15244] mem_cgroup_out_of_memory+0x1ca/0x230 [ 374.242289][T15244] ? memcg_event_wake+0x230/0x230 [ 374.247328][T15244] ? do_raw_spin_unlock+0x57/0x270 [ 374.252458][T15244] ? _raw_spin_unlock+0x2d/0x50 [ 374.257303][T15244] try_charge+0x102c/0x15c0 [ 374.261793][T15244] ? find_held_lock+0x35/0x130 [ 374.266555][T15244] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 374.272121][T15244] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 374.277679][T15244] ? find_held_lock+0x35/0x130 [ 374.282447][T15244] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 374.287989][T15244] __memcg_kmem_charge_memcg+0x7c/0x130 [ 374.293526][T15244] ? memcg_kmem_put_cache+0xb0/0xb0 [ 374.298723][T15244] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 374.304273][T15244] __memcg_kmem_charge+0x136/0x300 [ 374.309383][T15244] __alloc_pages_nodemask+0x4bd/0x8d0 [ 374.314758][T15244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 374.320991][T15244] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 374.326715][T15244] ? copy_process.part.0+0x43f7/0x6790 [ 374.332172][T15244] ? lockdep_hardirqs_on+0x418/0x5d0 [ 374.337451][T15244] ? trace_hardirqs_on+0x67/0x220 [ 374.342465][T15244] ? kasan_check_read+0x11/0x20 [ 374.347323][T15244] copy_process.part.0+0x4a0/0x6790 [ 374.352526][T15244] ? __might_fault+0x12b/0x1e0 [ 374.357296][T15244] ? __cleanup_sighand+0x60/0x60 [ 374.362226][T15244] ? lock_downgrade+0x880/0x880 [ 374.367082][T15244] _do_fork+0x25d/0xfe0 [ 374.371253][T15244] ? copy_init_mm+0x20/0x20 [ 374.375794][T15244] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 374.381245][T15244] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 374.386716][T15244] ? do_syscall_64+0x26/0x680 [ 374.391386][T15244] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 374.397469][T15244] ? do_syscall_64+0x26/0x680 [ 374.402191][T15244] __x64_sys_clone+0xbf/0x150 [ 374.406860][T15244] do_syscall_64+0xfd/0x680 [ 374.411359][T15244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 374.417246][T15244] RIP: 0033:0x45789a [ 374.421127][T15244] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 374.440713][T15244] RSP: 002b:00007fffa5d16340 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 374.449113][T15244] RAX: ffffffffffffffda RBX: 00007fffa5d16340 RCX: 000000000045789a [ 374.457074][T15244] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 374.465034][T15244] RBP: 00007fffa5d16380 R08: 0000000000000001 R09: 000055555713c940 [ 374.472992][T15244] R10: 000055555713cc10 R11: 0000000000000246 R12: 0000000000000001 [ 374.480950][T15244] R13: 0000000000000000 R14: 0000000000000000 R15: 00007fffa5d163d0 03:04:57 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) [ 374.528305][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 374.539984][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 374.575097][T18054] 8021q: adding VLAN 0 to HW filter on device team0 [ 374.579784][T15244] memory: usage 3500kB, limit 0kB, failcnt 30 [ 374.588703][T15244] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 374.604154][T15244] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 374.613893][T15244] Memory cgroup stats for /syz2: cache:252KB rss:192KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:116KB inactive_file:132KB active_file:0KB unevictable:0KB [ 374.643557][T15244] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=15244,uid=0 [ 374.661223][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 374.667531][T15244] Memory cgroup out of memory: Killed process 15244 (syz-executor.2) total-vm:72444kB, anon-rss:96kB, file-rss:35776kB, shmem-rss:0kB [ 374.669865][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 374.692742][T15248] syz-executor.3 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 374.693220][ T1044] oom_reaper: reaped process 15244 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 374.711632][T15248] CPU: 1 PID: 15248 Comm: syz-executor.3 Not tainted 5.2.0-rc2+ #20 [ 374.722826][T15248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.732974][T15248] Call Trace: [ 374.732992][ T3486] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.736269][T15248] dump_stack+0x172/0x1f0 [ 374.743340][ T3486] bridge0: port 1(bridge_slave_0) entered forwarding state [ 374.747601][T15248] dump_header+0x10f/0xb6c [ 374.759216][T15248] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 374.765051][T15248] ? ___ratelimit+0x60/0x595 [ 374.769666][T15248] ? do_raw_spin_unlock+0x57/0x270 [ 374.774792][T15248] oom_kill_process.cold+0x10/0x15 [ 374.779911][T15248] out_of_memory+0x79a/0x1280 [ 374.784603][T15248] ? oom_killer_disable+0x280/0x280 [ 374.789801][T15248] ? find_held_lock+0x35/0x130 [ 374.792531][T18054] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 374.794578][T15248] mem_cgroup_out_of_memory+0x1ca/0x230 [ 374.804897][T18054] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 374.810400][T15248] ? memcg_event_wake+0x230/0x230 [ 374.810419][T15248] ? do_raw_spin_unlock+0x57/0x270 [ 374.810434][T15248] ? _raw_spin_unlock+0x2d/0x50 [ 374.810452][T15248] try_charge+0x102c/0x15c0 [ 374.836237][T18054] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 374.840188][T15248] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 374.840209][T15248] ? rcu_read_lock_sched_held+0x110/0x130 [ 374.852482][T15248] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 374.852514][T15248] __memcg_kmem_charge_memcg+0x7c/0x130 [ 374.852526][T15248] ? memcg_kmem_put_cache+0xb0/0xb0 [ 374.852543][T15248] ? cache_grow_begin+0x3d6/0x650 [ 374.863799][T15248] ? lockdep_hardirqs_on+0x418/0x5d0 [ 374.874517][T15248] ? trace_hardirqs_on+0x67/0x220 [ 374.874533][T15248] cache_grow_begin+0x402/0x650 [ 374.874547][T15248] ? __cpuset_node_allowed+0x136/0x540 [ 374.874569][T15248] fallback_alloc+0x1fd/0x2d0 [ 374.884895][T15248] ____cache_alloc_node+0x1be/0x1e0 [ 374.884909][T15248] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 374.884925][T15248] kmem_cache_alloc_node+0xe3/0x710 [ 374.900196][T15248] ? lockdep_hardirqs_on+0x418/0x5d0 [ 374.900211][T15248] ? trace_hardirqs_on+0x67/0x220 [ 374.900231][T15248] copy_process.part.0+0x43f7/0x6790 [ 374.900272][T15248] ? __might_fault+0x12b/0x1e0 [ 374.910121][T15248] ? __cleanup_sighand+0x60/0x60 [ 374.910134][T15248] ? lock_downgrade+0x880/0x880 [ 374.910167][T15248] _do_fork+0x25d/0xfe0 [ 374.921565][T15248] ? copy_init_mm+0x20/0x20 [ 374.921588][T15248] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 374.921605][T15248] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 374.931919][T15248] ? do_syscall_64+0x26/0x680 [ 374.931935][T15248] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 374.931948][T15248] ? do_syscall_64+0x26/0x680 [ 374.931969][T15248] __x64_sys_clone+0xbf/0x150 [ 374.941993][T15248] do_syscall_64+0xfd/0x680 [ 374.942012][T15248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 374.942030][T15248] RIP: 0033:0x45789a [ 374.951787][T15248] Code: f7 d8 64 89 04 25 d4 02 00 00 64 4c 8b 0c 25 10 00 00 00 31 d2 4d 8d 91 d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 f5 00 00 00 85 c0 41 89 c5 0f 85 fc 00 00 [ 374.951794][T15248] RSP: 002b:00007ffea19911b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 374.951807][T15248] RAX: ffffffffffffffda RBX: 00007ffea19911b0 RCX: 000000000045789a [ 374.951820][T15248] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 374.960433][T15248] RBP: 00007ffea19911f0 R08: 0000000000000001 R09: 000055555661d940 [ 374.960441][T15248] R10: 000055555661dc10 R11: 0000000000000246 R12: 0000000000000001 [ 374.960448][T15248] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffea1991240 [ 374.971121][T15248] memory: usage 3412kB, limit 0kB, failcnt 45 [ 375.000121][T15248] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 375.028049][T15248] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 375.051036][T15248] Memory cgroup stats for /syz3: cache:180KB rss:76KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:76KB inactive_file:132KB active_file:0KB unevictable:0KB [ 375.067076][T15248] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=15248,uid=0 [ 375.084261][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 375.088739][T15248] Memory cgroup out of memory: Killed process 15248 (syz-executor.3) total-vm:72444kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB [ 375.097002][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 375.116841][T15245] syz-executor.4 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 375.132691][ T1044] oom_reaper: reaped process 15248 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 375.140539][T15245] CPU: 1 PID: 15245 Comm: syz-executor.4 Not tainted 5.2.0-rc2+ #20 [ 375.162043][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 375.172724][T15245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.172730][T15245] Call Trace: [ 375.172752][T15245] dump_stack+0x172/0x1f0 [ 375.172774][T15245] dump_header+0x10f/0xb6c [ 375.172796][T15245] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 375.183843][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 375.191768][T15245] ? ___ratelimit+0x60/0x595 [ 375.191785][T15245] ? do_raw_spin_unlock+0x57/0x270 [ 375.191805][T15245] oom_kill_process.cold+0x10/0x15 [ 375.201941][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 375.208871][T15245] out_of_memory+0x79a/0x1280 [ 375.213063][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 375.216475][T15245] ? oom_killer_disable+0x280/0x280 [ 375.222121][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 375.226691][T15245] ? find_held_lock+0x35/0x130 [ 375.226719][T15245] mem_cgroup_out_of_memory+0x1ca/0x230 [ 375.235098][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 375.238477][T15245] ? memcg_event_wake+0x230/0x230 [ 375.244628][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 375.248691][T15245] ? do_raw_spin_unlock+0x57/0x270 [ 375.257715][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 375.261228][T15245] ? _raw_spin_unlock+0x2d/0x50 [ 375.261249][T15245] try_charge+0x102c/0x15c0 [ 375.261281][T15245] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 375.270014][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 375.274359][T15245] ? rcu_read_lock_sched_held+0x110/0x130 [ 375.274375][T15245] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 375.274396][T15245] __memcg_kmem_charge_memcg+0x7c/0x130 [ 375.284585][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 375.287024][T15245] ? memcg_kmem_put_cache+0xb0/0xb0 [ 375.293757][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 375.300341][T15245] ? cache_grow_begin+0x3d6/0x650 [ 375.300359][T15245] ? lockdep_hardirqs_on+0x418/0x5d0 [ 375.300375][T15245] ? trace_hardirqs_on+0x67/0x220 [ 375.300396][T15245] cache_grow_begin+0x402/0x650 [ 375.307125][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 375.313301][T15245] ? __cpuset_node_allowed+0x136/0x540 [ 375.313319][T15245] fallback_alloc+0x1fd/0x2d0 [ 375.313340][T15245] ____cache_alloc_node+0x1be/0x1e0 [ 375.313361][T15245] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 375.435390][T15245] kmem_cache_alloc+0x1e8/0x6f0 [ 375.440284][T15245] ? inet6_create+0x2ea/0xf80 [ 375.444971][T15245] sk_prot_alloc+0x67/0x2e0 [ 375.449498][T15245] ? lock_downgrade+0x880/0x880 [ 375.454364][T15245] sk_alloc+0x39/0xf70 [ 375.458447][T15245] inet6_create+0x360/0xf80 [ 375.462932][T15245] __sock_create+0x3d8/0x730 [ 375.467500][T15245] ? _raw_spin_unlock_irq+0x28/0x90 [ 375.472677][T15245] __sys_socket+0x103/0x220 [ 375.477157][T15245] ? move_addr_to_kernel+0x80/0x80 [ 375.482253][T15245] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 375.487684][T15245] ? do_syscall_64+0x26/0x680 [ 375.492347][T15245] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 375.498384][T15245] ? do_syscall_64+0x26/0x680 [ 375.503055][T15245] __x64_sys_socket+0x73/0xb0 [ 375.507704][T15245] do_syscall_64+0xfd/0x680 [ 375.512208][T15245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 375.518088][T15245] RIP: 0033:0x45be17 [ 375.521958][T15245] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 375.541544][T15245] RSP: 002b:00007fff696fd438 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 375.549967][T15245] RAX: ffffffffffffffda RBX: 000000000070fb00 RCX: 000000000045be17 [ 375.557914][T15245] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 000000000000000a [ 375.565859][T15245] RBP: 0000000000000131 R08: 0000000000006000 R09: 0000000000004000 [ 375.573805][T15245] R10: 00007fff696fd560 R11: 0000000000000246 R12: 0000000000000000 [ 375.581769][T15245] R13: 00007fff696fdc00 R14: 0000000000000029 R15: 00007fff696fdc10 [ 375.592231][T15245] memory: usage 3712kB, limit 0kB, failcnt 38 [ 375.598314][T15245] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 375.605895][T15245] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 375.612799][T15245] Memory cgroup stats for /syz4: cache:44KB rss:68KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:68KB inactive_file:132KB active_file:132KB unevictable:0KB [ 375.633607][T15245] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=15245,uid=0 [ 375.649013][T15245] Memory cgroup out of memory: Killed process 15245 (syz-executor.4) total-vm:72444kB, anon-rss:96kB, file-rss:35776kB, shmem-rss:0kB [ 375.663521][ T1044] oom_reaper: reaped process 15245 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 375.841958][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 375.849816][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 376.230446][T18087] IPVS: ftp: loaded support on port[0] = 21 [ 376.436935][T18092] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 376.447460][T18092] CPU: 0 PID: 18092 Comm: syz-executor.1 Not tainted 5.2.0-rc2+ #20 [ 376.455452][T18092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.465502][T18092] Call Trace: [ 376.468771][T18092] dump_stack+0x172/0x1f0 [ 376.473097][T18092] dump_header+0x10f/0xb6c [ 376.477503][T18092] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 376.483293][T18092] ? ___ratelimit+0x60/0x595 [ 376.487886][T18092] ? do_raw_spin_unlock+0x57/0x270 [ 376.493004][T18092] oom_kill_process.cold+0x10/0x15 [ 376.498102][T18092] out_of_memory+0x79a/0x1280 [ 376.502802][T18092] ? oom_killer_disable+0x280/0x280 [ 376.507998][T18092] mem_cgroup_out_of_memory+0x1ca/0x230 [ 376.513529][T18092] ? memcg_event_wake+0x230/0x230 [ 376.518551][T18092] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 376.524359][T18092] ? cgroup_file_notify+0x140/0x1b0 [ 376.529687][T18092] memory_max_write+0x169/0x300 [ 376.534541][T18092] ? mem_cgroup_write+0x360/0x360 [ 376.539571][T18092] ? cgroup_file_write+0x86/0x790 [ 376.544601][T18092] cgroup_file_write+0x241/0x790 [ 376.549538][T18092] ? mem_cgroup_write+0x360/0x360 [ 376.554595][T18092] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 376.560229][T18092] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 376.565834][T18092] kernfs_fop_write+0x2b8/0x480 [ 376.570681][T18092] __vfs_write+0x8a/0x110 [ 376.575000][T18092] ? kernfs_fop_open+0xd80/0xd80 [ 376.579960][T18092] vfs_write+0x20c/0x580 [ 376.584182][T18092] ksys_write+0x14f/0x290 [ 376.588488][T18092] ? __ia32_sys_read+0xb0/0xb0 [ 376.593248][T18092] __x64_sys_write+0x73/0xb0 [ 376.597825][T18092] ? do_syscall_64+0x5b/0x680 [ 376.602479][T18092] do_syscall_64+0xfd/0x680 [ 376.606962][T18092] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.612835][T18092] RIP: 0033:0x4592c9 [ 376.616727][T18092] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 376.636342][T18092] RSP: 002b:00007f3f1bbb4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 376.644771][T18092] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 376.652776][T18092] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 376.660755][T18092] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 376.668707][T18092] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3f1bbb56d4 [ 376.676700][T18092] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 376.702573][T18092] memory: usage 5532kB, limit 0kB, failcnt 53 [ 376.708871][T18092] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 376.720631][T18092] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 376.727539][T18092] Memory cgroup stats for /syz1 [ 376.727634][T18092] : cache:288KB rss:2144KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2144KB inactive_file:0KB active_file:0KB unevictable:0KB [ 376.752422][T18092] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18091,uid=0 [ 376.769248][T18092] Memory cgroup out of memory: Killed process 18091 (syz-executor.1) total-vm:72580kB, anon-rss:2188kB, file-rss:35776kB, shmem-rss:0kB 03:04:59 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) 03:04:59 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) 03:04:59 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) [ 376.811308][ T1044] oom_reaper: reaped process 18091 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 376.833553][T18054] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 376.845055][T18054] CPU: 1 PID: 18054 Comm: syz-executor.1 Not tainted 5.2.0-rc2+ #20 [ 376.853044][T18054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.863095][T18054] Call Trace: [ 376.866386][T18054] dump_stack+0x172/0x1f0 [ 376.870737][T18054] dump_header+0x10f/0xb6c [ 376.875177][T18054] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 376.880991][T18054] ? ___ratelimit+0x60/0x595 [ 376.885582][T18054] ? do_raw_spin_unlock+0x57/0x270 [ 376.890699][T18054] oom_kill_process.cold+0x10/0x15 [ 376.895827][T18054] out_of_memory+0x79a/0x1280 [ 376.900510][T18054] ? lock_downgrade+0x880/0x880 [ 376.905358][T18054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 376.911595][T18054] ? oom_killer_disable+0x280/0x280 [ 376.916790][T18054] ? find_held_lock+0x35/0x130 [ 376.921561][T18054] mem_cgroup_out_of_memory+0x1ca/0x230 [ 376.927096][T18054] ? memcg_event_wake+0x230/0x230 [ 376.932103][T18054] ? do_raw_spin_unlock+0x57/0x270 [ 376.937191][T18054] ? _raw_spin_unlock+0x2d/0x50 [ 376.942049][T18054] try_charge+0x102c/0x15c0 [ 376.946524][T18054] ? find_held_lock+0x35/0x130 [ 376.951278][T18054] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 376.956868][T18054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 376.963103][T18054] ? kasan_check_read+0x11/0x20 [ 376.967964][T18054] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 376.973488][T18054] mem_cgroup_try_charge+0x24d/0x5e0 [ 376.978751][T18054] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 376.984364][T18054] wp_page_copy+0x416/0x1770 [ 376.988934][T18054] ? do_wp_page+0x486/0x1500 [ 376.993509][T18054] ? pmd_pfn+0x1d0/0x1d0 [ 376.997734][T18054] ? lock_downgrade+0x880/0x880 [ 377.002564][T18054] ? swp_swapcount+0x540/0x540 [ 377.007306][T18054] ? kasan_check_read+0x11/0x20 [ 377.012144][T18054] ? do_raw_spin_unlock+0x57/0x270 [ 377.017238][T18054] do_wp_page+0x48e/0x1500 [ 377.021652][T18054] ? finish_mkwrite_fault+0x540/0x540 [ 377.027008][T18054] __handle_mm_fault+0x22e3/0x3eb0 [ 377.032098][T18054] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 377.037621][T18054] ? find_held_lock+0x35/0x130 [ 377.042375][T18054] ? handle_mm_fault+0x292/0xa90 [ 377.047317][T18054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 377.053540][T18054] ? kasan_check_read+0x11/0x20 [ 377.058365][T18054] handle_mm_fault+0x3b7/0xa90 [ 377.063105][T18054] __do_page_fault+0x5ef/0xda0 [ 377.067885][T18054] do_page_fault+0x71/0x57d [ 377.072393][T18054] ? page_fault+0x8/0x30 [ 377.076611][T18054] page_fault+0x1e/0x30 [ 377.080758][T18054] RIP: 0033:0x403672 [ 377.084651][T18054] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 79 86 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 99 3b 05 00 48 [ 377.104319][T18054] RSP: 002b:00007ffe0ef73c50 EFLAGS: 00010246 [ 377.110366][T18054] RAX: 0000000000000000 RBX: 000000000005be0d RCX: 0000000000412ed0 [ 377.118313][T18054] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffe0ef74d80 [ 377.126259][T18054] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555557340940 [ 377.134317][T18054] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe0ef74d80 [ 377.142278][T18054] R13: 00007ffe0ef74d70 R14: 0000000000000000 R15: 00007ffe0ef74d80 [ 377.157285][T18054] memory: usage 3204kB, limit 0kB, failcnt 61 [ 377.166631][T18054] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 377.175045][T18054] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 377.182013][T18054] Memory cgroup stats for /syz1: cache:288KB rss:48KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:48KB inactive_file:0KB active_file:0KB unevictable:0KB [ 377.202790][T18054] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18054,uid=0 [ 377.218166][T18054] Memory cgroup out of memory: Killed process 18054 (syz-executor.1) total-vm:72448kB, anon-rss:76kB, file-rss:34828kB, shmem-rss:0kB [ 377.232564][ T1044] oom_reaper: reaped process 18054 (syz-executor.1), now anon-rss:0kB, file-rss:33932kB, shmem-rss:0kB [ 377.584541][T18080] chnl_net:caif_netlink_parms(): no params data found [ 377.689354][T18087] chnl_net:caif_netlink_parms(): no params data found [ 377.804993][T18087] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.812877][T18087] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.820703][T18087] device bridge_slave_0 entered promiscuous mode [ 377.827852][T18080] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.835460][T18080] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.844122][T18080] device bridge_slave_0 entered promiscuous mode [ 377.852540][T18080] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.859665][T18080] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.867759][T18080] device bridge_slave_1 entered promiscuous mode [ 377.875075][T18087] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.882560][T18087] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.891180][T18087] device bridge_slave_1 entered promiscuous mode [ 378.000760][T18080] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 378.009526][ T8485] device bridge_slave_1 