[ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started OpenBSD Secure Shell server. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.17' (ECDSA) to the list of known hosts. 2020/07/25 08:32:17 fuzzer started 2020/07/25 08:32:18 dialing manager at 10.128.0.26:33163 2020/07/25 08:32:32 syscalls: 3243 2020/07/25 08:32:32 code coverage: enabled 2020/07/25 08:32:32 comparison tracing: enabled 2020/07/25 08:32:32 extra coverage: enabled 2020/07/25 08:32:32 setuid sandbox: enabled 2020/07/25 08:32:32 namespace sandbox: enabled 2020/07/25 08:32:32 Android sandbox: /sys/fs/selinux/policy does not exist 2020/07/25 08:32:32 fault injection: enabled 2020/07/25 08:32:32 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/25 08:32:32 net packet injection: enabled 2020/07/25 08:32:32 net device setup: enabled 2020/07/25 08:32:32 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/07/25 08:32:32 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/25 08:32:32 USB emulation: enabled 08:34:38 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ppoll(&(0x7f0000000200)=[{r0}], 0x1, &(0x7f0000000280), 0x0, 0x0) syzkaller login: [ 201.242549][ T6840] IPVS: ftp: loaded support on port[0] = 21 [ 201.365836][ T6840] chnl_net:caif_netlink_parms(): no params data found 08:34:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r2) sendmmsg$inet(r0, &(0x7f0000000780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@cipso={0x86, 0x6}]}}}], 0x18}}], 0x2, 0x0) [ 201.442377][ T6840] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.450926][ T6840] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.459275][ T6840] device bridge_slave_0 entered promiscuous mode [ 201.469275][ T6840] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.476477][ T6840] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.484680][ T6840] device bridge_slave_1 entered promiscuous mode [ 201.522907][ T6840] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 201.534891][ T6840] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.564957][ T6840] team0: Port device team_slave_0 added [ 201.575294][ T6840] team0: Port device team_slave_1 added [ 201.598570][ T6840] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 201.605587][ T6840] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 201.632398][ T6840] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 201.648489][ T6840] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 201.655612][ T6840] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 201.682093][ T6840] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 201.753471][ T6840] device hsr_slave_0 entered promiscuous mode 08:34:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) socket(0x10, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) fcntl$setownex(r1, 0x409, &(0x7f0000000180)={0x1}) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/vmallocinfo\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/vmallocinfo\x00', 0x0, 0x0) [ 201.847640][ T6840] device hsr_slave_1 entered promiscuous mode [ 201.953589][ T7002] IPVS: ftp: loaded support on port[0] = 21 [ 202.044806][ T7010] IPVS: ftp: loaded support on port[0] = 21 08:34:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f00000002c0)="e9bca2740a0000002734fa0095e0612687ecb882548802a902000000020000000a00000079a782d2250000000206e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_checksum='journal_checksum'}, {@dax='dax'}]}) [ 202.335840][ T7002] chnl_net:caif_netlink_parms(): no params data found [ 202.499633][ T6840] netdevsim netdevsim0 netdevsim0: renamed from eth0 08:34:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="00f0000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 202.624806][ T6840] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 202.688016][ T6840] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 202.702015][ T7189] IPVS: ftp: loaded support on port[0] = 21 [ 202.773585][ T6840] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 202.859640][ T7010] chnl_net:caif_netlink_parms(): no params data found 08:34:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)={0x20, r2, 0x1, 0x0, 0x0, {0x1, 0x6c00000000000000}, [{{0x8, 0x1, r1}, {0x4}}]}, 0x20}}, 0x0) [ 202.932677][ T7002] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.955196][ T7002] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.980416][ T7002] device bridge_slave_0 entered promiscuous mode [ 203.003530][ T7002] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.021259][ T7002] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.030103][ T7002] device bridge_slave_1 entered promiscuous mode [ 203.123294][ T7291] IPVS: ftp: loaded support on port[0] = 21 [ 203.175046][ T7307] IPVS: ftp: loaded support on port[0] = 21 [ 203.178553][ T7002] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 203.196369][ T7002] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 203.274948][ T7010] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.282861][ T7010] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.292845][ T7010] device bridge_slave_0 entered promiscuous mode [ 203.316040][ T7002] team0: Port device team_slave_0 added [ 203.340190][ T7010] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.350231][ T7010] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.358532][ T7010] device bridge_slave_1 entered promiscuous mode [ 203.378030][ T7002] team0: Port device team_slave_1 added [ 203.465976][ T7010] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 203.485270][ T7002] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 203.496627][ T7002] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 203.524342][ T7002] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 203.542191][ T7002] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 203.550120][ T7002] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 203.576629][ T7002] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 203.598286][ T7010] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 203.670659][ T7189] chnl_net:caif_netlink_parms(): no params data found [ 203.691966][ T7010] team0: Port device team_slave_0 added [ 203.702103][ T7010] team0: Port device team_slave_1 added [ 203.730977][ T7002] device hsr_slave_0 entered promiscuous mode [ 203.778707][ T7002] device hsr_slave_1 entered promiscuous mode [ 203.817409][ T7002] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 203.825249][ T7002] Cannot create hsr debugfs directory [ 203.920066][ T7010] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 203.927155][ T7010] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 203.955743][ T7010] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 204.002632][ T7010] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 204.010342][ T7010] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 204.037437][ T7010] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 204.066501][ T7291] chnl_net:caif_netlink_parms(): no params data found [ 204.089800][ T6840] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.185612][ T7189] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.198639][ T7189] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.206545][ T7189] device bridge_slave_0 entered promiscuous mode [ 204.270934][ T7010] device hsr_slave_0 entered promiscuous mode [ 204.338633][ T7010] device hsr_slave_1 entered promiscuous mode [ 204.377483][ T7010] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 204.385100][ T7010] Cannot create hsr debugfs directory [ 204.471741][ T7189] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.482046][ T7189] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.490237][ T7189] device bridge_slave_1 entered promiscuous mode [ 204.564791][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.574396][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.583515][ T7291] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.592162][ T7291] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.601693][ T7291] device bridge_slave_0 entered promiscuous mode [ 204.620609][ T7307] chnl_net:caif_netlink_parms(): no params data found [ 204.637101][ T7189] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 204.654630][ T7291] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.662439][ T7291] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.673667][ T7291] device bridge_slave_1 entered promiscuous mode [ 204.699870][ T6840] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.715260][ T7189] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 204.792714][ T7291] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 204.832354][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.841817][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.851628][ T2684] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.859008][ T2684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.872863][ T7291] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 204.894057][ T7189] team0: Port device team_slave_0 added [ 204.917115][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.927046][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.936473][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.945480][ T2684] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.952624][ T2684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.996342][ T7189] team0: Port device team_slave_1 added [ 205.079324][ T7291] team0: Port device team_slave_0 added [ 205.104219][ T7002] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 205.153418][ T7002] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 205.204854][ T7189] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 205.211920][ T7189] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 205.238918][ T7189] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 205.252617][ T7307] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.261931][ T7307] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.270223][ T7307] device bridge_slave_0 entered promiscuous mode [ 205.280042][ T7291] team0: Port device team_slave_1 added [ 205.286172][ T7307] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.293467][ T7307] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.302085][ T7307] device bridge_slave_1 entered promiscuous mode [ 205.322281][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.332137][ T7002] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 205.369664][ T7189] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 205.376813][ T7189] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 205.405408][ T7189] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 205.467432][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.476146][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.487041][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.496800][ T7002] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 205.600952][ T7189] device hsr_slave_0 entered promiscuous mode [ 205.667769][ T7189] device hsr_slave_1 entered promiscuous mode [ 205.717488][ T7189] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 205.725110][ T7189] Cannot create hsr debugfs directory [ 205.749452][ T7307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 205.759994][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.769517][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.778777][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.804588][ T7291] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 205.813317][ T7291] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 205.840355][ T7291] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 205.855839][ T7291] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 205.864453][ T7291] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 205.890946][ T7291] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 205.904175][ T7307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 205.941081][ T7010] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 205.996879][ T6840] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 206.007639][ T6840] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 206.021108][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 206.031051][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.040684][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 206.058344][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.066765][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 206.125329][ T7010] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 206.184724][ T7010] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 206.233883][ T7307] team0: Port device team_slave_0 added [ 206.246270][ T7307] team0: Port device team_slave_1 added [ 206.268445][ T7010] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 206.415610][ T7291] device hsr_slave_0 entered promiscuous mode [ 206.467705][ T7291] device hsr_slave_1 entered promiscuous mode [ 206.498303][ T7291] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 206.505994][ T7291] Cannot create hsr debugfs directory [ 206.564609][ T7307] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 206.573230][ T7307] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 206.600747][ T7307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 206.631618][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 206.639637][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 206.679433][ T7307] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 206.686562][ T7307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 206.720284][ T7307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 206.759806][ T6840] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.840664][ T7307] device hsr_slave_0 entered promiscuous mode [ 206.889847][ T7307] device hsr_slave_1 entered promiscuous mode [ 206.927401][ T7307] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 206.935034][ T7307] Cannot create hsr debugfs directory [ 207.073373][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 207.085724][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 207.162334][ T7189] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 207.190931][ T7189] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 207.250878][ T7189] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 207.312726][ T7189] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 207.377729][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 207.386270][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 207.429322][ T7002] 8021q: adding VLAN 0 to HW filter on device bond0 [ 207.443545][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 207.453508][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 207.472659][ T6840] device veth0_vlan entered promiscuous mode [ 207.506301][ T6840] device veth1_vlan entered promiscuous mode [ 207.543536][ T7002] 8021q: adding VLAN 0 to HW filter on device team0 [ 207.556716][ T7291] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 207.631729][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 207.644721][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 207.655573][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 207.665013][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 207.674668][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.684158][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.693455][ T7362] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.700774][ T7362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.741814][ T7291] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 207.780115][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 207.790385][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.800825][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.809992][ T2684] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.817062][ T2684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.825707][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 207.848296][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 207.859443][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.868612][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.883877][ T7010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 207.897077][ T7291] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 207.958629][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 207.966618][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 207.976736][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 208.016506][ T6840] device veth0_macvtap entered promiscuous mode [ 208.027336][ T7291] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 208.051780][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 208.060686][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.070169][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.079424][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 208.089877][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 208.105661][ T7010] 8021q: adding VLAN 0 to HW filter on device team0 [ 208.113591][ T7307] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 208.185608][ T6840] device veth1_macvtap entered promiscuous mode [ 208.211759][ T7307] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 208.259052][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 208.267148][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 208.280266][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 208.320336][ T7307] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 208.380320][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.389425][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.398863][ T7181] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.405934][ T7181] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.414359][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 208.423609][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 208.433227][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.450504][ T6840] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 208.472672][ T7307] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 208.525394][ T7002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 208.533878][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.543500][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.552646][ T2684] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.559818][ T2684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.568653][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 208.578103][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 208.609064][ T6840] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 208.623650][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 208.633631][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 208.643730][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 208.652685][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 208.661398][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 208.670305][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 208.679137][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 208.688324][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 208.697749][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 208.732610][ T6840] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 208.743980][ T6840] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 208.753128][ T6840] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 208.762291][ T6840] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 208.802656][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 208.811147][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 208.894845][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 208.903467][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 208.914174][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 208.925609][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 208.958999][ T7010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 209.043004][ T7002] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 209.064046][ T7189] 8021q: adding VLAN 0 to HW filter on device bond0 08:34:46 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) ioctl$TUNATTACHFILTER(r0, 0x400454e2, &(0x7f0000000200)={0x1, &(0x7f0000000000)=[{}]}) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 209.146145][ T7189] 8021q: adding VLAN 0 to HW filter on device team0 [ 209.162247][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 209.183208][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 209.203103][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 209.215741][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 209.242923][ T7010] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 209.267544][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.286171][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.296014][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.303212][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.322488][ T7291] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.411750][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.420007][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 209.449233][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 209.467089][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.476790][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.485968][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.493115][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.540023][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 209.550807][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 209.561422][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.571323][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 209.579605][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 209.629772][ T7291] 8021q: adding VLAN 0 to HW filter on device team0 [ 209.642803][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.656774][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 209.665720][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 