left promiscuous mode [ 378.030217][ T8485] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.081335][ T8485] device bridge_slave_0 left promiscuous mode [ 378.087553][ T8485] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.662757][ T8485] device hsr_slave_1 left promiscuous mode [ 379.712948][ T8485] device hsr_slave_0 left promiscuous mode [ 379.755266][ T8485] team0 (unregistering): Port device team_slave_1 removed [ 379.767238][ T8485] team0 (unregistering): Port device team_slave_0 removed [ 379.781114][ T8485] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 379.818559][ T8485] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 379.918675][ T8485] bond0 (unregistering): Released all slaves [ 380.056100][T18080] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 380.071784][T18097] IPVS: ftp: loaded support on port[0] = 21 [ 380.075454][T18098] IPVS: ftp: loaded support on port[0] = 21 [ 380.093851][T18087] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 380.115584][T18087] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 380.130451][T18080] team0: Port device team_slave_0 added [ 380.153719][T18080] team0: Port device team_slave_1 added [ 380.161136][T18087] team0: Port device team_slave_0 added [ 380.171297][T18087] team0: Port device team_slave_1 added [ 380.273170][T18087] device hsr_slave_0 entered promiscuous mode [ 380.310398][T18087] device hsr_slave_1 entered promiscuous mode [ 380.421965][T18080] device hsr_slave_0 entered promiscuous mode [ 380.460628][T18080] device hsr_slave_1 entered promiscuous mode [ 380.665666][T18097] chnl_net:caif_netlink_parms(): no params data found [ 380.803622][T18098] chnl_net:caif_netlink_parms(): no params data found [ 380.828768][T18097] bridge0: port 1(bridge_slave_0) entered blocking state [ 380.836061][T18097] bridge0: port 1(bridge_slave_0) entered disabled state [ 380.849712][T18097] device bridge_slave_0 entered promiscuous mode [ 380.871059][T18087] 8021q: adding VLAN 0 to HW filter on device bond0 [ 380.888836][T18080] 8021q: adding VLAN 0 to HW filter on device bond0 [ 380.902790][T18097] bridge0: port 2(bridge_slave_1) entered blocking state [ 380.909857][T18097] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.928896][T18097] device bridge_slave_1 entered promiscuous mode [ 380.958266][T18087] 8021q: adding VLAN 0 to HW filter on device team0 [ 380.987866][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 381.012931][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 381.021268][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 381.029063][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 381.036879][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 381.054697][T18097] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 381.072302][T18080] 8021q: adding VLAN 0 to HW filter on device team0 [ 381.097413][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 381.116827][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 381.129094][T15162] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.136257][T15162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 381.145913][T18097] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 381.170370][T18098] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.177425][T18098] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.186467][T18098] device bridge_slave_0 entered promiscuous mode [ 381.206536][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 381.224195][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 381.233202][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 381.245527][ T3001] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.252635][ T3001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 381.271026][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 381.279709][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 381.306364][T18097] team0: Port device team_slave_0 added [ 381.323697][T18098] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.337143][T18098] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.357833][T18098] device bridge_slave_1 entered promiscuous mode [ 381.392340][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 381.411122][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 381.434500][T18097] team0: Port device team_slave_1 added [ 381.472843][T18098] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 381.493431][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 381.509913][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 381.528786][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 381.539254][ T8454] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.546437][ T8454] bridge0: port 1(bridge_slave_0) entered forwarding state [ 381.564603][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 381.578234][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 381.597100][ T8454] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.604256][ T8454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 381.622759][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 381.639017][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 381.658302][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 381.669699][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 381.687873][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 381.698332][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 381.716701][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 381.729335][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 381.772593][T18098] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 381.791376][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 381.800036][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 381.819435][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 381.893269][T18097] device hsr_slave_0 entered promiscuous mode [ 381.930388][T18097] device hsr_slave_1 entered promiscuous mode [ 381.993850][T18087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 382.002593][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 382.010924][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 382.019504][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 382.035120][T18098] team0: Port device team_slave_0 added [ 382.048533][T18080] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 382.059210][T18080] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 382.102414][T15502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 382.120762][T15502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 382.129287][T15502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 382.138006][T15502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 382.146619][T15502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 382.155599][T18098] team0: Port device team_slave_1 added [ 382.209345][T18087] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 382.221343][T18080] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 382.261805][T18098] device hsr_slave_0 entered promiscuous mode [ 382.300625][T18098] device hsr_slave_1 entered promiscuous mode [ 382.523798][T18097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 382.587340][T15272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 382.598773][T15272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 382.658134][T18097] 8021q: adding VLAN 0 to HW filter on device team0 [ 382.688972][T18111] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 382.711439][T18098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 382.726448][T18111] CPU: 0 PID: 18111 Comm: syz-executor.5 Not tainted 5.2.0-rc2+ #20 [ 382.734441][T18111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.734943][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 382.744500][T18111] Call Trace: [ 382.744524][T18111] dump_stack+0x172/0x1f0 [ 382.744547][T18111] dump_header+0x10f/0xb6c [ 382.744572][T18111] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 382.753959][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 382.755902][T18111] ? ___ratelimit+0x60/0x595 [ 382.755919][T18111] ? do_raw_spin_unlock+0x57/0x270 [ 382.755941][T18111] oom_kill_process.cold+0x10/0x15 [ 382.761301][T15162] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.764674][T18111] out_of_memory+0x79a/0x1280 [ 382.764699][T18111] ? __sched_text_start+0x8/0x8 [ 382.770555][T15162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 382.778464][T18111] ? oom_killer_disable+0x280/0x280 [ 382.783882][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 382.788145][T18111] ? cgroup_file_notify+0x140/0x1b0 [ 382.788186][T18111] mem_cgroup_out_of_memory+0x1ca/0x230 [ 382.788206][T18111] ? memcg_event_wake+0x230/0x230 [ 382.794038][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 382.800349][T18111] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 382.800367][T18111] ? cgroup_file_notify+0x140/0x1b0 [ 382.800389][T18111] memory_max_write+0x169/0x300 [ 382.800411][T18111] ? mem_cgroup_write+0x360/0x360 [ 382.805931][T15162] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.809915][T18111] ? lock_acquire+0x16f/0x3f0 [ 382.809932][T18111] ? kernfs_fop_write+0x227/0x480 [ 382.809952][T18111] cgroup_file_write+0x241/0x790 [ 382.817208][T15162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 382.822330][T18111] ? mem_cgroup_write+0x360/0x360 [ 382.822346][T18111] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 382.822370][T18111] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 382.831388][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 382.835604][T18111] kernfs_fop_write+0x2b8/0x480 [ 382.835625][T18111] __vfs_write+0x8a/0x110 [ 382.835645][T18111] ? kernfs_fop_open+0xd80/0xd80 [ 382.842137][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 382.846186][T18111] vfs_write+0x20c/0x580 [ 382.846207][T18111] ksys_write+0x14f/0x290 [ 382.846227][T18111] ? __ia32_sys_read+0xb0/0xb0 [ 382.871691][T18098] 8021q: adding VLAN 0 to HW filter on device team0 [ 382.875028][T18111] ? do_syscall_64+0x26/0x680 [ 382.875044][T18111] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.875066][T18111] ? do_syscall_64+0x26/0x680 [ 382.889956][T18097] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 382.891767][T18111] __x64_sys_write+0x73/0xb0 [ 382.891785][T18111] do_syscall_64+0xfd/0x680 [ 382.891816][T18111] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.891834][T18111] RIP: 0033:0x4592c9 [ 382.899508][T18097] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 382.903976][T18111] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 382.903985][T18111] RSP: 002b:00007fc006d2fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 382.903998][T18111] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 382.904006][T18111] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 382.904014][T18111] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 382.904021][T18111] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc006d306d4 [ 382.904036][T18111] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 382.911914][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 382.946455][T18111] memory: usage 5472kB, limit 0kB, failcnt 55 [ 383.024704][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 383.030274][T18111] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 383.068502][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 383.125757][T18111] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 383.130630][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 383.136972][T18111] Memory cgroup stats for /syz5: cache:120KB rss:2184KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2184KB inactive_file:132KB active_file:0KB unevictable:0KB [ 383.153960][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 383.183704][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 383.187177][T18111] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=18109,uid=0 [ 383.191587][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 383.215328][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 383.217749][T18111] Memory cgroup out of memory: Killed process 18109 (syz-executor.5) total-vm:72580kB, anon-rss:2144kB, file-rss:34816kB, shmem-rss:0kB [ 383.224596][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 383.247012][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 383.261382][T18114] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 383.273527][ T1044] oom_reaper: reaped process 18109 (syz-executor.5), now anon-rss:0kB, file-rss:34876kB, shmem-rss:0kB [ 383.274880][T18114] CPU: 0 PID: 18114 Comm: syz-executor.0 Not tainted 5.2.0-rc2+ #20 [ 383.285245][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 383.292519][T18114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.292525][T18114] Call Trace: [ 383.292546][T18114] dump_stack+0x172/0x1f0 [ 383.292569][T18114] dump_header+0x10f/0xb6c [ 383.292592][T18114] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 383.328181][T18114] ? ___ratelimit+0x60/0x595 [ 383.331643][T18098] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 383.332789][T18114] ? do_raw_spin_unlock+0x57/0x270 [ 383.343117][T18098] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 383.348209][T18114] oom_kill_process.cold+0x10/0x15 [ 383.363623][T18114] out_of_memory+0x79a/0x1280 [ 383.368330][T18114] ? oom_killer_disable+0x280/0x280 [ 383.373550][T18114] mem_cgroup_out_of_memory+0x1ca/0x230 [ 383.374984][T18098] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 383.379119][T18114] ? memcg_event_wake+0x230/0x230 [ 383.390882][T18114] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 383.390900][T18114] ? cgroup_file_notify+0x140/0x1b0 [ 383.390923][T18114] memory_max_write+0x169/0x300 [ 383.406756][T18114] ? mem_cgroup_write+0x360/0x360 [ 383.411796][T18114] ? lock_acquire+0x1ea/0x3f0 [ 383.416488][T18114] ? kernfs_get_active+0xc2/0x240 [ 383.421534][T18114] cgroup_file_write+0x241/0x790 [ 383.426491][T18114] ? mem_cgroup_write+0x360/0x360 [ 383.431536][T18114] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 383.437178][T18114] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 383.442831][T18114] kernfs_fop_write+0x2b8/0x480 [ 383.447696][T18114] __vfs_write+0x8a/0x110 [ 383.452025][T18114] ? kernfs_fop_open+0xd80/0xd80 [ 383.452042][T18114] vfs_write+0x20c/0x580 [ 383.452062][T18114] ksys_write+0x14f/0x290 [ 383.461246][T18114] ? __ia32_sys_read+0xb0/0xb0 [ 383.461274][T18114] ? do_syscall_64+0x26/0x680 [ 383.461288][T18114] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.461300][T18114] ? do_syscall_64+0x26/0x680 [ 383.461317][T18114] __x64_sys_write+0x73/0xb0 [ 383.490383][T18114] do_syscall_64+0xfd/0x680 [ 383.494892][T18114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.500796][T18114] RIP: 0033:0x4592c9 [ 383.504721][T18114] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 383.524357][T18114] RSP: 002b:00007f0707982c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 383.532786][T18114] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 383.540750][T18114] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 383.548714][T18114] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 383.556688][T18114] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f07079836d4 [ 383.564660][T18114] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 383.615221][T18114] memory: usage 5648kB, limit 0kB, failcnt 55 [ 383.615646][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 383.652813][T18114] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 383.681104][T18114] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 383.714292][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 383.715697][T18114] Memory cgroup stats for /syz0: cache:12KB rss:2256KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2188KB inactive_file:0KB active_file:0KB unevictable:0KB [ 383.759324][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 383.768634][T18114] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=18113,uid=0 [ 383.787826][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 383.797133][T15162] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.800249][T18114] Memory cgroup out of memory: Killed process 18114 (syz-executor.0) total-vm:72580kB, anon-rss:2184kB, file-rss:35788kB, shmem-rss:0kB [ 383.804267][T15162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 383.826262][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 383.832475][T18121] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 383.835622][ T1044] oom_reaper: reaped process 18114 (syz-executor.0), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 383.855300][T18121] CPU: 0 PID: 18121 Comm: syz-executor.3 Not tainted 5.2.0-rc2+ #20 [ 383.857117][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 383.863651][T18121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.863657][T18121] Call Trace: [ 383.863685][T18121] dump_stack+0x172/0x1f0 [ 383.863722][T18121] dump_header+0x10f/0xb6c [ 383.863746][T18121] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 383.872246][T15162] bridge0: port 2(bridge_slave_1) entered blocking state [ 383.881756][T18121] ? ___ratelimit+0x60/0x595 [ 383.881773][T18121] ? do_raw_spin_unlock+0x57/0x270 [ 383.881793][T18121] oom_kill_process.cold+0x10/0x15 [ 383.881813][T18121] out_of_memory+0x79a/0x1280 [ 383.885103][T15162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 383.889426][T18121] ? oom_killer_disable+0x280/0x280 [ 383.894300][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 383.899627][T18121] mem_cgroup_out_of_memory+0x1ca/0x230 [ 383.899651][T18121] ? memcg_event_wake+0x230/0x230 [ 383.907556][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 383.911270][T18121] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 383.911289][T18121] ? cgroup_file_notify+0x140/0x1b0 [ 383.911319][T18121] memory_max_write+0x169/0x300 [ 383.917491][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 383.921545][T18121] ? mem_cgroup_write+0x360/0x360 [ 383.921565][T18121] ? cgroup_file_write+0x86/0x790 [ 383.921584][T18121] cgroup_file_write+0x241/0x790 [ 383.921606][T18121] ? mem_cgroup_write+0x360/0x360 [ 383.928028][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 383.933509][T18121] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 383.933531][T18121] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 383.933546][T18121] kernfs_fop_write+0x2b8/0x480 [ 383.933564][T18121] __vfs_write+0x8a/0x110 [ 383.939439][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 383.946642][T18121] ? kernfs_fop_open+0xd80/0xd80 [ 383.946659][T18121] vfs_write+0x20c/0x580 [ 383.946692][T18121] ksys_write+0x14f/0x290 [ 383.953022][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 383.957229][T18121] ? __ia32_sys_read+0xb0/0xb0 [ 383.957259][T18121] __x64_sys_write+0x73/0xb0 [ 383.965891][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 383.970942][T18121] ? do_syscall_64+0x5b/0x680 [ 383.970970][T18121] do_syscall_64+0xfd/0x680 [ 383.970988][T18121] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.971015][T18121] RIP: 0033:0x4592c9 [ 383.976883][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 383.981145][T18121] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:05:06 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) 03:05:06 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) 03:05:06 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) [ 383.981152][T18121] RSP: 002b:00007fc898e2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 383.981165][T18121] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 383.981171][T18121] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 383.981189][T18121] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 383.981197][T18121] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc898e2b6d4 [ 383.981223][T18121] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 383.990109][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 03:05:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002900)='./cgroup.cpu/syz1\x00', 0x1ff) [ 384.213302][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 384.219165][T18121] memory: usage 5616kB, limit 0kB, failcnt 50 [ 384.221220][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 384.235125][T18121] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 384.254122][T18121] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 384.277136][T18121] Memory cgroup stats for /syz3: cache:180KB rss:2128KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB [ 384.277564][T18097] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 384.277589][T18121] active_anon:2128KB inactive_file:132KB active_file:0KB unevictable:0KB [ 384.299592][T18121] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18120,uid=0 [ 384.394626][T18121] Memory cgroup out of memory: Killed process 18120 (syz-executor.3) total-vm:72580kB, anon-rss:2184kB, file-rss:35780kB, shmem-rss:0kB [ 384.456911][ T1044] oom_reaper: reaped process 18120 (syz-executor.3), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 384.468587][T18080] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 384.483500][T18080] CPU: 1 PID: 18080 Comm: syz-executor.0 Not tainted 5.2.0-rc2+ #20 [ 384.491483][T18080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.501525][T18080] Call Trace: [ 384.504809][T18080] dump_stack+0x172/0x1f0 [ 384.509180][T18080] dump_header+0x10f/0xb6c [ 384.513593][T18080] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 384.519392][T18080] ? ___ratelimit+0x60/0x595 [ 384.524012][T18080] ? do_raw_spin_unlock+0x57/0x270 [ 384.529126][T18080] oom_kill_process.cold+0x10/0x15 [ 384.534269][T18080] out_of_memory+0x79a/0x1280 [ 384.538961][T18080] ? oom_killer_disable+0x280/0x280 [ 384.544164][T18080] ? find_held_lock+0x35/0x130 [ 384.548949][T18080] mem_cgroup_out_of_memory+0x1ca/0x230 [ 384.554488][T18080] ? memcg_event_wake+0x230/0x230 [ 384.559539][T18080] ? do_raw_spin_unlock+0x57/0x270 [ 384.564662][T18080] ? _raw_spin_unlock+0x2d/0x50 [ 384.569523][T18080] try_charge+0x102c/0x15c0 [ 