209.685905][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 209.694225][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 209.702314][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.711271][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.720260][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.729772][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.745294][ T7002] device veth0_vlan entered promiscuous mode [ 209.762856][ T7010] device veth0_vlan entered promiscuous mode 08:34:46 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) ioctl$TUNATTACHFILTER(r0, 0x400454e2, &(0x7f0000000200)={0x1, &(0x7f0000000000)=[{}]}) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 209.792497][ T7307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.799698][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.819762][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 209.835123][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 209.843887][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.858866][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.872964][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.880166][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.898526][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 209.913416][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.923390][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 209.939018][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 209.947150][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.975342][ T7010] device veth1_vlan entered promiscuous mode [ 209.996008][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.011102][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.021318][ T7362] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.028663][ T7362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.049136][ T7002] device veth1_vlan entered promiscuous mode [ 210.082885][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 210.093940][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.104408][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 210.116206][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 210.125700][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.138156][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.166855][ T7189] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 210.182772][ T7307] 8021q: adding VLAN 0 to HW filter on device team0 08:34:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) ioctl$TUNATTACHFILTER(r0, 0x541b, 0x0) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 210.216639][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.228632][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.238594][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.258367][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.266913][ T7362] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.274107][ T7362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.293507][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.302975][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.313988][ T7362] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.321280][ T7362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.330851][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 210.340174][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 210.405839][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.416522][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.434029][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 210.453312][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 210.462175][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 210.484815][ T7291] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 210.498877][ T7291] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 210.514173][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.523415][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 210.533276][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 210.543525][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 210.554145][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 210.575208][ T7002] device veth0_macvtap entered promiscuous mode [ 210.621577][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 210.630336][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 210.642688][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.653046][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.663899][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 210.673580][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 210.682136][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 210.691056][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 210.715436][ T7002] device veth1_macvtap entered promiscuous mode [ 210.736196][ T7010] device veth0_macvtap entered promiscuous mode [ 210.748575][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 210.757002][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 08:34:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) ioctl$TUNATTACHFILTER(r0, 0x541b, 0x0) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 210.769382][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.779872][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.853189][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 210.880377][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 210.898056][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 210.906528][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 210.928120][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 210.935715][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 210.962602][ T7010] device veth1_macvtap entered promiscuous mode [ 210.984825][ T7291] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 211.004056][ T7002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 211.020408][ T7002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 211.035882][ T7002] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 211.058741][ T7189] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 211.084319][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 211.099013][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 08:34:48 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x5ac, 0x22b, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x22, 0x1, {[@global]}}, 0x0}, 0x0) [ 211.136404][ T7002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 211.156093][ T7002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 211.180061][ T7002] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 211.202739][ T7010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 211.227335][ T7010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 211.238340][ T7010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 211.249798][ T7010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 211.262359][ T7010] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 211.270767][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 211.290100][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 211.318211][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 211.328517][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 211.361252][ T7002] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.391301][ T7002] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.407307][ T7002] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.416061][ T7002] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.437741][ T7010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 211.449210][ T7010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 211.464131][ T7010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 211.475825][ T7010] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 211.487847][ T7010] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 211.495265][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 211.505797][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 211.514614][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 211.524332][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 211.537444][ T7181] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 211.589033][ T7010] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.599167][ T7010] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.613381][ T7010] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.625941][ T7010] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.641424][ T7307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 211.654492][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 211.664321][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 211.797338][ T2538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 211.818295][ T2538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 211.837376][ T2538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 08:34:49 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) [ 211.853914][ T2538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.924238][ T7189] device veth0_vlan entered promiscuous mode [ 211.936957][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 211.948841][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 211.958409][ T7181] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 211.975520][ T7181] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 211.998390][ T7181] usb 1-1: New USB device found, idVendor=05ac, idProduct=022b, bcdDevice= 0.40 [ 212.012287][ T7181] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 212.038258][ T7291] device veth0_vlan entered promiscuous mode [ 212.061627][ T7181] usb 1-1: config 0 descriptor?? [ 212.120458][ T7189] device veth1_vlan entered promiscuous mode [ 212.163939][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 212.188043][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 212.204944][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 08:34:49 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) [ 212.233343][ T7291] device veth1_vlan entered promiscuous mode [ 212.263051][ C0] hrtimer: interrupt took 56000 ns [ 212.275106][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 212.297187][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 212.308193][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 212.332582][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 212.453048][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 212.469942][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 08:34:49 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) [ 212.500456][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 212.534838][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 212.566377][ T7181] apple 0003:05AC:022B.0001: hidraw0: USB HID v0.00 Device [HID 05ac:022b] on usb-dummy_hcd.0-1/input0 08:34:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) socket(0x10, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) fcntl$setownex(r1, 0x409, &(0x7f0000000180)={0x1}) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/vmallocinfo\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/vmallocinfo\x00', 0x0, 0x0) [ 212.609407][ T7189] device veth0_macvtap entered promiscuous mode [ 212.636769][ T7307] device veth0_vlan entered promiscuous mode [ 212.696609][ T7189] device veth1_macvtap entered promiscuous mode [ 212.707066][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 212.734153][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 212.752160][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 212.773588][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 212.791091][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 212.803712][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 212.821710][ T7291] device veth0_macvtap entered promiscuous mode [ 212.832646][ T7181] usb 1-1: USB disconnect, device number 2 [ 212.871148][ T7307] device veth1_vlan entered promiscuous mode [ 212.903829][ T7291] device veth1_macvtap entered promiscuous mode [ 212.929075][ T7189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 212.966136][ T7189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 212.985120][ T7189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 212.996648][ T7189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.022218][ T7189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 213.042635][ T7189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.063298][ T7189] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 213.134897][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 213.144990][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 213.163333][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 213.185771][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 213.195996][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 213.210821][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 213.226327][ T7291] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 213.246490][ T7291] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.266981][ T7291] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 213.320331][ T7291] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.346093][ T7291] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 213.374184][ T7291] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.404711][ T7291] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 213.425758][ T7291] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.466892][ T7291] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 213.492980][ T7189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.503749][ T7189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.513674][ T7189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.524841][ T7189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.534992][ T7189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.545820][ T7189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.557516][ T7181] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 213.561767][ T7189] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 213.574806][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 213.590896][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 213.600631][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 213.613135][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 213.622340][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 213.635250][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 213.647374][ T7291] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.663003][ T7291] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.672987][ T7291] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.683882][ T7291] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.693973][ T7291] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.704546][ T7291] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.714518][ T7291] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 213.725048][ T7291] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 213.736924][ T7291] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 213.748661][ T7189] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.760711][ T7189] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.774907][ T7189] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.786990][ T7189] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.800634][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 213.814385][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 213.825118][ T7307] device veth0_macvtap entered promiscuous mode [ 213.845896][ T7291] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.855479][ T7291] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.865933][ T7291] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.875570][ T7291] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.890305][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 213.906020][ T7307] device veth1_macvtap entered promiscuous mode [ 213.938297][ T7181] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 213.954185][ T7181] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 213.966052][ T7181] usb 1-1: New USB device found, idVendor=05ac, idProduct=022b, bcdDevice= 0.40 [ 213.980169][ T7181] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 214.002065][ T7181] usb 1-1: config 0 descriptor?? [ 214.024605][ T7307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 214.042817][ T7307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.055382][ T7307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 214.071152][ T7307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.081255][ T7307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 214.092192][ T7307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.103893][ T7307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 214.114647][ T7307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.126408][ T7307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 214.138341][ T7307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.149925][ T7307] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 214.187378][ T8104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 214.196255][ T8104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 214.216120][ T7307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 214.229620][ T7307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.242696][ T7307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 214.253935][ T7307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.264683][ T7307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 214.275782][ T7307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.286665][ T7307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 214.298598][ T7307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.309543][ T7307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 214.320936][ T7307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 214.333997][ T7307] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 214.427703][ T7181] usbhid 1-1:0.0: can't add hid device: -71 [ 214.434070][ T7181] usbhid: probe of 1-1:0.0 failed with error -71 [ 214.462017][ T7181] usb 1-1: USB disconnect, device number 3 [ 214.520212][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 214.532571][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 214.601547][ T7307] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 214.637709][ T7307] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 214.646483][ T7307] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 214.657890][ T8236] EXT4-fs (loop3): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 214.667636][ T8236] EXT4-fs (loop3): DAX unsupported by block device. [ 214.678285][ T7307] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 214.693273][ T8233] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 214.705949][ T8238] team0: Device tunl0 is of different type [ 214.722868][ T8233] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 214.779521][ T8236] EXT4-fs (loop3): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 214.789779][ T8236] EXT4-fs (loop3): DAX unsupported by block device. 08:34:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f00000002c0)="e9bca2740a0000002734fa0095e0612687ecb882548802a902000000020000000a00000079a782d2250000000206e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_checksum='journal_checksum'}, {@dax='dax'}]}) 08:34:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) socket(0x10, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) fcntl$setownex(r1, 0x409, &(0x7f0000000180)={0x1}) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/vmallocinfo\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/vmallocinfo\x00', 0x0, 0x0) 08:34:52 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r4, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x68, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", &(0x7f0000000540)="e6a576d3dd7da7728abcf0d6fd65c120b886025a55648965b1be9a20929528d94c99fae724b0ab17625891029ea7191ec7e52090f0d9c9eab418fe549e6afd0edc3910b26a1c1964b12b1ebe6e8a792f60907e5653fd6fba57f684f3f2a7e4728ee3b90f5c3d9026"}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:34:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2ea4000038000505d25a80758c69940d0124fc6010000a400a000048051282c137153e370948018000f01700d1bd", 0x33fe0}], 0x1}, 0x7a000000) 08:34:52 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x5ac, 0x22b, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x22, 0x1, {[@global]}}, 0x0}, 0x0) 08:34:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="89000000120081ae08060c0f006b3f027f03e3f70000000000e2ffca1b4e0906a6bd7c490169381ad6e747033a0093b837dc6cc01e32ef6a80277bec00123d000200190077a0bdad446b9bbc7a46e3988285dcdf12f213d3f868fecea4e455166883ad14955f947ee2b49e566f8afa8af92347510f0b56a20fdb7f00"/137, 0x89}], 0x1}, 0x0) [ 215.031452][ T8254] EXT4-fs (loop3): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 215.055681][ T8254] EXT4-fs (loop3): DAX unsupported by block device. 08:34:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) socket(0x10, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) fcntl$setownex(r1, 0x409, &(0x7f0000000180)={0x1}) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/vmallocinfo\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/vmallocinfo\x00', 0x0, 0x0) [ 215.128628][ T8262] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 08:34:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f00000002c0)="e9bca2740a0000002734fa0095e0612687ecb882548802a902000000020000000a00000079a782d2250000000206e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_checksum='journal_checksum'}, {@dax='dax'}]}) [ 215.194666][ T8262] netlink: 23550 bytes leftover after parsing attributes in process `syz-executor.1'. 