384.574026][T18080] ? find_held_lock+0x35/0x130 [ 384.578796][T18080] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 384.584346][T18080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.590586][T18080] ? kasan_check_read+0x11/0x20 [ 384.595438][T18080] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 384.600982][T18080] mem_cgroup_try_charge+0x24d/0x5e0 [ 384.606269][T18080] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 384.611901][T18080] wp_page_copy+0x416/0x1770 [ 384.616493][T18080] ? do_wp_page+0x486/0x1500 [ 384.621113][T18080] ? pmd_pfn+0x1d0/0x1d0 [ 384.625354][T18080] ? lock_downgrade+0x880/0x880 [ 384.630203][T18080] ? swp_swapcount+0x540/0x540 [ 384.634959][T18080] ? do_raw_spin_unlock+0x57/0x270 [ 384.640063][T18080] ? kasan_check_read+0x11/0x20 [ 384.644911][T18080] ? do_raw_spin_unlock+0x57/0x270 [ 384.650021][T18080] do_wp_page+0x48e/0x1500 [ 384.654444][T18080] ? finish_mkwrite_fault+0x540/0x540 [ 384.659851][T18080] __handle_mm_fault+0x22e3/0x3eb0 [ 384.664970][T18080] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 384.670510][T18080] ? find_held_lock+0x35/0x130 [ 384.675271][T18080] ? handle_mm_fault+0x292/0xa90 [ 384.680216][T18080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.686467][T18080] ? kasan_check_read+0x11/0x20 [ 384.691319][T18080] handle_mm_fault+0x3b7/0xa90 [ 384.696091][T18080] __do_page_fault+0x5ef/0xda0 [ 384.700865][T18080] do_page_fault+0x71/0x57d [ 384.705400][T18080] ? page_fault+0x8/0x30 [ 384.709644][T18080] page_fault+0x1e/0x30 [ 384.713795][T18080] RIP: 0033:0x4303a6 [ 384.717694][T18080] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 384.737287][T18080] RSP: 002b:00007fff9ac00560 EFLAGS: 00010206 [ 384.743360][T18080] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 384.751331][T18080] RDX: 00005555558f4930 RSI: 00005555558fc970 RDI: 0000000000000003 [ 384.759309][T18080] RBP: 0000000000008041 R08: 0000000000000001 R09: 00005555558f3940 [ 384.767284][T18080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 384.775244][T18080] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 384.787660][T18080] memory: usage 3276kB, limit 0kB, failcnt 63 [ 384.793798][T18080] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 384.801457][T18080] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 03:05:07 executing program 3: r0 = socket$kcm(0x2, 0x0, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000140)) sendmsg(r3, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x0) [ 384.808302][T18080] Memory cgroup stats for /syz0: cache:12KB rss:148KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:80KB inactive_file:0KB active_file:0KB unevictable:0KB [ 384.829654][T18080] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=18080,uid=0 [ 384.845576][T18080] Memory cgroup out of memory: Killed process 18080 (syz-executor.0) total-vm:72448kB, anon-rss:72kB, file-rss:34828kB, shmem-rss:0kB [ 384.860306][ T1044] oom_reaper: reaped process 18080 (syz-executor.0), now anon-rss:0kB, file-rss:33932kB, shmem-rss:0kB [ 384.871601][T18087] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 384.881866][T18087] CPU: 1 PID: 18087 Comm: syz-executor.5 Not tainted 5.2.0-rc2+ #20 [ 384.889844][T18087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.899884][T18087] Call Trace: [ 384.903173][T18087] dump_stack+0x172/0x1f0 [ 384.907509][T18087] dump_header+0x10f/0xb6c [ 384.911922][T18087] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 384.917730][T18087] ? ___ratelimit+0x60/0x595 [ 384.922332][T18087] ? do_raw_spin_unlock+0x57/0x270 [ 384.927443][T18087] oom_kill_process.cold+0x10/0x15 [ 384.932558][T18087] out_of_memory+0x79a/0x1280 [ 384.937243][T18087] ? oom_killer_disable+0x280/0x280 [ 384.942440][T18087] ? find_held_lock+0x35/0x130 [ 384.947213][T18087] mem_cgroup_out_of_memory+0x1ca/0x230 [ 384.952756][T18087] ? memcg_event_wake+0x230/0x230 [ 384.957793][T18087] ? do_raw_spin_unlock+0x57/0x270 [ 384.962905][T18087] ? _raw_spin_unlock+0x2d/0x50 [ 384.967782][T18087] try_charge+0x102c/0x15c0 [ 384.972276][T18087] ? find_held_lock+0x35/0x130 [ 384.977047][T18087] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 384.982598][T18087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.988835][T18087] ? kasan_check_read+0x11/0x20 [ 384.993682][T18087] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 384.999225][T18087] mem_cgroup_try_charge+0x24d/0x5e0 [ 385.004551][T18087] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 385.010210][T18087] wp_page_copy+0x416/0x1770 [ 385.014804][T18087] ? do_wp_page+0x486/0x1500 [ 385.019393][T18087] ? pmd_pfn+0x1d0/0x1d0 [ 385.023637][T18087] ? lock_downgrade+0x880/0x880 [ 385.028482][T18087] ? swp_swapcount+0x540/0x540 [ 385.033267][T18087] ? do_raw_spin_unlock+0x57/0x270 [ 385.038391][T18087] ? kasan_check_read+0x11/0x20 [ 385.043235][T18087] ? do_raw_spin_unlock+0x57/0x270 [ 385.048346][T18087] do_wp_page+0x48e/0x1500 [ 385.052779][T18087] ? finish_mkwrite_fault+0x540/0x540 [ 385.058153][T18087] __handle_mm_fault+0x22e3/0x3eb0 [ 385.063268][T18087] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 385.068895][T18087] ? find_held_lock+0x35/0x130 [ 385.073657][T18087] ? handle_mm_fault+0x292/0xa90 [ 385.078613][T18087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.084859][T18087] ? kasan_check_read+0x11/0x20 [ 385.089712][T18087] handle_mm_fault+0x3b7/0xa90 [ 385.094949][T18087] __do_page_fault+0x5ef/0xda0 [ 385.099717][T18087] do_page_fault+0x71/0x57d [ 385.104235][T18087] ? page_fault+0x8/0x30 [ 385.108485][T18087] page_fault+0x1e/0x30 [ 385.112650][T18087] RIP: 0033:0x4303a6 [ 385.116538][T18087] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 385.136171][T18087] RSP: 002b:00007fffeed52810 EFLAGS: 00010206 [ 385.142241][T18087] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 385.150232][T18087] RDX: 0000555555fb5930 RSI: 0000555555fbd970 RDI: 0000000000000003 [ 385.158195][T18087] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555555fb4940 [ 385.166156][T18087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 385.174122][T18087] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 385.198688][T18087] memory: usage 3132kB, limit 0kB, failcnt 63 [ 385.210371][T18087] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 385.231438][T18087] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 385.245058][T18087] Memory cgroup stats for /syz5: cache:120KB rss:128KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:128KB inactive_file:132KB active_file:0KB unevictable:0KB [ 385.290292][T18087] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=18087,uid=0 [ 385.324265][T18087] Memory cgroup out of memory: Killed process 18087 (syz-executor.5) total-vm:72448kB, anon-rss:76kB, file-rss:34828kB, shmem-rss:0kB [ 385.358662][T18098] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 385.359045][ T1044] oom_reaper: reaped process 18087 (syz-executor.5), now anon-rss:0kB, file-rss:33932kB, shmem-rss:0kB [ 385.386100][T18098] CPU: 0 PID: 18098 Comm: syz-executor.3 Not tainted 5.2.0-rc2+ #20 [ 385.394076][T18098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.404124][T18098] Call Trace: [ 385.407415][T18098] dump_stack+0x172/0x1f0 [ 385.411759][T18098] dump_header+0x10f/0xb6c [ 385.416199][T18098] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 385.422006][T18098] ? ___ratelimit+0x60/0x595 [ 385.426603][T18098] ? do_raw_spin_unlock+0x57/0x270 [ 385.431744][T18098] oom_kill_process.cold+0x10/0x15 [ 385.436854][T18098] out_of_memory+0x79a/0x1280 [ 385.441655][T18098] ? oom_killer_disable+0x280/0x280 [ 385.446852][T18098] ? find_held_lock+0x35/0x130 [ 385.451634][T18098] mem_cgroup_out_of_memory+0x1ca/0x230 [ 385.457177][T18098] ? memcg_event_wake+0x230/0x230 [ 385.462199][T18098] ? do_raw_spin_unlock+0x57/0x270 [ 385.467305][T18098] ? _raw_spin_unlock+0x2d/0x50 [ 385.472152][T18098] try_charge+0x102c/0x15c0 [ 385.476644][T18098] ? find_held_lock+0x35/0x130 [ 385.481426][T18098] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 385.486997][T18098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.493233][T18098] ? kasan_check_read+0x11/0x20 [ 385.498083][T18098] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 385.503633][T18098] mem_cgroup_try_charge+0x24d/0x5e0 [ 385.508946][T18098] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 385.514591][T18098] wp_page_copy+0x416/0x1770 [ 385.519175][T18098] ? do_wp_page+0x486/0x1500 [ 385.523770][T18098] ? pmd_pfn+0x1d0/0x1d0 [ 385.528022][T18098] ? lock_downgrade+0x880/0x880 [ 385.532869][T18098] ? swp_swapcount+0x540/0x540 [ 385.537635][T18098] ? do_raw_spin_unlock+0x57/0x270 [ 385.542758][T18098] ? kasan_check_read+0x11/0x20 [ 385.547622][T18098] ? do_raw_spin_unlock+0x57/0x270 [ 385.552732][T18098] do_wp_page+0x48e/0x1500 [ 385.557150][T18098] ? finish_mkwrite_fault+0x540/0x540 [ 385.562524][T18098] __handle_mm_fault+0x22e3/0x3eb0 [ 385.567652][T18098] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 385.573200][T18098] ? find_held_lock+0x35/0x130 [ 385.577962][T18098] ? handle_mm_fault+0x292/0xa90 [ 385.582909][T18098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.589156][T18098] ? kasan_check_read+0x11/0x20 [ 385.594028][T18098] handle_mm_fault+0x3b7/0xa90 [ 385.598797][T18098] __do_page_fault+0x5ef/0xda0 [ 385.603566][T18098] do_page_fault+0x71/0x57d [ 385.608065][T18098] ? page_fault+0x8/0x30 [ 385.612305][T18098] page_fault+0x1e/0x30 [ 385.616452][T18098] RIP: 0033:0x4303a6 [ 385.620343][T18098] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 385.639934][T18098] RSP: 002b:00007ffc2f714340 EFLAGS: 00010206 [ 385.645991][T18098] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 385.653961][T18098] RDX: 0000555557464930 RSI: 000055555746c970 RDI: 0000000000000003 [ 385.661921][T18098] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555557463940 [ 385.669883][T18098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 385.677853][T18098] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 385.700924][T18098] memory: usage 3280kB, limit 0kB, failcnt 62 [ 385.706996][T18098] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 385.714555][T18098] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 385.721791][T18098] Memory cgroup stats for /syz3: cache:180KB rss:56KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:56KB inactive_file:132KB active_file:0KB unevictable:0KB [ 385.742550][T18098] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=18098,uid=0 [ 385.772010][T18098] Memory cgroup out of memory: Killed process 18098 (syz-executor.3) total-vm:72448kB, anon-rss:72kB, file-rss:34828kB, shmem-rss:0kB [ 385.796418][ T1044] oom_reaper: reaped process 18098 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 386.261006][T18131] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 386.271880][T18131] CPU: 1 PID: 18131 Comm: syz-executor.4 Not tainted 5.2.0-rc2+ #20 [ 386.279851][T18131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.289894][T18131] Call Trace: [ 386.293189][T18131] dump_stack+0x172/0x1f0 [ 386.297522][T18131] dump_header+0x10f/0xb6c [ 386.301951][T18131] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 386.307767][T18131] ? ___ratelimit+0x60/0x595 [ 386.312356][T18131] ? do_raw_spin_unlock+0x57/0x270 [ 386.317474][T18131] oom_kill_process.cold+0x10/0x15 [ 386.322604][T18131] out_of_memory+0x79a/0x1280 [ 386.327280][T18131] ? __sched_text_start+0x8/0x8 [ 386.332136][T18131] ? oom_killer_disable+0x280/0x280 [ 386.337349][T18131] mem_cgroup_out_of_memory+0x1ca/0x230 [ 386.342934][T18131] ? memcg_event_wake+0x230/0x230 [ 386.347970][T18131] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 386.353825][T18131] ? cgroup_file_notify+0x140/0x1b0 [ 386.359027][T18131] memory_max_write+0x169/0x300 [ 386.363873][T18131] ? retint_kernel+0x2b/0x2b [ 386.368464][T18131] ? mem_cgroup_write+0x360/0x360 [ 386.373490][T18131] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 386.378950][T18131] cgroup_file_write+0x241/0x790 [ 386.383880][T18131] ? mem_cgroup_write+0x360/0x360 [ 386.388894][T18131] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 386.394526][T18131] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 386.400192][T18131] kernfs_fop_write+0x2b8/0x480 [ 386.405042][T18131] __vfs_write+0x8a/0x110 [ 386.409377][T18131] ? kernfs_fop_open+0xd80/0xd80 [ 386.414313][T18131] vfs_write+0x20c/0x580 [ 386.418562][T18131] ksys_write+0x14f/0x290 [ 386.422894][T18131] ? __ia32_sys_read+0xb0/0xb0 [ 386.427664][T18131] ? do_syscall_64+0x26/0x680 [ 386.432345][T18131] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.438430][T18131] ? do_syscall_64+0x26/0x680 [ 386.443111][T18131] __x64_sys_write+0x73/0xb0 [ 386.447716][T18131] do_syscall_64+0xfd/0x680 [ 386.452233][T18131] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.458112][T18131] RIP: 0033:0x4592c9 [ 386.461990][T18131] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 386.481618][T18131] RSP: 002b:00007fd3f146dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 386.490026][T18131] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 386.497985][T18131] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 386.505934][T18131] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 386.513889][T18131] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd3f146e6d4 [ 386.521855][T18131] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 386.548582][T18131] memory: usage 5864kB, limit 0kB, failcnt 39 [ 386.555385][T18131] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 386.563469][T18131] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 386.572066][T18131] Memory cgroup stats for [ 386.572113][T18131] /syz4: cache:44KB rss:2128KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2128KB inactive_file:132KB active_file:132KB unevictable:0KB [ 386.606365][T18131] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg= [ 386.606588][T18128] IPVS: ftp: loaded support on port[0] = 21 [ 386.606623][T18131] /syz4,task_memcg=/syz4,task=syz-executor.4,pid=18130,uid=0 [ 386.619785][T18129] IPVS: ftp: loaded support on port[0] = 21 [ 386.633664][T18131] Memory cgroup out of memory: Killed process 18130 (syz-executor.4) total-vm:72580kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 386.664698][ T1044] oom_reaper: reaped process 18130 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 03:05:09 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) [ 386.896041][T18097] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 386.906162][T18097] CPU: 0 PID: 18097 Comm: syz-executor.4 Not tainted 5.2.0-rc2+ #20 [ 386.914131][T18097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.924240][T18097] Call Trace: [ 386.927538][T18097] dump_stack+0x172/0x1f0 [ 386.931873][T18097] dump_header+0x10f/0xb6c [ 386.936308][T18097] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 386.942110][T18097] ? ___ratelimit+0x60/0x595 [ 386.946706][T18097] ? do_raw_spin_unlock+0x57/0x270 [ 386.951823][T18097] oom_kill_process.cold+0x10/0x15 [ 386.956934][T18097] out_of_memory+0x79a/0x1280 [ 386.961610][T18097] ? lock_downgrade+0x880/0x880 [ 386.966474][T18097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.972710][T18097] ? oom_killer_disable+0x280/0x280 [ 386.977912][T18097] ? find_held_lock+0x35/0x130 [ 386.982704][T18097] mem_cgroup_out_of_memory+0x1ca/0x230 [ 386.988276][T18097] ? memcg_event_wake+0x230/0x230 [ 386.993319][T18097] ? do_raw_spin_unlock+0x57/0x270 [ 387.000082][T18097] ? _raw_spin_unlock+0x2d/0x50 [ 387.004944][T18097] try_charge+0x102c/0x15c0 [ 387.009438][T18097] ? find_held_lock+0x35/0x130 [ 387.014201][T18097] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 387.019752][T18097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.026049][T18097] ? kasan_check_read+0x11/0x20 [ 387.030904][T18097] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 387.036455][T18097] mem_cgroup_try_charge+0x24d/0x5e0 [ 387.041738][T18097] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 387.047366][T18097] wp_page_copy+0x416/0x1770 [ 387.051953][T18097] ? do_wp_page+0x486/0x1500 [ 387.056543][T18097] ? pmd_pfn+0x1d0/0x1d0 [ 387.060782][T18097] ? lock_downgrade+0x880/0x880 [ 387.065625][T18097] ? swp_swapcount+0x540/0x540 [ 387.070393][T18097] ? do_raw_spin_unlock+0x57/0x270 [ 387.075529][T18097] ? kasan_check_read+0x11/0x20 [ 387.080369][T18097] ? do_raw_spin_unlock+0x57/0x270 [ 387.085491][T18097] do_wp_page+0x48e/0x1500 [ 387.089906][T18097] ? finish_mkwrite_fault+0x540/0x540 [ 387.095281][T18097] __handle_mm_fault+0x22e3/0x3eb0 [ 387.100398][T18097] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 387.106035][T18097] ? find_held_lock+0x35/0x130 [ 387.110792][T18097] ? handle_mm_fault+0x292/0xa90 [ 387.115740][T18097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.122020][T18097] ? kasan_check_read+0x11/0x20 [ 387.126850][T18097] handle_mm_fault+0x3b7/0xa90 [ 387.131595][T18097] __do_page_fault+0x5ef/0xda0 [ 387.136342][T18097] do_page_fault+0x71/0x57d [ 387.140844][T18097] ? page_fault+0x8/0x30 [ 387.145076][T18097] page_fault+0x1e/0x30 [ 387.149210][T18097] RIP: 0033:0x4303a6 [ 387.153082][T18097] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 387.172660][T18097] RSP: 002b:00007ffc4ecd88a0 EFLAGS: 00010206 [ 387.178723][T18097] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 387.186666][T18097] RDX: 0000555556436930 RSI: 000055555643e970 RDI: 0000000000000003 [ 387.194616][T18097] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556435940 [ 387.202574][T18097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 387.210551][T18097] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 387.220849][T18097] memory: usage 3532kB, limit 0kB, failcnt 47 [ 387.226919][T18097] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 387.234722][T18097] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 387.241646][T18097] Memory cgroup stats for /syz4: cache:44KB rss:20KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:20KB inactive_file:132KB active_file:132KB unevictable:0KB [ 387.241744][T18097] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=18097,uid=0 [ 387.278084][T18097] Memory cgroup out of memory: Killed process 18097 (syz-executor.4) total-vm:72448kB, anon-rss:72kB, file-rss:34828kB, shmem-rss:0kB 03:05:10 executing program 5: perf_event_open(&(0x7f0000000280)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:05:10 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) 03:05:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$sock(r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) recvmsg$kcm(r1, 0x0, 0x40000002) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:05:10 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:10 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)=' G%\xd4roupt/syz1\x00\x00\x00\x00\xbeb+\xbey', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c00000024000000060000006f3096d2a59598e5735de083005811d409222a61f45b4bdafeeee8a97453af1ff7ed306602e85e995ffa497e1dc2810c4612aded8bc935f59c5e22000000000000"], 0x0, 0x59}, 0x20) r6 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r7 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0xf, 0x1, 0xdc, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) write$cgroup_pid(r3, &(0x7f0000000540)=r7, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000600)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) 03:05:10 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0x12000000]}, 0x2c) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 389.199999][T18137] IPVS: ftp: loaded support on port[0] = 21 [ 389.200746][T18138] IPVS: ftp: loaded support on port[0] = 21 [ 389.233711][T18136] IPVS: ftp: loaded support on port[0] = 21 [ 389.274602][T18129] chnl_net:caif_netlink_parms(): no params data found [ 390.240513][T18128] chnl_net:caif_netlink_parms(): no params data found [ 390.735469][T18129] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.742762][T18129] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.750866][T18129] device bridge_slave_0 entered promiscuous mode [ 390.762870][T18129] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.769921][T18129] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.777785][T18129] device bridge_slave_1 entered promiscuous mode [ 391.283459][T18129] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 391.297160][T18129] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 391.777497][T18128] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.786136][T18128] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.794610][T18128] device bridge_slave_0 entered promiscuous mode [ 391.814698][T18129] team0: Port device team_slave_0 added [ 391.823908][T18129] team0: Port device team_slave_1 added [ 391.850528][T18128] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.857593][T18128] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.865778][T18128] device bridge_slave_1 entered promiscuous mode [ 391.975238][T18128] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 392.033969][T18136] chnl_net:caif_netlink_parms(): no params data found [ 392.053061][T18137] chnl_net:caif_netlink_parms(): no params data found [ 392.064086][T18128] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 392.073109][T18138] chnl_net:caif_netlink_parms(): no params data found [ 392.141994][T18129] device hsr_slave_0 entered promiscuous mode [ 392.180333][T18129] device hsr_slave_1 entered promiscuous mode [ 392.345746][T18128] team0: Port device team_slave_0 added [ 392.419575][T18128] team0: Port device team_slave_1 added [ 392.432819][T18137] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.439925][T18137] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.447916][T18137] device bridge_slave_0 entered promiscuous mode [ 392.456696][T18136] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.463830][T18136] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.471838][T18136] device bridge_slave_0 entered promiscuous mode [ 392.479164][T18138] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.486655][T18138] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.494828][T18138] device