08:34:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x79, 0x1803, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x22}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, &(0x7f0000000280)={0x24, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0022220000000b05410a86580b"], 0x0}, 0x0) [ 215.269877][ T8271] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) [ 215.298267][ T8272] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 215.354508][ T8272] netlink: 23550 bytes leftover after parsing attributes in process `syz-executor.1'. [ 215.387504][ T5] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 215.405552][ T8276] EXT4-fs (loop3): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 215.447648][ T8276] EXT4-fs (loop3): DAX unsupported by block device. [ 215.475410][ T8271] device vlan0 entered promiscuous mode 08:34:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) ioctl$TUNATTACHFILTER(r0, 0x8927, &(0x7f0000000200)={0x0, 0x0}) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:34:52 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:34:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000580)=[{&(0x7f00000002c0)="e9bca2740a0000002734fa0095e0612687ecb882548802a902000000020000000a00000079a782d2250000000206e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@journal_checksum='journal_checksum'}, {@dax='dax'}]}) [ 215.655562][ T8287] EXT4-fs (loop3): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 215.691189][ T8287] EXT4-fs (loop3): DAX unsupported by block device. [ 215.763274][ T5] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 215.776008][ T5] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 215.794267][ T5] usb 1-1: New USB device found, idVendor=05ac, idProduct=022b, bcdDevice= 0.40 [ 215.805699][ T5] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 215.828224][ T5] usb 1-1: config 0 descriptor?? [ 215.877378][ T8295] tap0: tun_chr_ioctl cmd 1074025672 [ 215.882724][ T8295] tap0: ignored: set checksum enabled 08:34:53 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000300)='X', 0x1}], 0x1) [ 215.953009][ T8267] device vlan0 left promiscuous mode [ 215.997463][ T17] usb 5-1: new high-speed USB device number 2 using dummy_hcd 08:34:53 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0xd0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 216.118214][ T8301] device vlan0 entered promiscuous mode 08:34:53 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r4, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x68, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", &(0x7f0000000540)="e6a576d3dd7da7728abcf0d6fd65c120b886025a55648965b1be9a20929528d94c99fae724b0ab17625891029ea7191ec7e52090f0d9c9eab418fe549e6afd0edc3910b26a1c1964b12b1ebe6e8a792f60907e5653fd6fba57f684f3f2a7e4728ee3b90f5c3d9026"}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 216.311452][ T5] apple 0003:05AC:022B.0002: hidraw0: USB HID v0.00 Device [HID 05ac:022b] on usb-dummy_hcd.0-1/input0 [ 216.387915][ T17] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 216.411103][ T17] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 08:34:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) ioctl$TUNATTACHFILTER(r0, 0x400454d4, &(0x7f0000000200)={0x1, &(0x7f0000000000)=[{}]}) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 216.430102][ T17] usb 5-1: New USB device found, idVendor=0079, idProduct=1803, bcdDevice= 0.00 [ 216.444218][ T17] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 216.496080][ T8330] device vlan0 left promiscuous mode [ 216.540231][ T17] usb 5-1: config 0 descriptor?? [ 216.540352][ T12] usb 1-1: USB disconnect, device number 4 [ 216.731502][ T8333] device vlan0 entered promiscuous mode [ 217.029860][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.045318][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.071475][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.098064][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.120584][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.158167][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 08:34:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002f00)={0x1, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002e80)={0x1, 0x2}, 0x8, 0x10, 0x0}, 0x78) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x0, 0x5, 0x0, &(0x7f00000008c0)='syzkaller\x00', 0x9dd, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd0857720c52f6a38, 0xffffffffffffffff, 0x8, &(0x7f0000000dc0)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x7937}, 0x10, 0x0, r1}, 0x78) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108030f80ecdb4cb92e0a480e0a10000000e3bd6efb250009600e00030040fefeff059804001201", 0x2e}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:34:54 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:34:54 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0xd0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:34:54 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r4, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x68, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", &(0x7f0000000540)="e6a576d3dd7da7728abcf0d6fd65c120b886025a55648965b1be9a20929528d94c99fae724b0ab17625891029ea7191ec7e52090f0d9c9eab418fe549e6afd0edc3910b26a1c1964b12b1ebe6e8a792f60907e5653fd6fba57f684f3f2a7e4728ee3b90f5c3d9026"}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 217.165665][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.232127][ T8368] device vlan0 left promiscuous mode [ 217.257399][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.266501][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.288865][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.321638][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.362434][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.381091][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.394039][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.455336][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.507367][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.536716][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.566572][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.603081][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.630311][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.655279][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.675114][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.688687][ T17] hid-generic 0003:0079:1803.0003: unknown main item tag 0x0 [ 217.719226][ T17] hid-generic 0003:0079:1803.0003: hidraw0: USB HID v0.00 Device [HID 0079:1803] on usb-dummy_hcd.4-1/input0 08:34:54 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x1) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffe58) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 08:34:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) ioctl$TUNATTACHFILTER(r0, 0x400454d4, &(0x7f0000000200)={0x1, &(0x7f0000000000)=[{}]}) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:34:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 217.775509][ T17] usb 5-1: USB disconnect, device number 2 [ 218.231753][ T8376] tap0: tun_chr_ioctl cmd 1074025672 [ 218.237747][ T8376] tap0: ignored: set checksum enabled [ 218.488997][ T8373] device vlan0 entered promiscuous mode [ 218.505884][ T8377] @þþÿ˜: renamed from team0 08:34:55 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r4, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x68, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", &(0x7f0000000540)="e6a576d3dd7da7728abcf0d6fd65c120b886025a55648965b1be9a20929528d94c99fae724b0ab17625891029ea7191ec7e52090f0d9c9eab418fe549e6afd0edc3910b26a1c1964b12b1ebe6e8a792f60907e5653fd6fba57f684f3f2a7e4728ee3b90f5c3d9026"}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 218.571203][ T8377] 8021q: adding VLAN 0 to HW filter on device @þþÿ˜ [ 218.624371][ T8408] tap0: tun_chr_ioctl cmd 1074025675 [ 218.631723][ T8408] tap0: persist enabled [ 218.639486][ T8412] tap0: tun_chr_ioctl cmd 1074025675 [ 218.645852][ T8412] tap0: persist disabled [ 218.906773][ T8415] 8021q: adding VLAN 0 to HW filter on device @þþÿ˜ 08:34:56 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:34:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001b00)=ANY=[@ANYBLOB="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"/1693], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) sendto$inet6(r0, &(0x7f0000000040)='F', 0xfffffffffffffea0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 08:34:56 executing program 4: openat$ttyS3(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b80)=ANY=[@ANYBLOB="4000000010001fff0000d2fcd4f259c3e0ad0000", @ANYRES32=0x0, @ANYBLOB="65580000000000001800128008000100707070000c00028008000100", @ANYRES32=r1], 0x40}}, 0x0) pipe(&(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) [ 219.084897][ T8419] device vlan0 left promiscuous mode 08:34:56 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) ioctl$TUNATTACHFILTER(r0, 0x400454d4, &(0x7f0000000200)={0x1, &(0x7f0000000000)=[{}]}) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 219.254743][ T8426] device vlan0 entered promiscuous mode 08:34:56 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r4, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x68, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", &(0x7f0000000540)="e6a576d3dd7da7728abcf0d6fd65c120b886025a55648965b1be9a20929528d94c99fae724b0ab17625891029ea7191ec7e52090f0d9c9eab418fe549e6afd0edc3910b26a1c1964b12b1ebe6e8a792f60907e5653fd6fba57f684f3f2a7e4728ee3b90f5c3d9026"}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 219.516578][ T8443] tap0: tun_chr_ioctl cmd 1074025672 [ 219.522290][ T8443] tap0: ignored: set checksum enabled [ 219.534531][ T8441] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 08:34:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca2740a0000002734fa0095e0612687ecb86a548802a902000000020000000a0000000a000000250000000206e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='commit=0x']) 08:34:56 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 219.662576][ T8471] device vlan0 left promiscuous mode [ 219.805382][ T8477] EXT4-fs (loop3): Unrecognized mount option "commit=0x" or missing value [ 219.908475][ T8473] device vlan0 entered promiscuous mode 08:34:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001b00)=ANY=[@ANYBLOB="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"/1693], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) sendto$inet6(r0, &(0x7f0000000040)='F', 0xfffffffffffffea0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 08:34:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a}, 0x1c) [ 219.981878][ T8483] tap0: tun_chr_ioctl cmd 1074025672 [ 219.987622][ T8483] tap0: ignored: set checksum enabled 08:34:57 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r4, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x68, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", &(0x7f0000000540)="e6a576d3dd7da7728abcf0d6fd65c120b886025a55648965b1be9a20929528d94c99fae724b0ab17625891029ea7191ec7e52090f0d9c9eab418fe549e6afd0edc3910b26a1c1964b12b1ebe6e8a792f60907e5653fd6fba57f684f3f2a7e4728ee3b90f5c3d9026"}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:34:57 executing program 3: openat$ttyS3(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ttyS3\x00', 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b80)=ANY=[@ANYBLOB="4000000010001fff0000d2fcd4f259c3e0ad0000", @ANYRES32=0x0, @ANYBLOB="65580000000000001800128008000100707070000c00028008000100", @ANYRES32=r1], 0x40}}, 0x0) pipe(&(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x3}, 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 08:34:57 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x14]}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 220.365597][ T8498] device vlan0 left promiscuous mode 08:34:57 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) [ 220.585931][ T8499] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 220.620055][ T8500] device vlan0 entered promiscuous mode [ 220.671896][ T8504] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 08:34:57 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r4, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x68, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", &(0x7f0000000540)="e6a576d3dd7da7728abcf0d6fd65c120b886025a55648965b1be9a20929528d94c99fae724b0ab17625891029ea7191ec7e52090f0d9c9eab418fe549e6afd0edc3910b26a1c1964b12b1ebe6e8a792f60907e5653fd6fba57f684f3f2a7e4728ee3b90f5c3d9026"}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 220.753413][ T8513] tap0: tun_chr_ioctl cmd 1074025672 [ 220.760139][ T8513] tap0: ignored: set checksum enabled [ 221.083187][ T8441] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 221.113451][ T8528] device vlan0 left promiscuous mode 08:34:58 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, &(0x7f0000000000)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000000)={@cgroup=r0, r1, 0x2}, 0x10) bpf$BPF_PROG_DETACH(0x21, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 08:34:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r0, 0x0, 0x0, 0x0}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000000)={@cgroup=r1, r2, 0x2}, 0x10) bpf$BPF_PROG_DETACH(0xc, &(0x7f0000000080)={@cgroup=r1, 0xffffffffffffffff, 0x2}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r4, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000180)=""/179, 0xb3, r5}}, 0x10) 08:34:58 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, &(0x7f0000000000)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000000)={@cgroup=r0, r1, 0x2}, 0x10) bpf$BPF_PROG_DETACH(0x21, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 08:34:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r0, 0x0, 0x0, 0x0}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000000)={@cgroup=r1, r2, 0x2}, 0x10) bpf$BPF_PROG_DETACH(0xc, &(0x7f0000000080)={@cgroup=r1, 0xffffffffffffffff, 0x2}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r4, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000180)=""/179, 0xb3, r5}}, 0x10) 08:34:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r0, 0x0, 0x0, 0x0}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000000)={@cgroup=r1, r2, 0x2}, 0x10) bpf$BPF_PROG_DETACH(0xc, &(0x7f0000000080)={@cgroup=r1, 0xffffffffffffffff, 0x2}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r4, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000180)=""/179, 0xb3, r5}}, 0x10) [ 221.415978][ T8529] device vlan0 entered promiscuous mode 08:34:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r0, 0x0, 0x0, 0x0}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000000)={@cgroup=r1, r2, 0x2}, 0x10) bpf$BPF_PROG_DETACH(0xc, &(0x7f0000000080)={@cgroup=r1, 0xffffffffffffffff, 0x2}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r4, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000180)=""/179, 0xb3, r5}}, 0x10) [ 221.479176][ T8504] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 08:34:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r0, 0x0, 0x0, 0x0}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000000)={@cgroup=r1, r2, 0x2}, 0x10) bpf$BPF_PROG_DETACH(0xc, &(0x7f0000000080)={@cgroup=r1, 0xffffffffffffffff, 0x2}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r4, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000180)=""/179, 0xb3, r5}}, 0x10) 08:34:58 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r4, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 221.547342][ T8499] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 08:34:58 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, &(0x7f0000000000)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000000)={@cgroup=r0, r1, 0x2}, 0x10) bpf$BPF_PROG_DETACH(0x21, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 08:34:58 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) 08:34:58 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, &(0x7f0000000000)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000000)={@cgroup=r0, r1, 0x2}, 0x10) bpf$BPF_PROG_DETACH(0x21, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) [ 221.729924][ T8564] device vlan0 left promiscuous mode 08:34:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x28, 0x7, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0xffffffff}]}, 0x28}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d257146d0e0206e73ba8f4952bedc6760253ef", 0xff9a, 0x400}], 0x0, &(0x7f0000000240)={[{@data_journal='data=journal'}]}) 08:34:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca2740a0000002734fa0095e0612687ecb86a548802a902000000020000000a0000000a000000250000000206e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='commit=0x']) 08:34:59 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000140)={'macvlan0\x00', @ifru_settings={0x0, 0x0, @fr_pvc=0x0}}) 08:34:59 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r3, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4810f02cfa8b99c99cf65439e85fc569bae8277099e9b3294126d859e9f9eb6ab8c9284161afc80d9e3032025951c87a1bdcb7b5d0625361b219d4284f30703e2dc78afd3b598e4bc8c6e5200576dec0e86a0314a8928e6994f8b42cd2c66ef44f1a6dbe0ae9bbec4d02b94b4dbcd81ebdb9818a3ea48e34a650376921cbb34e39f976deedad471e596fbc855357b97", 0xe6}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {0x0}], 0x4}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 221.976002][ T8579] EXT4-fs warning (device loop4): ext4_fill_super:3862: metadata_csum and uninit_bg are redundant flags; please run fsck. [ 222.023184][ T8583] EXT4-fs (loop0): Unrecognized mount option "commit=0x" or missing value [ 222.036475][ T8571] device vlan0 entered promiscuous mode [ 222.043880][ T8579] EXT4-fs (loop4): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 222.079144][ T8573] tap0: tun_chr_ioctl cmd 1074025672 [ 222.087181][ T8573] tap0: ignored: set checksum enabled 08:34:59 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r4, 0x400454cd, 0x4) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 222.277770][ T8583] EXT4-fs (loop0): Unrecognized mount option "commit=0x" or missing value [ 222.322006][ T8599] EXT4-fs warning (device loop4): ext4_fill_super:3862: metadata_csum and uninit_bg are redundant flags; please run fsck. [ 222.335677][ T8599] EXT4-fs (loop4): VFS: Found ext4 filesystem with unknown checksum algorithm. 08:34:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca2740a0000002734fa0095e0612687ecb86a548802a902000000020000000a0000000a000000250000000206e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='commit=0x']) [ 222.470311][ T8589] device vlan0 entered promiscuous mode 08:34:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@flushpolicy={0x38, 0x12, 0x4e326d0846e0c13d, 0x0, 0x0, "", [@address_filter={0x28, 0x1a, {@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@private, 0x2}}]}, 0x38}, 0x8}, 0x0) 08:34:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) [ 222.565284][ T8606] EXT4-fs (loop0): Unrecognized mount option "commit=0x" or missing value 08:34:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@flushpolicy={0x38, 0x12, 0x4e326d0846e0c13d, 0x0, 0x0, "", [@address_filter={0x28, 0x1a, {@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@private, 0x2}}]}, 0x38}, 0x8}, 0x0) [ 222.754717][ T8598] device vlan0 left promiscuous mode 08:34:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x2, 0x0, 0x0, 0x0, 0x54}}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfc76, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)}, 0x48) 08:34:59 executing program 0: 08:35:00 executing program 4: 08:35:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = socket$inet_tcp(0x2, 0x3, 0x6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @multicast2}}) write$tun(r0, &(0x7f0000000240)={@void, @val={0x3}, @mpls={[], @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x88, 0x0, @dev, @remote}, @timestamp={0xd, 0x0, 0x0, 0x0, 0x3}}}}, 0x100c) 08:35:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000815, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) [ 223.035520][ T8627] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 223.049386][ T8601] device vlan0 entered promiscuous mode [ 223.126458][ T8584] device vlan0 left promiscuous mode [ 223.139899][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 223.183548][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 223.443562][ T8608] device vlan0 entered promiscuous mode [ 223.464285][ T8615] tap0: tun_chr_ioctl cmd 1074025672 [ 223.479337][ T8615] tap0: ignored: set checksum enabled 08:35:00 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="89000000120081ae08060c0f006b3f007f03e3f74001000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef6a80277bec00123d000200190077a0bdad446b9bbc7a46e3988285dcdf12f213d3f868fecea4e455166883ad14955f947ee2b49e566f8afa8af92347510f0b56a20ff27f", 0x89}], 0x1}, 0x0) 08:35:00 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r4, 0x400454cd, 0x4) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:00 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) 08:35:00 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r3, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4810f02cfa8b99c99cf65439e85fc569bae8277099e9b3294126d859e9f9eb6ab8c9284161afc80d9e3032025951c87a1bdcb7b5d0625361b219d4284f30703e2dc78afd3b598e4bc8c6e5200576dec0e86a0314a8928e6994f8b42cd2c66ef44f1a6dbe0ae9bbec4d02b94b4dbcd81ebdb9818a3ea48e34a650376921cbb34e39f976deedad471e596fbc855357b97", 0xe6}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {0x0}], 0x4}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:00 executing program 3: [ 223.827191][ T8647] device vlan0 left promiscuous mode [ 224.118697][ T8648] device vlan0 left promiscuous mode [ 224.419185][ T8654] device vlan0 entered promiscuous mode [ 224.455112][ T8652] device vlan0 entered promiscuous mode 08:35:02 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 08:35:02 executing program 3: 08:35:02 executing program 4: 08:35:02 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r4, 0x400454cd, 0x4) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:02 