bridge_slave_0 entered promiscuous mode [ 392.507146][T18137] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.514728][T18137] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.522727][T18137] device bridge_slave_1 entered promiscuous mode [ 392.545469][T18137] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 392.554268][T18136] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.563436][T18136] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.571524][T18136] device bridge_slave_1 entered promiscuous mode [ 392.578251][T18138] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.585734][T18138] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.594086][T18138] device bridge_slave_1 entered promiscuous mode [ 392.652797][T18128] device hsr_slave_0 entered promiscuous mode [ 392.690532][T18128] device hsr_slave_1 entered promiscuous mode [ 392.732112][T18137] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 392.830045][T18138] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 392.842240][T18138] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 392.904506][T18136] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 392.919583][T18137] team0: Port device team_slave_0 added [ 392.944493][T18136] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 392.954453][T18137] team0: Port device team_slave_1 added [ 393.011971][T18138] team0: Port device team_slave_0 added [ 393.013627][T18138] team0: Port device team_slave_1 added [ 393.191774][T18138] device hsr_slave_0 entered promiscuous mode [ 393.250486][T18138] device hsr_slave_1 entered promiscuous mode [ 393.301792][T18136] team0: Port device team_slave_0 added [ 393.321227][T18129] 8021q: adding VLAN 0 to HW filter on device bond0 [ 393.383450][T18137] device hsr_slave_0 entered promiscuous mode [ 393.440538][T18137] device hsr_slave_1 entered promiscuous mode [ 393.494067][T18136] team0: Port device team_slave_1 added [ 393.549697][T18129] 8021q: adding VLAN 0 to HW filter on device team0 [ 393.623261][T18136] device hsr_slave_0 entered promiscuous mode [ 393.650552][T18136] device hsr_slave_1 entered promiscuous mode [ 393.702938][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 393.710632][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 393.718329][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 393.728298][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 393.736842][ T3001] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.743931][ T3001] bridge0: port 1(bridge_slave_0) entered forwarding state [ 393.753438][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 393.851624][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 393.861952][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 393.870571][ T3001] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.877599][ T3001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 393.885504][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 393.922542][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 393.931602][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 393.940388][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 393.948626][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 394.042001][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 394.058066][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 394.066496][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 394.074988][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 394.094752][T18129] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 394.106465][T18129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 394.119811][T18128] 8021q: adding VLAN 0 to HW filter on device bond0 [ 394.182168][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 394.191064][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 394.232329][T18129] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 394.255197][T18128] 8021q: adding VLAN 0 to HW filter on device team0 [ 394.329059][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 394.336991][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 394.367974][T18136] 8021q: adding VLAN 0 to HW filter on device bond0 [ 394.379339][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 394.388938][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 394.397659][T15162] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.404744][T15162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.412863][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 394.421859][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 394.430183][T15162] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.437231][T15162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 394.445064][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 394.457071][T18137] 8021q: adding VLAN 0 to HW filter on device bond0 [ 394.537924][T18137] 8021q: adding VLAN 0 to HW filter on device team0 [ 394.563423][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 394.572425][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 394.584916][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 394.597772][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 394.621507][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 394.629274][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 394.651048][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 394.658800][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 394.665900][T18149] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 394.666276][T18149] CPU: 0 PID: 18149 Comm: syz-executor.2 Not tainted 5.2.0-rc2+ #20 [ 394.684322][T18149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.694367][T18149] Call Trace: [ 394.697655][T18149] dump_stack+0x172/0x1f0 [ 394.698496][T18128] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 394.701994][T18149] dump_header+0x10f/0xb6c [ 394.702011][T18149] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 394.702025][T18149] ? ___ratelimit+0x60/0x595 [ 394.702039][T18149] ? do_raw_spin_unlock+0x57/0x270 [ 394.702056][T18149] oom_kill_process.cold+0x10/0x15 [ 394.702072][T18149] out_of_memory+0x79a/0x1280 [ 394.702087][T18149] ? __sched_text_start+0x8/0x8 [ 394.702104][T18149] ? oom_killer_disable+0x280/0x280 [ 394.726254][T18128] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 394.727172][T18149] mem_cgroup_out_of_memory+0x1ca/0x230 [ 394.743945][T18138] 8021q: adding VLAN 0 to HW filter on device bond0 [ 394.746873][T18149] ? memcg_event_wake+0x230/0x230 [ 394.779535][T18149] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 394.785368][T18149] ? cgroup_file_notify+0x140/0x1b0 [ 394.790564][T18149] memory_max_write+0x169/0x300 [ 394.795419][T18149] ? mem_cgroup_write+0x360/0x360 [ 394.798702][T18138] 8021q: adding VLAN 0 to HW filter on device team0 [ 394.800436][T18149] ? lock_acquire+0x1ea/0x3f0 [ 394.800457][T18149] cgroup_file_write+0x241/0x790 [ 394.800473][T18149] ? mem_cgroup_write+0x360/0x360 [ 394.800487][T18149] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 394.800508][T18149] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 394.800523][T18149] kernfs_fop_write+0x2b8/0x480 [ 394.800541][T18149] __vfs_write+0x8a/0x110 [ 394.842050][T18149] ? kernfs_fop_open+0xd80/0xd80 [ 394.847012][T18149] vfs_write+0x20c/0x580 [ 394.851256][T18149] ksys_write+0x14f/0x290 [ 394.855598][T18149] ? __ia32_sys_read+0xb0/0xb0 [ 394.860365][T18149] ? do_syscall_64+0x26/0x680 [ 394.860682][T18138] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 394.865067][T18149] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 394.881434][T18149] ? do_syscall_64+0x26/0x680 [ 394.886122][T18149] __x64_sys_write+0x73/0xb0 [ 394.888629][T18138] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 394.890708][T18149] do_syscall_64+0xfd/0x680 [ 394.890727][T18149] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 394.890739][T18149] RIP: 0033:0x4592c9 [ 394.890765][T18149] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 394.890772][T18149] RSP: 002b:00007f3365697c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 394.890796][T18149] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 394.890804][T18149] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 394.890812][T18149] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 394.890825][T18149] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f33656986d4 [ 394.950338][T18138] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 394.951322][T18149] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 394.991129][T18149] memory: usage 5336kB, limit 0kB, failcnt 33 [ 394.997453][T18149] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 395.005393][T18149] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 395.024138][T18136] 8021q: adding VLAN 0 to HW filter on device team0 [ 395.037300][T18149] Memory cgroup stats for /syz2: cache:252KB rss:2144KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2144KB inactive_file:132KB active_file:0KB unevictable:0KB [ 395.060631][T18149] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=18148,uid=0 [ 395.077708][T18149] Memory cgroup out of memory: Killed process 18148 (syz-executor.2) total-vm:72580kB, anon-rss:2136kB, file-rss:34816kB, shmem-rss:0kB [ 395.102589][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 395.116632][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 395.125993][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 395.135802][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 395.144314][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 395.152807][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 395.161205][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 395.169280][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 395.177481][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 395.185294][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 395.193923][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 395.202350][T15162] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.209387][T15162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.217052][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 395.225800][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 395.234206][T15162] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.241302][T15162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 395.248752][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 395.257656][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 395.266290][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 395.274966][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 395.283538][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 395.292301][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 395.301674][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 395.312586][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 395.321392][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 395.329583][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 395.338022][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 395.346584][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 395.354996][T15162] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.362104][T15162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.370024][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 395.377811][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 395.385673][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 395.393496][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 395.401246][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 395.441953][T18129] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 395.457350][T18129] CPU: 0 PID: 18129 Comm: syz-executor.2 Not tainted 5.2.0-rc2+ #20 [ 395.465324][T18129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.475366][T18129] Call Trace: [ 395.478650][T18129] dump_stack+0x172/0x1f0 [ 395.483002][T18129] dump_header+0x10f/0xb6c [ 395.487416][T18129] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 395.493237][T18129] ? ___ratelimit+0x60/0x595 [ 395.497822][T18129] ? do_raw_spin_unlock+0x57/0x270 [ 395.502933][T18129] oom_kill_process.cold+0x10/0x15 [ 395.508050][T18129] out_of_memory+0x79a/0x1280 [ 395.512730][T18129] ? lock_downgrade+0x880/0x880 [ 395.517574][T18129] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.523820][T18129] ? oom_killer_disable+0x280/0x280 [ 395.529033][T18129] ? find_held_lock+0x35/0x130 [ 395.533789][T18129] mem_cgroup_out_of_memory+0x1ca/0x230 [ 395.539315][T18129] ? memcg_event_wake+0x230/0x230 [ 395.544342][T18129] ? do_raw_spin_unlock+0x57/0x270 [ 395.549444][T18129] ? _raw_spin_unlock+0x2d/0x50 [ 395.554286][T18129] try_charge+0x102c/0x15c0 [ 395.558782][T18129] ? find_held_lock+0x35/0x130 [ 395.563545][T18129] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 395.569095][T18129] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.575322][T18129] ? kasan_check_read+0x11/0x20 [ 395.580172][T18129] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 395.585709][T18129] mem_cgroup_try_charge+0x24d/0x5e0 [ 395.591004][T18129] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 395.596638][T18129] wp_page_copy+0x416/0x1770 [ 395.601230][T18129] ? do_wp_page+0x486/0x1500 [ 395.605830][T18129] ? pmd_pfn+0x1d0/0x1d0 [ 395.610059][T18129] ? lock_downgrade+0x880/0x880 [ 395.614944][T18129] ? swp_swapcount+0x540/0x540 [ 395.619692][T18129] ? do_raw_spin_unlock+0x57/0x270 [ 395.624802][T18129] ? kasan_check_read+0x11/0x20 [ 395.629693][T18129] ? do_raw_spin_unlock+0x57/0x270 [ 395.634809][T18129] do_wp_page+0x48e/0x1500 [ 395.639237][T18129] ? finish_mkwrite_fault+0x540/0x540 [ 395.644650][T18129] __handle_mm_fault+0x22e3/0x3eb0 [ 395.649757][T18129] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 395.655292][T18129] ? find_held_lock+0x35/0x130 [ 395.660053][T18129] ? handle_mm_fault+0x292/0xa90 [ 395.664997][T18129] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.671321][T18129] ? kasan_check_read+0x11/0x20 [ 395.676158][T18129] handle_mm_fault+0x3b7/0xa90 [ 395.680921][T18129] __do_page_fault+0x5ef/0xda0 [ 395.685697][T18129] do_page_fault+0x71/0x57d [ 395.690197][T18129] ? page_fault+0x8/0x30 [ 395.694431][T18129] page_fault+0x1e/0x30 [ 395.698568][T18129] RIP: 0033:0x4303a6 [ 395.702476][T18129] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 395.722071][T18129] RSP: 002b:00007ffcb0582600 EFLAGS: 00010206 [ 395.728122][T18129] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 395.736085][T18129] RDX: 0000555556b77930 RSI: 0000555556b7f970 RDI: 0000000000000003 [ 395.744045][T18129] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555556b76940 [ 395.752030][T18129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 395.759986][T18129] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 395.772586][T18129] memory: usage 2996kB, limit 0kB, failcnt 41 [ 395.778649][T18129] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 395.786489][T18129] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 395.793626][T18129] Memory cgroup stats for /syz2: cache:252KB rss:36KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:132KB active_file:0KB unevictable:0KB [ 395.817326][T18129] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=18129,uid=0 [ 395.842958][T18129] Memory cgroup out of memory: Killed process 18129 (syz-executor.2) total-vm:72448kB, anon-rss:68kB, file-rss:34828kB, shmem-rss:0kB [ 395.857368][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 395.866629][ T1044] oom_reaper: reaped process 18129 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 395.878370][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 395.887076][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.894199][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.903299][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 395.912067][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 395.920739][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.927885][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 395.935878][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 395.944780][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 396.155630][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 396.170593][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 396.179072][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 396.195309][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 396.205784][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 396.214990][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 396.223657][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 396.232263][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 396.241279][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 396.249542][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.256648][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 396.264386][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 396.272911][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 396.304142][T18128] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 396.322443][T18136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 396.364275][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 396.378836][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 396.388000][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 396.499664][T15502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 396.515831][T15502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 396.519161][T18158] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 396.536985][T18158] CPU: 1 PID: 18158 Comm: syz-executor.0 Not tainted 5.2.0-rc2+ #20 [ 396.544960][T18158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.545057][T15502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 396.555001][T18158] Call Trace: [ 396.555022][T18158] dump_stack+0x172/0x1f0 [ 396.555054][T18158] dump_header+0x10f/0xb6c [ 396.555079][T18158] oom_kill_process.cold+0x10/0x15 [ 396.555098][T18158] out_of_memory+0x79a/0x1280 [ 396.566107][T15502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 396.566243][T18158] ? __sched_text_start+0x8/0x8 [ 396.571476][T15502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 396.574982][T18158] ? oom_killer_disable+0x280/0x280 [ 396.575022][T18158] mem_cgroup_out_of_memory+0x1ca/0x230 [ 396.581012][T15502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 396.584775][T18158] ? memcg_event_wake+0x230/0x230 [ 396.584795][T18158] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 396.584813][T18158] ? cgroup_file_notify+0x140/0x1b0 [ 396.597286][T18137] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 396.597502][T18158] memory_max_write+0x169/0x300 [ 396.607185][T18137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 396.610568][T18158] ? mem_cgroup_write+0x360/0x360 [ 396.610593][T18158] cgroup_file_write+0x241/0x790 [ 396.610608][T18158] ? mem_cgroup_write+0x360/0x360 [ 396.610626][T18158] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 396.631580][T18137] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 396.634681][T18158] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 396.650193][T18158] kernfs_fop_write+0x2b8/0x480 [ 396.650211][T18158] __vfs_write+0x8a/0x110 [ 396.650228][T18158] ? kernfs_fop_open+0xd80/0xd80 [ 396.704313][T18158] vfs_write+0x20c/0x580 [ 396.713471][T18158] ksys_write+0x14f/0x290 [ 396.713486][T18158] ? __ia32_sys_read+0xb0/0xb0 [ 396.713504][T18158] ? do_syscall_64+0x26/0x680 [ 396.713523][T18158] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.733301][T18158] ? do_syscall_64+0x26/0x680 [ 396.737985][T18158] __x64_sys_write+0x73/0xb0 [ 396.742613][T18158] do_syscall_64+0xfd/0x680 [ 396.747146][T18158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.753043][T18158] RIP: 0033:0x4592c9 [ 396.756947][T18158] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 396.776553][T18158] RSP: 002b:00007f757334ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 396.784983][T18158] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 396.792950][T18158] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 396.800937][T18158] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 396.808906][T18158] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f757334b6d4 [ 396.808921][T18158] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 396.867513][T18136] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 396.871221][T18158] memory: usage 5504kB, limit 0kB, failcnt 64 [ 396.881531][T18158] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 396.889121][T18158] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 396.896688][T18158] Memory cgroup stats for /syz0: cache:12KB rss:2236KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2168KB inactive_file:0KB active_file:0KB unevictable:0KB [ 396.915095][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 396.918956][T18158] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=18155,uid=0 [ 396.952973][T18158] Memory cgroup out of memory: Killed process 18155 (syz-executor.0) total-vm:72580kB, anon-rss:2180kB, file-rss:35772kB, shmem-rss:0kB [ 396.977738][ T1044] oom_reaper: reaped process 18155 (syz-executor.0), now anon-rss:0kB, file-rss:34812kB, shmem-rss:0kB [ 396.991194][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 396.999733][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 397.022544][T18138] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 397.036450][T18138] CPU: 1 PID: 18138 Comm: syz-executor.0 Not tainted 5.2.0-rc2+ #20 [ 397.044446][T18138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.054498][T18138] Call Trace: [ 397.057803][T18138] dump_stack+0x172/0x1f0 [ 397.062135][T18138] dump_header+0x10f/0xb6c [ 397.066542][T18138] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 397.072336][T18138] ? ___ratelimit+0x60/0x595 [ 397.076911][T18138] ? do_raw_spin_unlock+0x57/0x270 [ 397.082011][T18138] oom_kill_process.cold+0x10/0x15 [ 