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r3, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4810f02cfa8b99c99cf65439e85fc569bae8277099e9b3294126d859e9f9eb6ab8c9284161afc80d9e3032025951c87a1bdcb7b5d0625361b219d4284f30703e2dc78afd3b598e4bc8c6e5200576dec0e86a0314a8928e6994f8b42cd2c66ef44f1a6dbe0ae9bbec4d02b94b4dbcd81ebdb9818a3ea48e34a650376921cbb34e39f976deedad471e596fbc855357b97", 0xe6}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {0x0}], 0x4}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 225.070327][ T8674] device vlan0 left promiscuous mode [ 225.471073][ T8673] device vlan0 left promiscuous mode [ 225.991587][ T8678] device vlan0 entered promiscuous mode [ 226.003200][ T8679] device vlan0 entered promiscuous mode [ 226.012838][ T8681] tap0: tun_chr_ioctl cmd 1074025672 [ 226.018794][ T8681] tap0: ignored: set checksum enabled 08:35:03 executing program 0: 08:35:03 executing program 4: 08:35:03 executing program 3: 08:35:03 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000500) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:03 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r3, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4810f02cfa8b99c99cf65439e85fc569bae8277099e9b3294126d859e9f9eb6ab8c9284161afc80d9e3032025951c87a1bdcb7b5d0625361b219d4284f30703e2dc78afd3b598e4bc8c6e5200576dec0e86a0314a8928e6994f8b42cd2c66ef44f1a6dbe0ae9bbec4d02b94b4dbcd81ebdb9818a3ea48e34a650376921cbb34e39f976deedad471e596fbc855357b97", 0xe6}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {0x0}], 0x4}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:03 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 08:35:03 executing program 4: [ 226.161389][ T8700] device vlan0 left promiscuous mode 08:35:03 executing program 3: 08:35:03 executing program 0: 08:35:03 executing program 4: 08:35:03 executing program 3: 08:35:03 executing program 0: 08:35:03 executing program 4: 08:35:03 executing program 3: 08:35:03 executing program 0: [ 226.536733][ T8703] device vlan0 left promiscuous mode [ 226.843628][ T8704] device vlan0 entered promiscuous mode 08:35:04 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 226.900194][ T8707] device vlan0 entered promiscuous mode [ 226.956112][ T8714] tap0: tun_chr_ioctl cmd 1074025672 [ 226.964909][ T8714] tap0: ignored: set checksum enabled 08:35:04 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r3, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4810f02cfa8b99c99cf65439e85fc569bae8277099e9b3294126d859e9f9eb6ab8c9284161afc80d9e3032025951c87a1bdcb7b5d0625361b219d4284f30703e2dc78afd3b598e4bc8c6e5200576dec0e86a0314a8928e6994f8b42cd2c66ef44f1a6dbe0ae9bbec4d02b94b4dbcd81ebdb9818a3ea48e34a650376921cbb34e39f976deedad471e596fbc855357b97", 0xe6}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {0x0}], 0x4}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 227.072436][ T8731] device vlan0 left promiscuous mode [ 227.309459][ T8732] device vlan0 entered promiscuous mode [ 227.375180][ T8737] device vlan0 left promiscuous mode [ 227.573793][ T8739] device vlan0 entered promiscuous mode [ 227.614633][ T7362] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 08:35:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 08:35:04 executing program 4: 08:35:04 executing program 3: 08:35:04 executing program 0: 08:35:04 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 227.796038][ T8749] tap0: tun_chr_ioctl cmd 1074025672 08:35:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) setregid(0x0, 0x0) fchown(r0, 0x0, 0x0) 08:35:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, 0x0) pipe(0x0) 08:35:05 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x3}, 0x40) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'veth1\x00', &(0x7f0000000040)=ANY=[]}) bpf$BPF_GET_MAP_INFO(0x2, &(0x7f00000000c0)={r0, 0x28, &(0x7f00000003c0)}, 0x30) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) memfd_create(0x0, 0x0) setresuid(0xee00, 0x0, 0x0) 08:35:05 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r3, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4810f02cfa8b99c99cf65439e85fc569bae8277099e9b3294126d859e9f9eb6ab8c9284161afc80d9e3032025951c87a1bdcb7b5d0625361b219d4284f30703e2dc78afd3b598e4bc8c6e5200576dec0e86a0314a8928e6994f8b42cd2c66ef44f1a6dbe0ae9bbec4d02b94b4dbcd81ebdb9818a3ea48e34a650376921cbb34e39f976deedad471e596fbc855357b97", 0xe6}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {0x0}], 0x4}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 227.846804][ T8749] tap0: ignored: set checksum enabled 08:35:05 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 227.933562][ T8761] device vlan0 left promiscuous mode [ 227.958969][ T8765] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 08:35:05 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xa3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000340)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @remote}, @IFLA_IPTUN_6RD_RELAY_PREFIXLEN={0x6}]}}}]}, 0x40}}, 0x0) 08:35:05 executing program 3: 08:35:05 executing program 3: 08:35:05 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x4000000, 0x0) r0 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x3c5e, 0x12, 0x7, 0x0, "f8ce9f4e0f41e0ce0b4bb5affe97a01a0f30aabf2b7d24e084a8e9837692b3c5d174664cfb23a368539a9aa9eec5d0961daf63ea0f7ae7c7a30999b703304e72", "31f0a02800fc324451d710d9ec08495739c367cb691d190adad6b60dbebc2ccc", [0x0, 0x1]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000000)={0xdc, 0x1a, &(0x7f0000000380)="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"}) 08:35:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="80", 0x1, 0x8d5, 0x0, 0x0) 08:35:05 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xa3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) [ 228.476136][ T8762] device vlan0 left promiscuous mode [ 228.751897][ T8768] device vlan0 entered promiscuous mode [ 228.766146][ T8769] device vlan0 entered promiscuous mode [ 228.796116][ T8783] tap0: tun_chr_ioctl cmd 1074025672 [ 228.804001][ T8783] tap0: ignored: set checksum enabled 08:35:05 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:05 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) listxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r0, 0x0, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup(r2) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x4}, {}, {0x2, 0x5}, {0x2, 0x1}, {0x2, 0x4}, {0x2, 0x7}, {0x2, 0x1}, {0x2, 0x2}, {}], {0x4, 0x6}, [{0x8, 0x7}, {0x8, 0x4}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x2}], {0x10, 0x1}, {0x20, 0x1}}, 0x94, 0x2) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x4000000a, 0x4) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000080)={0xfffffa86, 0x2, 0xc3, &(0x7f0000000180)="202cc6471840392fa093583998e8b0ec42850cc7cbf9f1e54bf688b8c5f05cff92a296cf4355c4dd5473164a8754438985a487aac08e9375197e2c33f314320021d23719ab8a09d03bebc09ad1b25f2d889627855b1a76c2cbc03c63804344f4317b696eb0adaff1c0bcc568589e56a8fac72ea95a4ffc5dbc19410b49f11974c1e884b5582496fd7eee8e629e02b9f9650ec1ede180fd4a313c0e210330f34806348092782b0e46711242a675d13aed0857984d9fa933dbf89bdafa10297047f0e06e"}) shutdown(r0, 0x1) sendto$inet6(r1, 0x0, 0x504, 0x20000006, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 08:35:06 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xa3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000340)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @remote}, @IFLA_IPTUN_6RD_RELAY_PREFIXLEN={0x6}]}}}]}, 0x40}}, 0x0) 08:35:06 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r3, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4810f02cfa8b99c99cf65439e85fc569bae8277099e9b3294126d859e9f9eb6ab8c9284161afc80d9e3032025951c87a1bdcb7b5d0625361b219d4284f30703e2dc78afd3b598e4bc8c6e5200576dec0e86a0314a8928e6994f8b42cd2c66ef44f1a6dbe0ae9bbec4d02b94b4dbcd81ebdb9818a3ea48e34a650376921cbb34e39f976deedad471e596fbc855357b97", 0xe6}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {0x0}], 0x4}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 229.001848][ T8812] device vlan0 left promiscuous mode 08:35:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="25bca2740a0000002734fa0095e0612687ecb86a548802a902000000020000135200000079a782d2250000000206e73ba8f4952bedc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@journal_path={'journal_path', 0x3d, './file1'}}]}) [ 229.110863][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 229.158916][ T8818] EXT4-fs (loop0): error: journal path ./file1 is not a block device [ 229.226704][ T8818] EXT4-fs (loop0): error: journal path ./file1 is not a block device [ 229.260241][ T8814] device vlan0 entered promiscuous mode 08:35:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:35:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000100)={0x3, 0x0, [{}, {}, {}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)) chown(&(0x7f00000000c0)='./bus\x00', 0xee01, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) [ 229.355418][ T8816] device vlan0 left promiscuous mode [ 229.406948][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:35:06 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:06 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='veth1_vlan\x00', 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xc6dd, 0xf087}, 0x14) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 08:35:06 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) listxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r0, 0x0, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup(r2) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x4}, {}, {0x2, 0x5}, {0x2, 0x1}, {0x2, 0x4}, {0x2, 0x7}, {0x2, 0x1}, {0x2, 0x2}, {}], {0x4, 0x6}, [{0x8, 0x7}, {0x8, 0x4}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x2}], {0x10, 0x1}, {0x20, 0x1}}, 0x94, 0x2) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x4000000a, 0x4) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000080)={0xfffffa86, 0x2, 0xc3, &(0x7f0000000180)="202cc6471840392fa093583998e8b0ec42850cc7cbf9f1e54bf688b8c5f05cff92a296cf4355c4dd5473164a8754438985a487aac08e9375197e2c33f314320021d23719ab8a09d03bebc09ad1b25f2d889627855b1a76c2cbc03c63804344f4317b696eb0adaff1c0bcc568589e56a8fac72ea95a4ffc5dbc19410b49f11974c1e884b5582496fd7eee8e629e02b9f9650ec1ede180fd4a313c0e210330f34806348092782b0e46711242a675d13aed0857984d9fa933dbf89bdafa10297047f0e06e"}) shutdown(r0, 0x1) sendto$inet6(r1, 0x0, 0x504, 0x20000006, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 229.692507][ T8821] device vlan0 entered promiscuous mode [ 229.859933][ T8840] tap0: tun_chr_ioctl cmd 1074025672 [ 229.866496][ T8840] tap0: ignored: set checksum enabled [ 229.877030][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 229.934909][ T8843] device vlan0 left promiscuous mode 08:35:07 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r3, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4810f02cfa8b99c99cf65439e85fc569bae8277099e9b3294126d859e9f9eb6ab8c9284161afc80d9e3032025951c87a1bdcb7b5d0625361b219d4284f30703e2dc78afd3b598e4bc8c6e5200576dec0e86a0314a8928e6994f8b42cd2c66ef44f1a6dbe0ae9bbec4d02b94b4dbcd81ebdb9818a3ea48e34a650376921cbb34e39f976deedad471e596fbc855357b97", 