397.087109][T18138] out_of_memory+0x79a/0x1280 [ 397.091784][T18138] ? lock_downgrade+0x880/0x880 [ 397.096620][T18138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.102848][T18138] ? oom_killer_disable+0x280/0x280 [ 397.108027][T18138] ? find_held_lock+0x35/0x130 [ 397.112800][T18138] mem_cgroup_out_of_memory+0x1ca/0x230 [ 397.118329][T18138] ? memcg_event_wake+0x230/0x230 [ 397.123368][T18138] ? do_raw_spin_unlock+0x57/0x270 [ 397.128477][T18138] ? _raw_spin_unlock+0x2d/0x50 [ 397.133327][T18138] try_charge+0x102c/0x15c0 [ 397.137813][T18138] ? find_held_lock+0x35/0x130 [ 397.142594][T18138] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 397.148126][T18138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.154370][T18138] ? kasan_check_read+0x11/0x20 [ 397.159226][T18138] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 397.164798][T18138] mem_cgroup_try_charge+0x24d/0x5e0 [ 397.170072][T18138] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 397.175698][T18138] wp_page_copy+0x416/0x1770 [ 397.180267][T18138] ? do_wp_page+0x486/0x1500 [ 397.184846][T18138] ? pmd_pfn+0x1d0/0x1d0 [ 397.189076][T18138] ? lock_downgrade+0x880/0x880 [ 397.193910][T18138] ? swp_swapcount+0x540/0x540 [ 397.198674][T18138] ? do_raw_spin_unlock+0x57/0x270 [ 397.203784][T18138] ? kasan_check_read+0x11/0x20 [ 397.208636][T18138] ? do_raw_spin_unlock+0x57/0x270 [ 397.213765][T18138] do_wp_page+0x48e/0x1500 [ 397.218212][T18138] ? finish_mkwrite_fault+0x540/0x540 [ 397.223597][T18138] __handle_mm_fault+0x22e3/0x3eb0 [ 397.228708][T18138] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 397.234245][T18138] ? find_held_lock+0x35/0x130 [ 397.238998][T18138] ? handle_mm_fault+0x292/0xa90 [ 397.243945][T18138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.250176][T18138] ? kasan_check_read+0x11/0x20 [ 397.255019][T18138] handle_mm_fault+0x3b7/0xa90 [ 397.259780][T18138] __do_page_fault+0x5ef/0xda0 [ 397.264538][T18138] do_page_fault+0x71/0x57d [ 397.269027][T18138] ? page_fault+0x8/0x30 [ 397.273267][T18138] page_fault+0x1e/0x30 [ 397.277404][T18138] RIP: 0033:0x4303a6 [ 397.281382][T18138] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 397.301006][T18138] RSP: 002b:00007ffddf177580 EFLAGS: 00010206 [ 397.307052][T18138] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 397.315038][T18138] RDX: 000055555635d930 RSI: 0000555556365970 RDI: 0000000000000003 [ 397.323005][T18138] RBP: 0000000000008041 R08: 0000000000000001 R09: 000055555635c940 [ 397.330978][T18138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 397.338941][T18138] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 397.386012][T18138] memory: usage 3172kB, limit 0kB, failcnt 76 [ 397.396298][T18138] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 397.406608][T18138] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 397.413821][T18138] Memory cgroup stats for /syz0: cache:12KB rss:128KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:60KB inactive_file:0KB active_file:0KB unevictable:0KB [ 397.434915][T18138] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=18138,uid=0 [ 397.479170][T18138] Memory cgroup out of memory: Killed process 18138 (syz-executor.0) total-vm:72448kB, anon-rss:68kB, file-rss:34828kB, shmem-rss:0kB [ 397.529370][T18173] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 397.530205][ T1044] oom_reaper: reaped process 18138 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 397.539850][T18173] CPU: 1 PID: 18173 Comm: syz-executor.1 Not tainted 5.2.0-rc2+ #20 [ 397.558578][T18173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.568630][T18173] Call Trace: [ 397.571924][T18173] dump_stack+0x172/0x1f0 [ 397.576235][T18173] dump_header+0x10f/0xb6c [ 397.580630][T18173] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 397.586413][T18173] ? ___ratelimit+0x60/0x595 [ 397.590978][T18173] ? do_raw_spin_unlock+0x57/0x270 [ 397.596066][T18173] oom_kill_process.cold+0x10/0x15 [ 397.601208][T18173] out_of_memory+0x79a/0x1280 [ 397.605931][T18173] ? oom_killer_disable+0x280/0x280 [ 397.611117][T18173] mem_cgroup_out_of_memory+0x1ca/0x230 [ 397.616636][T18173] ? memcg_event_wake+0x230/0x230 [ 397.621648][T18173] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 397.627452][T18173] ? cgroup_file_notify+0x140/0x1b0 [ 397.632640][T18173] memory_max_write+0x169/0x300 [ 397.637466][T18173] ? mem_cgroup_write+0x360/0x360 [ 397.642469][T18173] ? mem_cgroup_write+0x360/0x360 [ 397.647471][T18173] ? cgroup_file_write+0x1e2/0x790 [ 397.652580][T18173] cgroup_file_write+0x241/0x790 [ 397.657525][T18173] ? mem_cgroup_write+0x360/0x360 [ 397.662539][T18173] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 397.668156][T18173] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 397.673789][T18173] kernfs_fop_write+0x2b8/0x480 [ 397.678617][T18173] __vfs_write+0x8a/0x110 [ 397.682918][T18173] ? kernfs_fop_open+0xd80/0xd80 [ 397.687829][T18173] vfs_write+0x20c/0x580 [ 397.692046][T18173] ksys_write+0x14f/0x290 [ 397.696367][T18173] ? __ia32_sys_read+0xb0/0xb0 [ 397.701109][T18173] ? do_syscall_64+0x26/0x680 [ 397.705759][T18173] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.711798][T18173] ? do_syscall_64+0x26/0x680 [ 397.716503][T18173] __x64_sys_write+0x73/0xb0 [ 397.721098][T18173] do_syscall_64+0xfd/0x680 [ 397.725580][T18173] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.731472][T18173] RIP: 0033:0x4592c9 [ 397.735341][T18173] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 397.754935][T18173] RSP: 002b:00007fdbc834cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 397.763325][T18173] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 397.771270][T18173] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 397.779237][T18173] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 397.787195][T18173] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdbc834d6d4 [ 397.795165][T18173] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 397.841553][T18173] memory: usage 5132kB, limit 0kB, failcnt 62 [ 397.847814][T18173] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 397.878486][T18173] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 397.929874][T18173] Memory cgroup stats for /syz1: cache:288KB rss:2176KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2176KB inactive_file:0KB active_file:0KB unevictable:0KB [ 397.984698][T18173] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18172,uid=0 [ 398.018234][T18173] Memory cgroup out of memory: Killed process 18172 (syz-executor.1) total-vm:72580kB, anon-rss:2136kB, file-rss:34816kB, shmem-rss:0kB [ 398.048554][ T1044] oom_reaper: reaped process 18172 (syz-executor.1), now anon-rss:0kB, file-rss:34892kB, shmem-rss:0kB 03:05:20 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x4e, &(0x7f0000000780), 0x4) 03:05:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x800000000002, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000001a0081522a38dd6bc25228e8499541e70014c838dfecff0e00fa0708c0b0bd59e72b35c0e701570c0b2e", 0x2e}], 0x1}, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000100)) socket$kcm(0x10, 0x2, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30e) 03:05:20 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 03:05:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0x12000000]}, 0x2c) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:05:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000002b00)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="230000005e0081aee4050c00000f00f387726475f03c86d23800008bc609f6ad76ffff", 0x23}], 0x1}, 0x0) [ 398.162514][T18128] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 398.206247][T18128] CPU: 1 PID: 18128 Comm: syz-executor.1 Not tainted 5.2.0-rc2+ #20 [ 398.214239][T18128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.224339][T18128] Call Trace: [ 398.227665][T18128] dump_stack+0x172/0x1f0 [ 398.232016][T18128] dump_header+0x10f/0xb6c [ 398.236444][T18128] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 398.242247][T18128] ? ___ratelimit+0x60/0x595 [ 398.246837][T18128] ? do_raw_spin_unlock+0x57/0x270 [ 398.251963][T18128] oom_kill_process.cold+0x10/0x15 [ 398.257077][T18128] out_of_memory+0x79a/0x1280 [ 398.261778][T18128] ? lock_downgrade+0x880/0x880 [ 398.266639][T18128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.272881][T18128] ? oom_killer_disable+0x280/0x280 [ 398.278073][T18128] ? find_held_lock+0x35/0x130 [ 398.282843][T18128] mem_cgroup_out_of_memory+0x1ca/0x230 [ 398.288397][T18128] ? memcg_event_wake+0x230/0x230 [ 398.293456][T18128] ? do_raw_spin_unlock+0x57/0x270 [ 398.298583][T18128] ? _raw_spin_unlock+0x2d/0x50 [ 398.303438][T18128] try_charge+0x102c/0x15c0 [ 398.307957][T18128] ? find_held_lock+0x35/0x130 [ 398.312759][T18128] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 398.318298][T18128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.324525][T18128] ? kasan_check_read+0x11/0x20 [ 398.329372][T18128] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 398.334942][T18128] mem_cgroup_try_charge+0x24d/0x5e0 [ 398.340228][T18128] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 398.345850][T18128] wp_page_copy+0x416/0x1770 [ 398.350435][T18128] ? do_wp_page+0x486/0x1500 [ 398.355008][T18128] ? pmd_pfn+0x1d0/0x1d0 [ 398.359234][T18128] ? lock_downgrade+0x880/0x880 [ 398.364072][T18128] ? swp_swapcount+0x540/0x540 [ 398.368812][T18128] ? do_raw_spin_unlock+0x57/0x270 [ 398.373917][T18128] ? kasan_check_read+0x11/0x20 [ 398.378768][T18128] ? do_raw_spin_unlock+0x57/0x270 [ 398.383860][T18128] do_wp_page+0x48e/0x1500 [ 398.388253][T18128] ? finish_mkwrite_fault+0x540/0x540 [ 398.393604][T18128] __handle_mm_fault+0x22e3/0x3eb0 [ 398.398710][T18128] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 398.404269][T18128] ? find_held_lock+0x35/0x130 [ 398.409019][T18128] ? handle_mm_fault+0x292/0xa90 [ 398.413955][T18128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.420205][T18128] ? kasan_check_read+0x11/0x20 [ 398.425040][T18128] handle_mm_fault+0x3b7/0xa90 [ 398.429790][T18128] __do_page_fault+0x5ef/0xda0 [ 398.434537][T18128] do_page_fault+0x71/0x57d [ 398.439016][T18128] ? page_fault+0x8/0x30 [ 398.443235][T18128] page_fault+0x1e/0x30 [ 398.447370][T18128] RIP: 0033:0x4303a6 [ 398.451250][T18128] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 46 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 bc 4b 64 00 85 c0 0f 84 [ 398.470835][T18128] RSP: 002b:00007fff6e214090 EFLAGS: 00010206 [ 398.476879][T18128] RAX: 0000000000019691 RBX: 0000000000714640 RCX: 0000000000008041 [ 398.484836][T18128] RDX: 0000555555d53930 RSI: 0000555555d5b970 RDI: 0000000000000003 [ 398.492782][T18128] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000555555d52940 [ 398.500728][T18128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000714698 [ 398.508674][T18128] R13: 0000000000714698 R14: 0000000000000000 R15: 0000000000002710 [ 398.522345][T18128] memory: usage 2800kB, limit 0kB, failcnt 70 [ 398.528504][T18128] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 398.536767][T18128] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 398.544231][T18128] Memory cgroup stats for /syz1: cache:288KB rss:80KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:80KB inactive_file:0KB active_file:0KB unevictable:0KB [ 398.544350][T18128] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=18128,uid=0 [ 398.544475][T18128] Memory cgroup out of memory: Killed process 18128 (syz-executor.1) total-vm:72448kB, anon-rss:68kB, file-rss:34828kB, shmem-rss:0kB [ 398.594920][ T1044] oom_reaper: reaped process 18128 (syz-executor.1), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 03:05:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x84, 0x8}], 0x10}, 0xfc) 03:05:21 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0x12000000]}, 0x2c) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:05:21 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:21 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:21 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:21 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:21 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0x12000000]}, 0x2c) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:05:21 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) [ 399.377045][T18201] IPVS: ftp: loaded support on port[0] = 21 [ 399.474116][T18202] IPVS: ftp: loaded support on port[0] = 21 [ 399.707281][T18201] chnl_net:caif_netlink_parms(): no params data found [ 399.807964][T18202] chnl_net:caif_netlink_parms(): no params data found [ 399.829084][T18201] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.836291][T18201] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.844287][T18201] device bridge_slave_0 entered promiscuous mode [ 399.914526][T18201] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.930213][T18201] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.938161][T18201] device bridge_slave_1 entered promiscuous mode [ 399.993896][T18206] IPVS: ftp: loaded support on port[0] = 21 [ 400.078157][T18201] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 400.089424][T18202] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.096895][T18202] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.104977][T18202] device bridge_slave_0 entered promiscuous mode [ 400.114083][T18201] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 400.128868][T18202] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.139802][T18202] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.148233][T18202] device bridge_slave_1 entered promiscuous mode [ 400.223779][T18201] team0: Port device team_slave_0 added [ 400.254682][T18202] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 400.264751][T18201] team0: Port device team_slave_1 added [ 400.326949][T18202] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 400.345862][T18208] IPVS: ftp: loaded support on port[0] = 21 [ 400.392934][T18201] device hsr_slave_0 entered promiscuous mode [ 400.430465][T18201] device hsr_slave_1 entered promiscuous mode [ 400.562457][T18202] team0: Port device team_slave_0 added [ 400.577715][T18201] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.584805][T18201] bridge0: port 2(bridge_slave_1) entered forwarding state [ 400.592161][T18201] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.599238][T18201] bridge0: port 1(bridge_slave_0) entered forwarding state [ 400.616159][T18202] team0: Port device team_slave_1 added [ 400.694609][T18206] chnl_net:caif_netlink_parms(): no params data found [ 400.723327][ T8454] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.731904][ T8454] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.792918][T18202] device hsr_slave_0 entered promiscuous mode [ 400.830570][T18202] device hsr_slave_1 entered promiscuous mode [ 400.963285][T18206] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.970712][T18206] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.978602][T18206] device bridge_slave_0 entered promiscuous mode [ 400.989103][T18206] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.996718][T18206] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.004775][T18206] device bridge_slave_1 entered promiscuous mode [ 401.112278][T18206] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 401.124789][T18206] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 401.228911][T18206] team0: Port device team_slave_0 added [ 401.248421][T18201] 8021q: adding VLAN 0 to HW filter on device bond0 [ 401.258452][T18206] team0: Port device team_slave_1 added [ 401.283288][T18201] 8021q: adding VLAN 0 to HW filter on device team0 [ 401.290883][T18208] chnl_net:caif_netlink_parms(): no params data found [ 401.387712][T15272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 401.395505][T15272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 401.434092][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 401.444669][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 401.453508][ T8454] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.460600][ T8454] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.468279][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 401.476985][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 401.485444][ T8454] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.492550][ T8454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.501720][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 401.566591][T18202] 8021q: adding VLAN 0 to HW filter on device bond0 [ 401.612978][T18206] device hsr_slave_0 entered promiscuous mode [ 401.660659][T18206] device hsr_slave_1 entered promiscuous mode [ 401.709362][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 401.728902][T18202] 8021q: adding VLAN 0 to HW filter on device team0 [ 401.793092][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 401.801118][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 401.808993][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 401.821018][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 401.882725][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 401.891624][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 401.900743][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 401.908952][T15162] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.916057][T15162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.925318][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 401.934251][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 401.943000][T15162] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.950091][T15162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.957876][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 401.967658][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 401.995362][T18201] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 402.008652][T18201] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 402.075392][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 402.083643][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 402.093190][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 402.104100][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 402.114401][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 402.123359][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 402.137908][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 402.214190][T18208] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.221333][T18208] bridge0: port 1(bridge_slave_0) entered disabled state [ 402.229266][T18208] device bridge_slave_0 entered promiscuous mode [ 402.243033][T18208] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.250164][T18208] bridge0: port 2(bridge_slave_1) entered disabled state [ 402.258078][T18208] device bridge_slave_1 entered promiscuous mode [ 402.268081][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 402.277256][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 402.286114][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 402.354274][T18201] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 402.380416][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 402.388354][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 402.397999][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 402.406839][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 402.415743][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 402.431566][T18208] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 402.444509][T18202] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 402.458380][T18202] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 402.504166][T18208] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 402.514607][T15272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 402.523075][T15272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 402.640844][T18208] team0: Port device team_slave_0 added [ 402.648068][T18208] team0: Port device team_slave_1 added [ 402.669937][T18206] 8021q: adding VLAN 0 to HW filter on device bond0 03:05:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x800000000002, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000001a0081522a38dd6bc25228e8499541e70014c838dfecff0e00fa0708c0b0bd59e72b35c0e701570c0b2e", 0x2e}], 0x1}, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000100)) socket$kcm(0x10, 0x2, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30e) [ 402.709171][T18202] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 402.778369][T18206] 8021q: adding VLAN 0 to HW filter on device team0 [ 402.822559][T18208] device hsr_slave_0 entered promiscuous mode [ 402.870686][T18208] device hsr_slave_1 entered promiscuous mode [ 402.913434][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 402.921214][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 403.019500][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 403.033524][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 403.043873][T15162] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.051021][T15162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 403.076227][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 403.085009][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 403.094665][T15162] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.101752][T15162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 403.109173][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 403.118293][T15162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 03:05:26 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 03:05:26 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:26 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x800000000002, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000001a0081522a38dd6bc25228e8499541e70014c838dfecff0e00fa0708c0b0bd59e72b35c0e701570c0b2e", 0x2e}], 0x1}, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000100)) socket$kcm(0x10, 0x2, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30e) [ 403.172708][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 403.190796][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 403.229419][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 403.253264][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 403.263560][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 03:05:26 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) [ 403.273600][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 403.295381][ T8454] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 03:05:26 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) [ 403.374435][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 403.390822][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 403.437536][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 403.460955][T18206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 403.561586][T18206] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 403.680407][T18208] 8021q: adding VLAN 0 to HW filter on device bond0 [ 403.704851][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 403.713200][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 403.724569][T18208] 8021q: adding VLAN 0 to HW filter on device team0 [ 403.747286][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 403.761234][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 403.775249][ T3486] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.782379][ T3486] bridge0: port 1(bridge_slave_0) entered forwarding state [ 403.852401][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 403.861062][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 403.870683][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 403.879661][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.886844][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state 03:05:26 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x800000000002, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000001a0081522a38dd6bc25228e8499541e70014c838dfecff0e00fa0708c0b0bd59e72b35c0e701570c0b2e", 0x2e}], 0x1}, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000100)) socket$kcm(0x10, 0x2, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30e) 03:05:26 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:26 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) [ 403.895799][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 403.904614][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 404.073152][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 404.092868][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 404.102044][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 404.111282][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 404.130961][T18208] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 404.156779][T18208] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 404.204450][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 404.217194][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 404.237913][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 404.275616][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 404.285978][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 404.356849][ T3486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 404.378032][T18208] 8021q: adding VLAN 0 to HW filter on device batadv0 03:05:27 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:27 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:27 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:27 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:27 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:27 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:27 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:27 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:27 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) gettid() socket$kcm(0x11, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000018008109e00f80ecdb4cb92e0a60032c000cd307e8bd6efb120009000e1014a00200000006000500fec0", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) 03:05:27 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x6, 0x61, 0x0, 0xa4}]}, &(0x7f0000000000)='Q\xa2\xa2\x11\xbbo-\x95\xd3\xc0I\x960(U\x06\t.\xc3\t\xa4\xd5\x99\x02_2\x01\r\xf8\xedxR\xc2\a\xc0\x17\x15k3\xfc\xe7\x9d\xea\xe7\x19M#\"N\xe4\xe4\xc5\xe3!\xfd\x80\xb7', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 03:05:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="2e0000001e000507edcc0345f675c3931532e55c84131e210080647e6394f20531d2000500fc3711404b480f0001", 0x2e}], 0x1}, 0x0) 03:05:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x6, 0x61, 0x0, 0xa4}]}, &(0x7f0000000000)='Q\xa2\xa2\x11\xbbo-\x95\xd3\xc0I\x960(U\x06\t.\xc3\t\xa4\xd5\x99\x02_2\x01\r\xf8\xedxR\xc2\a\xc0\x17\x15k3\xfc\xe7\x9d\xea\xe7\x19M#\"N\xe4\xe4\xc5\xe3!\xfd\x80\xb7', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 03:05:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="800000e700000000"], 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x8e9, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) r4 = openat$cgroup(r3, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 03:05:27 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:27 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:05:27 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) gettid() socket$kcm(0x11, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000018008109e00f80ecdb4cb92e0a60032c000cd307e8bd6efb120009000e1014a00200000006000500fec0", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 405.098070][T18315] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 03:05:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="2e0000001e000507edcc0345f675c3931532e55c84131e210080647e6394f20531d2000500fc3711404b480f0001", 0x2e}], 0x1}, 0x0) 03:05:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x6, 0x61, 0x0, 0xa4}]}, &(0x7f0000000000)='Q\xa2\xa2\x11\xbbo-\x95\xd3\xc0I\x960(U\x06\t.\xc3\t\xa4\xd5\x99\x02_2\x01\r\xf8\xedxR\xc2\a\xc0\x17\x15k3\xfc\xe7\x9d\xea\xe7\x19M#\"N\xe4\xe4\xc5\xe3!\xfd\x80\xb7', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 405.327126][T18334] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 03:05:28 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) gettid() socket$kcm(0x11, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000018008109e00f80ecdb4cb92e0a60032c000cd307e8bd6efb120009000e1014a00200000006000500fec0", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) 03:05:28 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) gettid() socket$kcm(0x11, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000018008109e00f80ecdb4cb92e0a60032c000cd307e8bd6efb120009000e1014a00200000006000500fec0", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) 03:05:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="2e0000001e000507edcc0345f675c3931532e55c84131e210080647e6394f20531d2000500fc3711404b480f0001", 0x2e}], 0x1}, 0x0) 03:05:28 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x51, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 03:05:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x6, 0x61, 0x0, 0xa4}]}, &(0x7f0000000000)='Q\xa2\xa2\x11\xbbo-\x95\xd3\xc0I\x960(U\x06\t.\xc3\t\xa4\xd5\x99\x02_2\x01\r\xf8\xedxR\xc2\a\xc0\x17\x15k3\xfc\xe7\x9d\xea\xe7\x19M#\"N\xe4\xe4\xc5\xe3!\xfd\x80\xb7', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 03:05:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="800000e700000000"], 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x8e9, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) r4 = openat$cgroup(r3, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) [ 405.562772][T18349] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 03:05:28 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x51, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 03:05:28 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) gettid() socket$kcm(0x11, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000018008109e00f80ecdb4cb92e0a60032c000cd307e8bd6efb120009000e1014a00200000006000500fec0", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) 03:05:28 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) gettid() socket$kcm(0x11, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000018008109e00f80ecdb4cb92e0a60032c000cd307e8bd6efb120009000e1014a00200000006000500fec0", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) 03:05:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="2e0000001e000507edcc0345f675c3931532e55c84131e210080647e6394f20531d2000500fc3711404b480f0001", 0x2e}], 0x1}, 0x0) 03:05:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="800000e700000000"], 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x8e9, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) r4 = openat$cgroup(r3, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 03:05:28 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) gettid() socket$kcm(0x11, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000018008109e00f80ecdb4cb92e0a60032c000cd307e8bd6efb120009000e1014a00200000006000500fec0", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) 03:05:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="800000e700000000"], 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x8e9, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) r4 = openat$cgroup(r3, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) [ 405.932326][T18372] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 03:05:28 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x51, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 03:05:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="800000e700000000"], 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x8e9, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) r4 = openat$cgroup(r3, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 03:05:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="800000e700000000"], 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x8e9, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) r4 = openat$cgroup(r3, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 03:05:29 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x51, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 03:05:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="800000e700000000"], 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x8e9, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) r4 = openat$cgroup(r3, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 03:05:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="800000e700000000"], 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x8e9, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) r4 = openat$cgroup(r3, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 03:05:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x4000000000005, 0x3, 0x100000001, 0x6}, 0x3c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r0, &(0x7f0000000300), 0x0}, 0x18) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740003, 0x0, 0x20820000, r1}, 0x3c) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000740)='cgroup.type\x00', 0x2, 0x0) 03:05:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="800000e700000000"], 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x8e9, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) r4 = openat$cgroup(r3, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 03:05:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="800000e700000000"], 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x8e9, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) r4 = openat$cgroup(r3, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 03:05:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="800000e700000000"], 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x8e9, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) r4 = openat$cgroup(r3, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 03:05:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x4000000000005, 0x3, 0x100000001, 0x6}, 0x3c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r0, &(0x7f0000000300), 0x0}, 0x18) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740003, 0x0, 0x20820000, r1}, 0x3c) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000740)='cgroup.type\x00', 0x2, 0x0) 03:05:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="800000e700000000"], 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x8e9, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) r4 = openat$cgroup(r3, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 03:05:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="800000e700000000"], 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x8e9, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) r4 = openat$cgroup(r3, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 03:05:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="800000e700000000"], 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x8e9, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) r4 = openat$cgroup(r3, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 03:05:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="800000e700000000"], 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x8e9, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) r4 = openat$cgroup(r3, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 03:05:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x4000000000005, 0x3, 0x100000001, 0x6}, 0x3c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r0, &(0x7f0000000300), 0x0}, 0x18) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740003, 0x0, 0x20820000, r1}, 0x3c) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000740)='cgroup.type\x00', 0x2, 0x0) 03:05:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x4000000000005, 0x3, 0x100000001, 0x6}, 0x3c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r0, &(0x7f0000000300), 0x0}, 0x18) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740003, 0x0, 0x20820000, r1}, 0x3c) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000740)='cgroup.type\x00', 0x2, 0x0) 03:05:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="800000e700000000"], 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x4, 0x7f, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x200, 0x0, 0x4, 0x3, 0x33c, 0xfff, 0x100000000, 0x2, 0x0, 0x0, 0x0, 0x8e9, 0x3, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) r4 = openat$cgroup(r3, &(0x7f0000000440)='\xfd\xffz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) 03:05:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x4000000000005, 0x3, 0x100000001, 0x6}, 0x3c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r0, &(0x7f0000000300), 0x0}, 0x18) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740003, 0x0, 0x20820000, r1}, 0x3c) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000740)='cgroup.type\x00', 0x2, 0x0) 03:05:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x4000000000005, 0x3, 0x100000001, 0x6}, 0x3c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r0, &(0x7f0000000300), 0x0}, 0x18) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740003, 0x0, 0x20820000, r1}, 0x3c) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000740)='cgroup.type\x00', 0x2, 0x0) 03:05:30 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x4000000000005, 0x3, 0x100000001, 0x6}, 0x3c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r0, &(0x7f0000000300), 0x0}, 0x18) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740003, 0x0, 0x20820000, r1}, 0x3c) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000740)='cgroup.type\x00', 0x2, 0x0) 03:05:30 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) sendmsg$kcm(r0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0) 03:05:30 executing program 3: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffffd4, 0x0, 0x0, 0x10}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195, 0x0, 0x0, [0x42]}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0xe, 0xf2, &(0x7f0000000300), 0x0, 0x1a3}, 0x28) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 03:05:30 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000009140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[{0x30, 0x84, 0x1, "f826299b9fe32ddd83429d0f8e97a91849be2857da119c967b"}], 0x30}, 0x0) 03:05:30 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x4000000000005, 0x3, 0x100000001, 0x6}, 0x3c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r0, &(0x7f0000000300), 0x0}, 0x18) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740003, 0x0, 0x20820000, r1}, 0x3c) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000740)='cgroup.type\x00', 0x2, 0x0) 03:05:30 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) sendmsg$kcm(r0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0) 03:05:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x4000000000005, 0x3, 0x100000001, 0x6}, 0x3c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r0, &(0x7f0000000300), 0x0}, 0x18) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740003, 0x0, 0x20820000, r1}, 0x3c) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000740)='cgroup.type\x00', 0x2, 0x0) 03:05:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x36, 0xed, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.max\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) r3 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) gettid() r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x98) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x1, 0x0, 0x0, 0xfffffffffffffdf3}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 03:05:30 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000009140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[{0x30, 0x84, 0x1, "f826299b9fe32ddd83429d0f8e97a91849be2857da119c967b"}], 0x30}, 0x0) 03:05:30 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x4000000000005, 0x3, 0x100000001, 0x6}, 0x3c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000005c0)={r0, &(0x7f0000000300), 0x0}, 0x18) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740003, 0x0, 0x20820000, r1}, 0x3c) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000740)='cgroup.type\x00', 0x2, 0x0) 03:05:30 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) sendmsg$kcm(r0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0) 03:05:30 executing program 3: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffffd4, 0x0, 0x0, 0x10}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195, 0x0, 0x0, [0x42]}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0xe, 0xf2, &(0x7f0000000300), 0x0, 0x1a3}, 0x28) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 03:05:30 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e00000010008103e45ae087185082cf0324b0eba06ec4000023000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 03:05:30 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000009140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[{0x30, 0x84, 0x1, "f826299b9fe32ddd83429d0f8e97a91849be2857da119c967b"}], 0x30}, 0x0) 03:05:30 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x14, &(0x7f0000000080), 0x2cb) recvmsg$kcm(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) [ 408.163100][ T8485] device bridge_slave_1 left promiscuous mode [ 408.169317][ T8485] bridge0: port 2(bridge_slave_1) entered disabled state 03:05:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x36, 0xed, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.max\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) r3 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) gettid() r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x98) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x1, 0x0, 0x0, 0xfffffffffffffdf3}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 03:05:31 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000009140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[{0x30, 0x84, 0x1, "f826299b9fe32ddd83429d0f8e97a91849be2857da119c967b"}], 0x30}, 0x0) 03:05:31 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) sendmsg$kcm(r0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0) 03:05:31 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e00000010008103e45ae087185082cf0324b0eba06ec4000023000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 03:05:31 executing program 3: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffffd4, 0x0, 0x0, 0x10}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195, 0x0, 0x0, [0x42]}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0xe, 0xf2, &(0x7f0000000300), 0x0, 0x1a3}, 0x28) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 408.322776][ T8485] device bridge_slave_0 left promiscuous mode [ 408.329055][ T8485] bridge0: port 1(bridge_slave_0) entered disabled state 03:05:31 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e00000010008103e45ae087185082cf0324b0eba06ec4000023000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 408.444670][ T8485] device bridge_slave_1 left promiscuous mode [ 408.460700][ T8485] bridge0: port 2(bridge_slave_1) entered disabled state 03:05:31 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e00000010008103e45ae087185082cf0324b0eba06ec4000023000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 03:05:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x36, 0xed, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.max\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) r3 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) gettid() r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x98) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x1, 0x0, 0x0, 0xfffffffffffffdf3}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 03:05:31 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e00000010008103e45ae087185082cf0324b0eba06ec4000023000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 408.564125][ T8485] device bridge_slave_0 left promiscuous mode [ 408.573297][ T8485] bridge0: port 1(bridge_slave_0) entered disabled state 03:05:31 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e00000010008103e45ae087185082cf0324b0eba06ec4000023000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 408.663533][ T8485] device bridge_slave_1 left promiscuous mode [ 408.694266][ T8485] bridge0: port 2(bridge_slave_1) entered disabled state 03:05:31 executing program 3: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) socket$kcm(0x29, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffffd4, 0x0, 0x0, 0x10}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195, 0x0, 0x0, [0x42]}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0xe, 0xf2, &(0x7f0000000300), 0x0, 0x1a3}, 0x28) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 408.813317][ T8485] device bridge_slave_0 left promiscuous mode [ 408.819619][ T8485] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.933752][ T8485] device bridge_slave_1 left promiscuous mode [ 408.939994][ T8485] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.011374][ T8485] device bridge_slave_0 left promiscuous mode [ 409.017575][ T8485] bridge0: port 1(bridge_slave_0) entered disabled state 03:05:31 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e00000010008103e45ae087185082cf0324b0eba06ec4000023000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 03:05:31 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x14, &(0x7f0000000080), 0x2cb) recvmsg$kcm(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 03:05:31 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e00000010008103e45ae087185082cf0324b0eba06ec4000023000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 03:05:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x36, 0xed, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.max\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) r3 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) gettid() r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x98) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x1, 0x0, 0x0, 0xfffffffffffffdf3}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 03:05:31 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e00000010008103e45ae087185082cf0324b0eba06ec4000023000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 03:05:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x36, 0xed, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.max\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) r3 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) gettid() r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x98) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x1, 0x0, 0x0, 0xfffffffffffffdf3}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) [ 409.061968][ T8485] device bridge_slave_1 left promiscuous mode [ 409.068134][ T8485] bridge0: port 2(bridge_slave_1) entered disabled state 03:05:32 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x14, &(0x7f0000000080), 0x2cb) recvmsg$kcm(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 03:05:32 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e00000010008103e45ae087185082cf0324b0eba06ec4000023000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 409.173417][ T8485] device bridge_slave_0 left promiscuous mode [ 409.185701][ T8485] bridge0: port 1(bridge_slave_0) entered disabled state 03:05:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x36, 0xed, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.max\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) r3 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) gettid() r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x98) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x1, 0x0, 0x0, 0xfffffffffffffdf3}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) [ 409.253247][ T8485] device bridge_slave_1 left promiscuous mode 03:05:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x36, 0xed, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.max\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) r3 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) gettid() r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x98) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x1, 0x0, 0x0, 0xfffffffffffffdf3}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 03:05:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x36, 0xed, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.max\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) r3 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) gettid() r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x98) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x1, 0x0, 0x0, 0xfffffffffffffdf3}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) [ 409.296290][ T8485] bridge0: port 2(bridge_slave_1) entered disabled state 03:05:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x36, 0xed, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.max\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) r3 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) gettid() r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x98) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x1, 0x0, 0x0, 0xfffffffffffffdf3}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) [ 409.393583][ T8485] device bridge_slave_0 left promiscuous mode [ 409.401007][ T8485] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.482556][ T8485] device bridge_slave_1 left promiscuous mode [ 409.488746][ T8485] bridge0: port 2(bridge_slave_1) entered disabled state 03:05:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x36, 0xed, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.max\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) r3 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) gettid() r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x98) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x1, 0x0, 0x0, 0xfffffffffffffdf3}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) [ 409.611145][ T8485] device bridge_slave_0 left promiscuous mode [ 409.619744][ T8485] bridge0: port 1(bridge_slave_0) entered disabled state 03:05:32 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x14, &(0x7f0000000080), 0x2cb) recvmsg$kcm(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 03:05:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x36, 0xed, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.max\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) r3 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) gettid() r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x98) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x1, 0x0, 0x0, 0xfffffffffffffdf3}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 03:05:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x36, 0xed, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.max\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) r3 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) gettid() r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x98) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x1, 0x0, 0x0, 0xfffffffffffffdf3}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 03:05:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x36, 0xed, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.max\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) r3 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) gettid() r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x98) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x1, 0x0, 0x0, 0xfffffffffffffdf3}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 03:05:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x36, 0xed, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.max\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) r3 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) gettid() r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x98) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x1, 0x0, 0x0, 0xfffffffffffffdf3}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 03:05:32 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x14, &(0x7f0000000080), 0x2cb) recvmsg$kcm(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 03:05:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x36, 0xed, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.max\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) r3 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) gettid() r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x98) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x1, 0x0, 0x0, 0xfffffffffffffdf3}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 03:05:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x36, 0xed, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.max\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) r3 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) gettid() r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x98) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x1, 0x0, 0x0, 0xfffffffffffffdf3}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 03:05:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x36, 0xed, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.max\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) r3 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) gettid() r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x98) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x1, 0x0, 0x0, 0xfffffffffffffdf3}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 03:05:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r1, 0x1, r1, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r1, &(0x7f0000000080)="e85558b263b7c88d8cae2a0a1e5289", 0x0}, 0x18) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8953, &(0x7f0000000040)=0x2) 03:05:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="230000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7", 0x23}], 0x1}, 0x0) 03:05:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x36, 0xed, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.max\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) r3 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) gettid() r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x98) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x1, 0x0, 0x0, 0xfffffffffffffdf3}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 03:05:33 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x14, &(0x7f0000000080), 0x2cb) recvmsg$kcm(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 03:05:33 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='#\xd9\'vmnet0\x00') r1 = socket$kcm(0x10, 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x40, 0x7, 0x4000, 0x80, 0x0, 0x0, 0x45906, 0x8, 0x9, 0x6, 0x5a, 0x9, 0x5, 0x6, 0x4, 0x8, 0x40000, 0x6, 0xf4, 0x10000, 0x3f, 0x4, 0xfff, 0x3, 0x0, 0x6, 0x8, 0x6, 0x5, 0x1, 0x5, 0x2, 0x7, 0x0, 0xfffffffffffffffa, 0x3, 0x0, 0x100, 0x2, @perf_config_ext={0x7, 0x5}, 0x280, 0x8, 0xb48a, 0x3, 0x800, 0x9, 0xffffffffffffffe8}, 0xffffffffffffff9c, 0xb, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x6, 0x1d, 0x9, 0x7, 0x0, 0x797, 0x80000, 0x1, 0x6, 0x10000, 0x2, 0x2, 0x1, 0x0, 0x81, 0x9c71, 0x6, 0x7, 0x3, 0xdb7, 0xbb, 0x1000, 0x80000001, 0x0, 0x8, 0x1, 0x800, 0x4, 0xd2, 0x200, 0x56, 0x9d, 0x6c, 0xa4, 0x1, 0x64ca, 0x0, 0xd3b, 0x6, @perf_bp={&(0x7f0000000080)}, 0x2080, 0x8, 0x8, 0x0, 0xd6, 0x8001, 0x7}, 0x0, 0x10, r3, 0x1) close(0xffffffffffffffff) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c00810ce00f80ecdb4cb9f207c804a00d00000088000afb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 03:05:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="230000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7", 0x23}], 0x1}, 0x0) 03:05:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @typedef={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/237, 0x36, 0xed, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='memory.max\x00') r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) getpid() write$cgroup_pid(r2, &(0x7f0000000400), 0x12) r3 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) gettid() r4 = gettid() write$cgroup_pid(r3, &(0x7f0000000500)=r4, 0x12) r5 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x98) write$cgroup_pid(r3, &(0x7f0000000540), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x8, 0x1, 0x0, 0x0, 0xfffffffffffffdf3}, 0x20) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x3, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 03:05:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r1, 0x1, r1, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r1, &(0x7f0000000080)="e85558b263b7c88d8cae2a0a1e5289", 0x0}, 0x18) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8953, &(0x7f0000000040)=0x2) 03:05:33 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x14, &(0x7f0000000080), 0x2cb) recvmsg$kcm(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 03:05:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="230000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7", 0x23}], 0x1}, 0x0) 03:05:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r1, 0x1, r1, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r1, &(0x7f0000000080)="e85558b263b7c88d8cae2a0a1e5289", 0x0}, 0x18) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8953, &(0x7f0000000040)=0x2) 03:05:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="230000002e000104bfa9d345e7eb8d99c1ffffffffffffff43bc59198183fe204ee2d7", 0x23}], 0x1}, 0x0) 03:05:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:05:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:05:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:05:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 426.802474][ T8485] device hsr_slave_1 left promiscuous mode [ 426.855857][ T8485] device hsr_slave_0 left promiscuous mode [ 426.915777][ T8485] team0 (unregistering): Port device team_slave_1 removed [ 426.929783][ T8485] team0 (unregistering): Port device team_slave_0 removed [ 426.945497][ T8485] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 426.999448][ T8485] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 427.100601][ T8485] bond0 (unregistering): Released all slaves [ 427.243414][ T8485] device hsr_slave_1 left promiscuous mode [ 427.285892][ T8485] device hsr_slave_0 left promiscuous mode [ 427.345263][ T8485] team0 (unregistering): Port device team_slave_1 removed [ 427.359423][ T8485] team0 (unregistering): Port device team_slave_0 removed [ 427.373010][ T8485] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 427.406150][ T8485] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 427.508160][ T8485] bond0 (unregistering): Released all slaves [ 427.693488][ T8485] device hsr_slave_1 left promiscuous mode [ 427.743194][ T8485] device hsr_slave_0 left promiscuous mode [ 427.785449][ T8485] team0 (unregistering): Port device team_slave_1 removed [ 427.802465][ T8485] team0 (unregistering): Port device team_slave_0 removed [ 427.813878][ T8485] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 427.857852][ T8485] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 427.959599][ T8485] bond0 (unregistering): Released all slaves [ 428.103823][ T8485] device hsr_slave_1 left promiscuous mode [ 428.146437][ T8485] device hsr_slave_0 left promiscuous mode [ 428.205844][ T8485] team0 (unregistering): Port device team_slave_1 removed [ 428.220829][ T8485] team0 (unregistering): Port device team_slave_0 removed [ 428.234181][ T8485] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 428.300430][ T8485] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 428.409497][ T8485] bond0 (unregistering): Released all slaves [ 428.563606][ T8485] device hsr_slave_1 left promiscuous mode [ 428.606316][ T8485] device hsr_slave_0 left promiscuous mode [ 428.665147][ T8485] team0 (unregistering): Port device team_slave_1 removed [ 428.677675][ T8485] team0 (unregistering): Port device team_slave_0 removed [ 428.689828][ T8485] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 428.726839][ T8485] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 428.817042][ T8485] bond0 (unregistering): Released all slaves [ 428.987768][ T8485] device hsr_slave_1 left promiscuous mode [ 429.044396][ T8485] device hsr_slave_0 left promiscuous mode [ 429.104126][ T8485] team0 (unregistering): Port device team_slave_1 removed [ 429.115937][ T8485] team0 (unregistering): Port device team_slave_0 removed [ 429.129446][ T8485] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 429.160146][ T8485] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 429.258462][ T8485] bond0 (unregistering): Released all slaves [ 429.393791][ T8485] device hsr_slave_1 left promiscuous mode [ 429.433739][ T8485] device hsr_slave_0 left promiscuous mode [ 429.473800][ T8485] team0 (unregistering): Port device team_slave_1 removed [ 429.487591][ T8485] team0 (unregistering): Port device team_slave_0 removed [ 429.501952][ T8485] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 429.537105][ T8485] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 429.647958][ T8485] bond0 (unregistering): Released all slaves [ 429.794233][T18649] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.5'. 03:05:52 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x4, 0x4, 0xd}, 0x3c) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x5}, 0x10) 03:05:52 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x4c, 0xffffffffffffffbd) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 03:05:52 executing program 2: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x24000000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_int(r0, 0x0, 0x2, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000002b00)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000002980)="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", 0xfb}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r4, &(0x7f0000002900)={&(0x7f0000001440)=@can, 0x80, &(0x7f0000003b40)=[{&(0x7f00000014c0)=""/163, 0xa3}, {&(0x7f0000001600)=""/175, 0xaf}, {&(0x7f00000016c0)=""/144, 0x90}, {&(0x7f0000001780)=""/118, 0x76}, {&(0x7f0000001800)=""/90, 0x5a}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000002880)=""/122, 0x7a}, {&(0x7f0000002b40)=""/4096, 0x1000}, {&(0x7f0000001580)=""/9, 0x9}], 0x9, &(0x7f0000003c00)=""/236, 0xec}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000003d00)={0x8, 0x7, &(0x7f0000000380)=@raw=[@ldst={0x2, 0x0, 0x0, 0x0, 0x0, 0x30, 0xfffffffffffffff0}, @alu={0x7, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x100}, @call={0x85, 0x0, 0x0, 0x3c}, @jmp={0x5, 0x8, 0x6, 0x1, 0x3, 0xfffffffffffffff4, 0x1}, @map={0x18, 0xf, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2}], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002a80)={0x4, 0x2, 0x9}, 0x10}, 0x70) socket$kcm(0xa, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0xa01e, 0x8, 0x3, 0x0, 0x81, 0x41000, 0xa, 0xf4, 0xffffffff, 0xcc, 0x100, 0x4, 0x4, 0x3da, 0x9, 0x401, 0x5, 0x2, 0x3, 0x7, 0x4c3e46b7, 0x6, 0x7, 0x8001, 0x7, 0x4, 0x7fff, 0x9da, 0x4, 0x4, 0x2, 0x3, 0x81, 0x1, 0x7, 0x0, 0xe2, 0x5, @perf_bp={0x0, 0x2}, 0x4, 0x0, 0x1000, 0x1, 0x4, 0x10000, 0x800}, r3, 0x2, r2, 0x3) 03:05:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1d) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x2}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x16b) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8916, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000100)={r3}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='lo/\x00'}, 0x10) 03:05:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r1, 0x1, r1, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r1, &(0x7f0000000080)="e85558b263b7c88d8cae2a0a1e5289", 0x0}, 0x18) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8953, &(0x7f0000000040)=0x2) 03:05:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r1, 0x1, r1, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r1, &(0x7f0000000080)="e85558b263b7c88d8cae2a0a1e5289", 0x0}, 0x18) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8953, &(0x7f0000000040)=0x2) [ 430.028572][T18683] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.2'. 03:05:52 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x4c, 0xffffffffffffffbd) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 03:05:53 executing program 2: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x24000000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_int(r0, 0x0, 0x2, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000002b00)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000002980)="fb0000002c00015bbfa9d345e7eb8d99c1ffffff0e00000043050c006000000000e2d70800000006000008b6000000801d5291636b48880665c2388d902e5ed76b8c674500000000affa33021eb82169b94b59829626cd8bb72935c922974adced71c22b987fa68c7bb731c5f64e93ea793c262f67b56acbb4bac0c47df9d0ca9bd5ad8a04c4437e99c2677d9d3ffd47893808c33b047f720f4e89978112320828c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376094129bfd512d5160d7f1b0f47d951f5f7a371a861b9390ddbad53e9b678168ac8d157a656737a7ac0226d366ccec93f9f0700", 0xfb}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r4, &(0x7f0000002900)={&(0x7f0000001440)=@can, 0x80, &(0x7f0000003b40)=[{&(0x7f00000014c0)=""/163, 0xa3}, {&(0x7f0000001600)=""/175, 0xaf}, {&(0x7f00000016c0)=""/144, 0x90}, {&(0x7f0000001780)=""/118, 0x76}, {&(0x7f0000001800)=""/90, 0x5a}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000002880)=""/122, 0x7a}, {&(0x7f0000002b40)=""/4096, 0x1000}, {&(0x7f0000001580)=""/9, 0x9}], 0x9, &(0x7f0000003c00)=""/236, 0xec}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000003d00)={0x8, 0x7, &(0x7f0000000380)=@raw=[@ldst={0x2, 0x0, 0x0, 0x0, 0x0, 0x30, 0xfffffffffffffff0}, @alu={0x7, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x100}, @call={0x85, 0x0, 0x0, 0x3c}, @jmp={0x5, 0x8, 0x6, 0x1, 0x3, 0xfffffffffffffff4, 0x1}, @map={0x18, 0xf, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2}], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002a80)={0x4, 0x2, 0x9}, 0x10}, 0x70) socket$kcm(0xa, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0xa01e, 0x8, 0x3, 0x0, 0x81, 0x41000, 0xa, 0xf4, 0xffffffff, 0xcc, 0x100, 0x4, 0x4, 0x3da, 0x9, 0x401, 0x5, 0x2, 0x3, 0x7, 0x4c3e46b7, 0x6, 0x7, 0x8001, 0x7, 0x4, 0x7fff, 0x9da, 0x4, 0x4, 0x2, 0x3, 0x81, 0x1, 0x7, 0x0, 0xe2, 0x5, @perf_bp={0x0, 0x2}, 0x4, 0x0, 0x1000, 0x1, 0x4, 0x10000, 0x800}, r3, 0x2, r2, 0x3) 03:05:53 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x4, 0x4, 0xd}, 0x3c) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x5}, 0x10) 03:05:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r1, 0x1, r1, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r1, &(0x7f0000000080)="e85558b263b7c88d8cae2a0a1e5289", 0x0}, 0x18) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8953, &(0x7f0000000040)=0x2) 03:05:53 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x4c, 0xffffffffffffffbd) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 03:05:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x8000, 0x3, 0x27b, 0x25b0, 0x0, 0x7, 0x400, 0x1, 0x9, 0x4, 0x8000, 0x0, 0x9, 0x7, 0x4, 0x3, 0x8, 0xffffffffffffdc81, 0x2, 0x5, 0x7f, 0x3, 0x32c5, 0x2, 0x8, 0x401, 0x9, 0x5, 0x6, 0x49e325dc, 0x7fff, 0x10001, 0x81, 0x2b7, 0x9, 0x1000, 0x0, 0x4, 0x0, @perf_config_ext={0x5, 0x7}, 0x8003, 0x6, 0x8, 0x0, 0x9ba1, 0xb8, 0x3}, r1, 0x1, r1, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r1, &(0x7f0000000200)="d7000000941b67d77d56e1cbe5c3b7d492dd6801fbef8fca99d96cb89a20fbd18e348ede567665d1d90e0bd427b17725b881ac0502bf008e6900eb5f55c0f5fe57e023065f7a93cfa7afa7b8979358c0e1d26920f1cfe94a14f954e54e7d548564ba4f8719fa29a80a4a8b8a0aa10374056c", 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)="d2f3e7d9ddc748a58b01e18528c816094d9844ae7e26c2df0a29c2a149bf0262e7a8ed6464ac79dae440fa52016aeccd493e70f7a50c6b72844a7c81de782487bffb088fe4fc22c3607296d331f3a685b7c304888a019edc642b5a0b470b3bf1b0260cb0c56221cf6e4ae01d4d19d4e5198c49191e61f27e14c3cc55c133779c1deb10271233ed8aca56fb95f0ac000574fb3bc37a90db3803a051133d17f24a4420e4b1ba060c8f665d1be2b5fb547de9edd7", 0xb3}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r1, &(0x7f0000000080)="e85558b263b7c88d8cae2a0a1e5289", 0x0}, 0x18) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000600)}, 0x24000001) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8953, &(0x7f0000000040)=0x2) [ 430.332607][T18708] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.2'. 03:05:53 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x4, 0x4, 0xd}, 0x3c) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x5}, 0x10) 03:05:53 executing program 2: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x24000000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_int(r0, 0x0, 0x2, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000002b00)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000002980)="fb0000002c00015bbfa9d345e7eb8d99c1ffffff0e00000043050c006000000000e2d70800000006000008b6000000801d5291636b48880665c2388d902e5ed76b8c674500000000affa33021eb82169b94b59829626cd8bb72935c922974adced71c22b987fa68c7bb731c5f64e93ea793c262f67b56acbb4bac0c47df9d0ca9bd5ad8a04c4437e99c2677d9d3ffd47893808c33b047f720f4e89978112320828c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376094129bfd512d5160d7f1b0f47d951f5f7a371a861b9390ddbad53e9b678168ac8d157a656737a7ac0226d366ccec93f9f0700", 0xfb}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r4, &(0x7f0000002900)={&(0x7f0000001440)=@can, 0x80, &(0x7f0000003b40)=[{&(0x7f00000014c0)=""/163, 0xa3}, {&(0x7f0000001600)=""/175, 0xaf}, {&(0x7f00000016c0)=""/144, 0x90}, {&(0x7f0000001780)=""/118, 0x76}, {&(0x7f0000001800)=""/90, 0x5a}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000002880)=""/122, 0x7a}, {&(0x7f0000002b40)=""/4096, 0x1000}, {&(0x7f0000001580)=""/9, 0x9}], 0x9, &(0x7f0000003c00)=""/236, 0xec}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000003d00)={0x8, 0x7, &(0x7f0000000380)=@raw=[@ldst={0x2, 0x0, 0x0, 0x0, 0x0, 0x30, 0xfffffffffffffff0}, @alu={0x7, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x100}, @call={0x85, 0x0, 0x0, 0x3c}, @jmp={0x5, 0x8, 0x6, 0x1, 0x3, 0xfffffffffffffff4, 0x1}, @map={0x18, 0xf, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2}], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002a80)={0x4, 0x2, 0x9}, 0x10}, 0x70) socket$kcm(0xa, 0x5, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0xa01e, 0x8, 0x3, 0x0, 0x81, 0x41000, 0xa, 0xf4, 0xffffffff, 0xcc, 0x100, 0x4, 0x4, 0x3da, 0x9, 0x401, 0x5, 0x2, 0x3, 0x7, 0x4c3e46b7, 0x6, 0x7, 0x8001, 0x7, 0x4, 0x7fff, 0x9da, 0x4, 0x4, 0x2, 0x3, 0x81, 0x1, 0x7, 0x0, 0xe2, 0x5, @perf_bp={0x0, 0x2}, 0x4, 0x0, 0x1000, 0x1, 0x4, 0x10000, 0x800}, r3, 0x2, r2, 0x3) 03:05:53 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x4c, 0xffffffffffffffbd) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 03:05:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1d) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x2}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="64b7da6beff203080000f84654fbe26c0bfa16d67a4180b228edc97825c90c3c2df6c5c227d9baea6c646d4049b6575de1dd214464a4d3818ec5c071516adb11b13197346b31f0cdea8c60c99d7ae8efe9f806e50fbf4fe1abf162bff228db5c108f353ae4560b80fa98b2b794d73d72a51ecb879029d104ecdbeaf1a74b489b3f2f8c897f411f3cf10beef4edac2ea5b486f3cd6066ec71445bdb984b1cfe2f2dbe63595af5379b373cdbdd45ace23869bf38dda0ff0f57aabae8ddcb8ab13453fec7fb822e41f19d78f7008000000000000003cc34dfd81ab9b0f5d9cae55f5303bf8449da2cbea444178fb3a76cc50261ebb5352d38a80b9b64b8518491be48e354e1c3112cfb15b41b8a5a4319d85e33e4f0b913bc42ed61e3560bdead8fb9f8e58a7a7ea911a0568be2c936e7b00dbaf0d63387112c7c1ed6934877e92972f17063b0b066b146d0023b8fa061c57d19485bbdf3a25ec48fd439008371fd1501f2d0ee9b19c2e2c9ba"], 0x16b) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8916, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000100)={r3}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='lo/\x00'}, 0x10) 03:05:53 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x4, 0x4, 0xd}, 0x3c) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x5}, 0x10) [ 430.731057][T18734] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.2'. [ 430.767029][ T8485] ------------[ cut here ]------------ 03:05:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1d) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x2}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x16b) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8916, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000100)={r3}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='lo/\x00'}, 0x10) [ 430.774191][ T8485] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x90 [ 430.785247][ T8485] WARNING: CPU: 1 PID: 8485 at lib/debugobjects.c:325 debug_print_object+0x168/0x250 [ 430.794720][ T8485] Kernel panic - not syncing: panic_on_warn set ... [ 430.801314][ T8485] CPU: 1 PID: 8485 Comm: kworker/u4:5 Not tainted 5.2.0-rc2+ #20 [ 430.809050][ T8485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.819096][ T8485] Workqueue: netns cleanup_net [ 430.823872][ T8485] Call Trace: [ 430.827186][ T8485] dump_stack+0x172/0x1f0 [ 430.831531][ T8485] ? debug_print_object+0x160/0x250 [ 430.836725][ T8485] panic+0x2cb/0x744 [ 430.840621][ T8485] ? __warn_printk+0xf3/0xf3 [ 430.845228][ T8485] ? debug_print_object+0x168/0x250 [ 430.850420][ T8485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.856653][ T8485] ? __warn.cold+0x5/0x4d [ 430.860979][ T8485] ? __warn+0xe8/0x1d0 [ 430.865057][ T8485] ? debug_print_object+0x168/0x250 [ 430.868772][ T3879] kobject: 'loop0' (00000000213a4ff8): kobject_uevent_env [ 430.870274][ T8485] __warn.cold+0x20/0x4d 03:05:53 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1d) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x2}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x16b) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8916, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000100)={r3}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='lo/\x00'}, 0x10) 03:05:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1d) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x2}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="64b7da6beff203080000f84654fbe26c0bfa16d67a4180b228edc97825c90c3c2df6c5c227d9baea6c646d4049b6575de1dd214464a4d3818ec5c071516adb11b13197346b31f0cdea8c60c99d7ae8efe9f806e50fbf4fe1abf162bff228db5c108f353ae4560b80fa98b2b794d73d72a51ecb879029d104ecdbeaf1a74b489b3f2f8c897f411f3cf10beef4edac2ea5b486f3cd6066ec71445bdb984b1cfe2f2dbe63595af5379b373cdbdd45ace23869bf38dda0ff0f57aabae8ddcb8ab13453fec7fb822e41f19d78f7008000000000000003cc34dfd81ab9b0f5d9cae55f5303bf8449da2cbea444178fb3a76cc50261ebb5352d38a80b9b64b8518491be48e354e1c3112cfb15b41b8a5a4319d85e33e4f0b913bc42ed61e3560bdead8fb9f8e58a7a7ea911a0568be2c936e7b00dbaf0d63387112c7c1ed6934877e92972f17063b0b066b146d0023b8fa061c57d19485bbdf3a25ec48fd439008371fd1501f2d0ee9b19c2e2c9ba"], 0x16b) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8916, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000100)={r3}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='lo/\x00'}, 0x10) [ 430.870287][ T8485] ? debug_print_object+0x168/0x250 [ 430.870298][ T8485] report_bug+0x263/0x2b0 [ 430.870313][ T8485] do_error_trap+0x11b/0x200 [ 430.870329][ T8485] do_invalid_op+0x37/0x50 [ 430.900091][ T8485] ? debug_print_object+0x168/0x250 [ 430.901620][ T3879] kobject: 'loop0' (00000000213a4ff8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 430.905280][ T8485] invalid_op+0x14/0x20 [ 430.905292][ T8485] RIP: 0010:debug_print_object+0x168/0x250 03:05:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1d) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x2}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x16b) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8916, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000100)={r3}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='lo/\x00'}, 0x10) [ 430.905309][ T8485] Code: dd 00 cb a4 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 00 cb a4 87 48 c7 c7 a0 c0 a4 87 e8 e6 6d 0d fe <0f> 0b 83 05 fb 5d 4b 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 430.944927][ T8485] RSP: 0018:ffff888069ca7838 EFLAGS: 00010086 [ 430.950985][ T8485] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 430.958948][ T8485] RDX: 0000000000000000 RSI: ffffffff815ac7e6 RDI: ffffed100d394ef9 [ 430.966928][ T8485] RBP: ffff888069ca7878 R08: ffff8880a44b25c0 R09: ffffed1015d240f1 [ 430.974897][ T8485] R10: ffffed1015d240f0 R11: ffff8880ae920787 R12: 0000000000000001 [ 430.982862][ T8485] R13: ffffffff88bad160 R14: ffffffff81603830 R15: ffff8880930996e0 [ 430.990845][ T8485] ? calc_wheel_index+0x220/0x220 [ 430.995871][ T8485] ? vprintk_func+0x86/0x189 [ 431.000478][ T8485] ? debug_print_object+0x168/0x250 [ 431.005670][ T8485] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 431.011492][ T8485] debug_check_no_obj_freed+0x29f/0x464 [ 431.017053][ T8485] kfree+0xbd/0x220 [ 431.020874][ T8485] kvfree+0x61/0x70 [ 431.024712][ T8485] netdev_freemem+0x4c/0x60 [ 431.028822][ T3879] kobject: 'loop4' (00000000696248ea): kobject_uevent_env [ 431.029246][ T8485] netdev_release+0x86/0xb0 [ 431.036780][T18748] kobject: 'nr0' (00000000a034e6d4): kobject_add_internal: parent: 'net', set: 'devices' [ 431.040817][ T8485] ? xps_cpus_store+0x2b0/0x2b0 [ 431.040832][ T8485] device_release+0x7a/0x210 [ 431.040847][ T8485] kobject_put.cold+0x289/0x2e6 [ 431.040860][ T8485] netdev_run_todo+0x53b/0x7c0 [ 431.040873][ T8485] ? register_netdev+0x50/0x50 [ 431.040885][ T8485] ? unregister_netdevice_queue+0x1d2/0x2c0 [ 431.040899][ T8485] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 431.040911][ T8485] ? net_set_todo+0xbf/0x150 [ 431.040925][ T8485] rtnl_unlock+0xe/0x10 [ 431.040937][ T8485] default_device_exit_batch+0x358/0x410 [ 431.040957][ T8485] ? unregister_netdevice_many+0x50/0x50 [ 431.075491][ T3879] kobject: 'loop4' (00000000696248ea): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 431.080499][ T8485] ? default_device_exit+0x203/0x290 [ 431.080512][ T8485] ? do_wait_intr_irq+0x2b0/0x2b0 [ 431.080525][ T8485] ? rtnl_unlock+0xe/0x10 [ 431.080535][ T8485] ? unregister_netdevice_many+0x50/0x50 [ 431.080546][ T8485] ? dev_change_net_namespace+0xc70/0xc70 [ 431.080561][ T8485] ops_exit_list.isra.0+0xfc/0x150 [ 431.080578][ T8485] cleanup_net+0x3fb/0x960 [ 431.152241][ T8485] ? netns_install+0x1d0/0x1d0 [ 431.157049][ T8485] process_one_work+0x989/0x1790 [ 431.162100][ T8485] ? pwq_dec_nr_in_flight+0x320/0x320 [ 431.167468][ T8485] ? lock_acquire+0x16f/0x3f0 [ 431.172152][ T8485] worker_thread+0x98/0xe40 [ 431.176659][ T8485] kthread+0x354/0x420 [ 431.180721][ T8485] ? process_one_work+0x1790/0x1790 [ 431.185910][ T8485] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 431.192159][ T8485] ret_from_fork+0x24/0x30 [ 431.196573][ T8485] [ 431.196578][ T8485] ====================================================== [ 431.196584][ T8485] WARNING: possible circular locking dependency detected [ 431.196587][ T8485] 5.2.0-rc2+ #20 Not tainted [ 431.196592][ T8485] ------------------------------------------------------ [ 431.196596][ T8485] kworker/u4:5/8485 is trying to acquire lock: [ 431.196599][ T8485] 000000006a67de6b ((console_sem).lock){-.-.}, at: down_trylock+0x13/0x70 [ 431.196612][ T8485] [ 431.196616][ T8485] but task is already holding lock: [ 431.196619][ T8485] 00000000a4f056b0 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 431.196634][ T8485] [ 431.196637][ T8485] which lock already depends on the new lock. [ 431.196639][ T8485] [ 431.196642][ T8485] [ 431.196646][ T8485] the existing dependency chain (in reverse order) is: [ 431.196648][ T8485] [ 431.196650][ T8485] -> #3 (&obj_hash[i].lock){-.-.}: [ 431.196663][ T8485] _raw_spin_lock_irqsave+0x95/0xcd [ 431.196666][ T8485] __debug_object_init+0xc6/0xc30 [ 431.196670][ T8485] debug_object_init+0x16/0x20 [ 431.196674][ T8485] hrtimer_init+0x2a/0x300 [ 431.196677][ T8485] init_dl_task_timer+0x1b/0x50 [ 431.196681][ T8485] __sched_fork+0x22a/0x4f0 [ 431.196684][ T8485] init_idle+0x75/0x670 [ 431.196687][ T8485] sched_init+0x952/0x9f5 [ 431.196691][ T8485] start_kernel+0x393/0x893 [ 431.196694][ T8485] x86_64_start_reservations+0x29/0x2b [ 431.196698][ T8485] x86_64_start_kernel+0x77/0x7b [ 431.196702][ T8485] secondary_startup_64+0xa4/0xb0 [ 431.196703][ T8485] [ 431.196705][ T8485] -> #2 (&rq->lock){-.-.}: [ 431.196717][ T8485] _raw_spin_lock+0x2f/0x40 [ 431.196721][ T8485] task_fork_fair+0x6a/0x520 [ 431.196724][ T8485] sched_fork+0x3af/0x900 [ 431.196728][ T8485] copy_process.part.0+0x1a25/0x6790 [ 431.196731][ T8485] _do_fork+0x25d/0xfe0 [ 431.196735][ T8485] kernel_thread+0x34/0x40 [ 431.196738][ T8485] rest_init+0x28/0x37b [ 431.196742][ T8485] arch_call_rest_init+0xe/0x1b [ 431.196745][ T8485] start_kernel+0x854/0x893 [ 431.196749][ T8485] x86_64_start_reservations+0x29/0x2b [ 431.196753][ T8485] x86_64_start_kernel+0x77/0x7b [ 431.196757][ T8485] secondary_startup_64+0xa4/0xb0 [ 431.196759][ T8485] [ 431.196761][ T8485] -> #1 (&p->pi_lock){-.-.}: [ 431.196773][ T8485] _raw_spin_lock_irqsave+0x95/0xcd [ 431.196777][ T8485] try_to_wake_up+0x90/0x13f0 [ 431.196781][ T8485] wake_up_process+0x10/0x20 [ 431.196784][ T8485] __up.isra.0+0x136/0x1a0 [ 431.196787][ T8485] up+0x9c/0xe0 [ 431.196791][ T8485] __up_console_sem+0xb7/0x1c0 [ 431.196794][ T8485] console_unlock+0x663/0xec0 [ 431.196798][ T8485] vprintk_emit+0x2a0/0x700 [ 431.196802][ T8485] vprintk_default+0x28/0x30 [ 431.196805][ T8485] vprintk_func+0x7e/0x189 [ 431.196808][ T8485] printk+0xba/0xed [ 431.196812][ T8485] do_exit.cold+0x5d/0x254 [ 431.196815][ T8485] do_group_exit+0x135/0x370 [ 431.196819][ T8485] __x64_sys_exit_group+0x44/0x50 [ 431.196822][ T8485] do_syscall_64+0xfd/0x680 [ 431.196827][ T8485] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.196829][ T8485] [ 431.196831][ T8485] -> #0 ((console_sem).lock){-.-.}: [ 431.196843][ T8485] lock_acquire+0x16f/0x3f0 [ 431.196847][ T8485] _raw_spin_lock_irqsave+0x95/0xcd [ 431.196851][ T8485] down_trylock+0x13/0x70 [ 431.196855][ T8485] __down_trylock_console_sem+0xa8/0x210 [ 431.196858][ T8485] console_trylock+0x15/0xa0 [ 431.196862][ T8485] vprintk_emit+0x283/0x700 [ 431.196865][ T8485] vprintk_default+0x28/0x30 [ 431.196869][ T8485] vprintk_func+0x7e/0x189 [ 431.196872][ T8485] printk+0xba/0xed [ 431.196876][ T8485] __warn_printk+0x9b/0xf3 [ 431.196879][ T8485] debug_print_object+0x168/0x250 [ 431.196883][ T8485] debug_check_no_obj_freed+0x29f/0x464 [ 431.196886][ T8485] kfree+0xbd/0x220 [ 431.196890][ T8485] kvfree+0x61/0x70 [ 431.196893][ T8485] netdev_freemem+0x4c/0x60 [ 431.196897][ T8485] netdev_release+0x86/0xb0 [ 431.196900][ T8485] device_release+0x7a/0x210 [ 431.196903][ T8485] kobject_put.cold+0x289/0x2e6 [ 431.196907][ T8485] netdev_run_todo+0x53b/0x7c0 [ 431.196911][ T8485] rtnl_unlock+0xe/0x10 [ 431.196915][ T8485] default_device_exit_batch+0x358/0x410 [ 431.196919][ T8485] ops_exit_list.isra.0+0xfc/0x150 [ 431.196922][ T8485] cleanup_net+0x3fb/0x960 [ 431.196926][ T8485] process_one_work+0x989/0x1790 [ 431.196929][ T8485] worker_thread+0x98/0xe40 [ 431.196933][ T8485] kthread+0x354/0x420 [ 431.196937][ T8485] ret_from_fork+0x24/0x30 [ 431.196939][ T8485] [ 431.196943][ T8485] other info that might help us debug this: [ 431.196945][ T8485] [ 431.196948][ T8485] Chain exists of: [ 431.196950][ T8485] (console_sem).lock --> &rq->lock --> &obj_hash[i].lock [ 431.196966][ T8485] [ 431.196969][ T8485] Possible unsafe locking scenario: [ 431.196971][ T8485] [ 431.196975][ T8485] CPU0 CPU1 [ 431.196979][ T8485] ---- ---- [ 431.196981][ T8485] lock(&obj_hash[i].lock); [ 431.196989][ T8485] lock(&rq->lock); [ 431.196998][ T8485] lock(&obj_hash[i].lock); [ 431.197004][ T8485] lock((console_sem).lock); [ 431.197011][ T8485] [ 431.197014][ T8485] *** DEADLOCK *** [ 431.197016][ T8485] [ 431.197020][ T8485] 4 locks held by kworker/u4:5/8485: [ 431.197022][ T8485] #0: 00000000ff8ee37d ((wq_completion)netns){+.+.}, at: process_one_work+0x87e/0x1790 [ 431.197038][ T8485] #1: 000000008bac8e8b (net_cleanup_work){+.+.}, at: process_one_work+0x8b4/0x1790 [ 431.197053][ T8485] #2: 000000000ff6bcd9 (pernet_ops_rwsem){++++}, at: cleanup_net+0xae/0x960 [ 431.197067][ T8485] #3: 00000000a4f056b0 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 431.197082][ T8485] [ 431.197085][ T8485] stack backtrace: [ 431.197090][ T8485] CPU: 1 PID: 8485 Comm: kworker/u4:5 Not tainted 5.2.0-rc2+ #20 [ 431.197096][ T8485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.197100][ T8485] Workqueue: netns cleanup_net [ 431.197104][ T8485] Call Trace: [ 431.197107][ T8485] dump_stack+0x172/0x1f0 [ 431.197111][ T8485] print_circular_bug.cold+0x1cc/0x28f [ 431.197115][ T8485] __lock_acquire+0x3755/0x5490 [ 431.197118][ T8485] ? mark_held_locks+0xf0/0xf0 [ 431.197121][ T8485] ? enable_ptr_key_workfn+0x30/0x30 [ 431.197125][ T8485] ? kvm_clock_read+0x18/0x30 [ 431.197128][ T8485] ? kvm_sched_clock_read+0x9/0x20 [ 431.197131][ T8485] lock_acquire+0x16f/0x3f0 [ 431.197135][ T8485] ? down_trylock+0x13/0x70 [ 431.197138][ T8485] _raw_spin_lock_irqsave+0x95/0xcd [ 431.197141][ T8485] ? down_trylock+0x13/0x70 [ 431.197145][ T8485] ? vprintk_emit+0x283/0x700 [ 431.197148][ T8485] down_trylock+0x13/0x70 [ 431.197151][ T8485] ? vprintk_emit+0x283/0x700 [ 431.197155][ T8485] __down_trylock_console_sem+0xa8/0x210 [ 431.197158][ T8485] console_trylock+0x15/0xa0 [ 431.197162][ T8485] vprintk_emit+0x283/0x700 [ 431.197165][ T8485] ? calc_wheel_index+0x220/0x220 [ 431.197168][ T8485] vprintk_default+0x28/0x30 [ 431.197172][ T8485] vprintk_func+0x7e/0x189 [ 431.197174][ T8485] printk+0xba/0xed [ 431.197178][ T8485] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 431.197182][ T8485] ? mark_held_locks+0xf0/0xf0 [ 431.197185][ T8485] ? mark_held_locks+0xf0/0xf0 [ 431.197188][ T8485] ? __warn_printk+0x8f/0xf3 [ 431.197202][ T8485] ? queue_work_node+0x360/0x360 [ 431.197206][ T8485] __warn_printk+0x9b/0xf3 [ 431.197209][ T8485] ? add_taint.cold+0x16/0x16 [ 431.197213][ T8485] ? kasan_check_write+0x14/0x20 [ 431.197216][ T8485] ? lock_downgrade+0x880/0x880 [ 431.197220][ T8485] ? queue_work_node+0x360/0x360 [ 431.197223][ T8485] debug_print_object+0x168/0x250 [ 431.197227][ T8485] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 431.197230][ T8485] debug_check_no_obj_freed+0x29f/0x464 [ 431.197233][ T8485] kfree+0xbd/0x220 [ 431.197236][ T8485] kvfree+0x61/0x70 [ 431.197239][ T8485] netdev_freemem+0x4c/0x60 [ 431.197242][ T8485] netdev_release+0x86/0xb0 [ 431.197246][ T8485] ? xps_cpus_store+0x2b0/0x2b0 [ 431.197249][ T8485] device_release+0x7a/0x210 [ 431.197253][ T8485] kobject_put.cold+0x289/0x2e6 [ 431.197256][ T8485] netdev_run_todo+0x53b/0x7c0 [ 431.197259][ T8485] ? register_netdev+0x50/0x50 [ 431.197263][ T8485] ? unregister_netdevice_queue+0x1d2/0x2c0 [ 431.197267][ T8485] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 431.197271][ T8485] ? net_set_todo+0xbf/0x150 [ 431.197274][ T8485] rtnl_unlock+0xe/0x10 [ 431.197278][ T8485] default_device_exit_batch+0x358/0x410 [ 431.197281][ T8485] ? unregister_netdevice_many+0x50/0x50 [ 431.197285][ T8485] ? default_device_exit+0x203/0x290 [ 431.197289][ T8485] ? do_wait_intr_irq+0x2b0/0x2b0 [ 431.197292][ T8485] ? rtnl_unlock+0xe/0x10 [ 431.197296][ T8485] ? unregister_netdevice_many+0x50/0x50 [ 431.197300][ T8485] ? dev_change_net_namespace+0xc70/0xc70 [ 431.197303][ T8485] ops_exit_list.isra.0+0xfc/0x150 [ 431.197306][ T8485] cleanup_net+0x3fb/0x960 [ 431.197310][ T8485] ? netns_install+0x1d0/0x1d0 [ 431.197313][ T8485] process_one_work+0x989/0x1790 [ 431.197317][ T8485] ? pwq_dec_nr_in_flight+0x320/0x320 [ 431.197320][ T8485] ? lock_acquire+0x16f/0x3f0 [ 431.197323][ T8485] worker_thread+0x98/0xe40 [ 431.197326][ T8485] kthread+0x354/0x420 [ 431.197330][ T8485] ? process_one_work+0x1790/0x1790 [ 431.197334][ T8485] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 431.197337][ T8485] ret_from_fork+0x24/0x30 [ 431.198294][ T8485] Kernel Offset: disabled [ 432.117644][ T8485] Rebooting in 86400 seconds..