0xe6}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {0x0}], 0x4}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:07 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) listxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r0, 0x0, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup(r2) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x4}, {}, {0x2, 0x5}, {0x2, 0x1}, {0x2, 0x4}, {0x2, 0x7}, {0x2, 0x1}, {0x2, 0x2}, {}], {0x4, 0x6}, [{0x8, 0x7}, {0x8, 0x4}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x2}], {0x10, 0x1}, {0x20, 0x1}}, 0x94, 0x2) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x4000000a, 0x4) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000080)={0xfffffa86, 0x2, 0xc3, &(0x7f0000000180)="202cc6471840392fa093583998e8b0ec42850cc7cbf9f1e54bf688b8c5f05cff92a296cf4355c4dd5473164a8754438985a487aac08e9375197e2c33f314320021d23719ab8a09d03bebc09ad1b25f2d889627855b1a76c2cbc03c63804344f4317b696eb0adaff1c0bcc568589e56a8fac72ea95a4ffc5dbc19410b49f11974c1e884b5582496fd7eee8e629e02b9f9650ec1ede180fd4a313c0e210330f34806348092782b0e46711242a675d13aed0857984d9fa933dbf89bdafa10297047f0e06e"}) shutdown(r0, 0x1) sendto$inet6(r1, 0x0, 0x504, 0x20000006, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 08:35:07 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='veth1_vlan\x00', 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xc6dd, 0xf087}, 0x14) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) [ 230.532910][ T8848] device vlan0 entered promiscuous mode [ 230.555446][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 230.584118][ T8854] device vlan0 left promiscuous mode 08:35:07 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000100)={0x3, 0x0, [{}, {}, {}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)) chown(&(0x7f00000000c0)='./bus\x00', 0xee01, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) 08:35:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000100)={0x3, 0x0, [{}, {}, {}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)) chown(&(0x7f00000000c0)='./bus\x00', 0xee01, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) [ 230.911880][ T8856] device vlan0 entered promiscuous mode 08:35:08 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='veth1_vlan\x00', 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xc6dd, 0xf087}, 0x14) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) [ 231.599835][ T8869] device vlan0 left promiscuous mode 08:35:09 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:35:09 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r3, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4810f02cfa8b99c99cf65439e85fc569bae8277099e9b3294126d859e9f9eb6ab8c9284161afc80d9e3032025951c87a1bdcb7b5d0625361b219d4284f30703e2dc78afd3b598e4bc8c6e5200576dec0e86a0314a8928e6994f8b42cd2c66ef44f1a6dbe0ae9bbec4d02b94b4dbcd81ebdb9818a3ea48e34a650376921cbb34e39f976deedad471e596fbc855357b97", 0xe6}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {0x0}], 0x4}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000100)={0x3, 0x0, [{}, {}, {}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)) chown(&(0x7f00000000c0)='./bus\x00', 0xee01, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) 08:35:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000100)={0x3, 0x0, [{}, {}, {}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)) chown(&(0x7f00000000c0)='./bus\x00', 0xee01, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) [ 232.012855][ T8872] device vlan0 entered promiscuous mode 08:35:09 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 232.142494][ T8895] device vlan0 left promiscuous mode 08:35:09 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='veth1_vlan\x00', 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xc6dd, 0xf087}, 0x14) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) [ 232.883449][ T8902] device vlan0 left promiscuous mode 08:35:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000100)={0x3, 0x0, [{}, {}, {}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)) chown(&(0x7f00000000c0)='./bus\x00', 0xee01, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) 08:35:10 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) listxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r0, 0x0, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup(r2) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x4}, {}, {0x2, 0x5}, {0x2, 0x1}, {0x2, 0x4}, {0x2, 0x7}, {0x2, 0x1}, {0x2, 0x2}, {}], {0x4, 0x6}, [{0x8, 0x7}, {0x8, 0x4}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x2}], {0x10, 0x1}, {0x20, 0x1}}, 0x94, 0x2) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x4000000a, 0x4) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000080)={0xfffffa86, 0x2, 0xc3, &(0x7f0000000180)="202cc6471840392fa093583998e8b0ec42850cc7cbf9f1e54bf688b8c5f05cff92a296cf4355c4dd5473164a8754438985a487aac08e9375197e2c33f314320021d23719ab8a09d03bebc09ad1b25f2d889627855b1a76c2cbc03c63804344f4317b696eb0adaff1c0bcc568589e56a8fac72ea95a4ffc5dbc19410b49f11974c1e884b5582496fd7eee8e629e02b9f9650ec1ede180fd4a313c0e210330f34806348092782b0e46711242a675d13aed0857984d9fa933dbf89bdafa10297047f0e06e"}) shutdown(r0, 0x1) sendto$inet6(r1, 0x0, 0x504, 0x20000006, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 233.396210][ T8900] device vlan0 entered promiscuous mode [ 233.417187][ T8907] tap0: tun_chr_ioctl cmd 1074025672 [ 233.428649][ T8907] tap0: ignored: set checksum enabled [ 233.500108][ T8904] device vlan0 entered promiscuous mode 08:35:10 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r3, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4810f02cfa8b99c99cf65439e85fc569bae8277099e9b3294126d859e9f9eb6ab8c9284161afc80d9e3032025951c87a1bdcb7b5d0625361b219d4284f30703e2dc78afd3b598e4bc8c6e5200576dec0e86a0314a8928e6994f8b42cd2c66ef44f1a6dbe0ae9bbec4d02b94b4dbcd81ebdb9818a3ea48e34a650376921cbb34e39f976deedad471e596fbc855357b97", 0xe6}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {0x0}], 0x4}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:10 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='veth1_vlan\x00', 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xc6dd, 0xf087}, 0x14) [ 233.632233][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 08:35:10 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:35:10 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 233.761862][ T8930] device vlan0 left promiscuous mode 08:35:11 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/handlers\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x74000000) 08:35:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000100)={0x3, 0x0, [{}, {}, {}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)) chown(&(0x7f00000000c0)='./bus\x00', 0xee01, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) 08:35:11 executing program 4: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 234.328911][ T8932] device vlan0 entered promiscuous mode [ 234.399326][ T8936] device vlan0 left promiscuous mode 08:35:11 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='veth1_vlan\x00', 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 08:35:11 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r3, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4810f02cfa8b99c99cf65439e85fc569bae8277099e9b3294126d859e9f9eb6ab8c9284161afc80d9e3032025951c87a1bdcb7b5d0625361b219d4284f30703e2dc78afd3b598e4bc8c6e5200576dec0e86a0314a8928e6994f8b42cd2c66ef44f1a6dbe0ae9bbec4d02b94b4dbcd81ebdb9818a3ea48e34a650376921cbb34e39f976deedad471e596fbc855357b97", 0xe6}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {0x0}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000100)={0x3, 0x0, [{}, {}, {}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)) chown(&(0x7f00000000c0)='./bus\x00', 0xee01, 0x0) [ 235.281623][ T8939] device vlan0 entered promiscuous mode [ 235.309019][ T8957] device vlan0 left promiscuous mode 08:35:12 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:12 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='veth1_vlan\x00', 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) [ 235.811454][ T8958] device vlan0 entered promiscuous mode [ 235.859968][ T8969] device vlan0 left promiscuous mode 08:35:13 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:35:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x44}}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000006f40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000006f00)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}}], 0x2, 0x0) 08:35:13 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r3, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4810f02cfa8b99c99cf65439e85fc569bae8277099e9b3294126d859e9f9eb6ab8c9284161afc80d9e3032025951c87a1bdcb7b5d0625361b219d4284f30703e2dc78afd3b598e4bc8c6e5200576dec0e86a0314a8928e6994f8b42cd2c66ef44f1a6dbe0ae9bbec4d02b94b4dbcd81ebdb9818a3ea48e34a650376921cbb34e39f976deedad471e596fbc855357b97", 0xe6}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {0x0}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000100)={0x3, 0x0, [{}, {}, {}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)) [ 236.370922][ T8970] device vlan0 entered promiscuous mode [ 236.405376][ T8983] device vlan0 left promiscuous mode 08:35:13 executing program 4: pipe(&(0x7f0000000140)) socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000280)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 08:35:13 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='veth1_vlan\x00', 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) [ 236.807640][ T27] audit: type=1326 audit(1595666113.934:2): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=8998 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f1aa code=0x0 08:35:14 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000100)={0x3, 0x0, [{}, {}, {}]}) [ 237.055770][ T8988] device vlan0 entered promiscuous mode 08:35:14 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 237.321385][ T9011] device vlan0 left promiscuous mode 08:35:14 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r3, 0x400454cd, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4810f02cfa8b99c99cf65439e85fc569bae8277099e9b3294126d859e9f9eb6ab8c9284161afc80d9e3032025951c87a1bdcb7b5d0625361b219d4284f30703e2dc78afd3b598e4bc8c6e5200576dec0e86a0314a8928e6994f8b42cd2c66ef44f1a6dbe0ae9bbec4d02b94b4dbcd81ebdb9818a3ea48e34a650376921cbb34e39f976deedad471e596fbc855357b97", 0xe6}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {0x0}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 237.422715][ T27] audit: type=1326 audit(1595666114.554:3): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=8998 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f1aa code=0x0 08:35:14 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='veth1_vlan\x00', 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) 08:35:14 executing program 4: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fdatasync(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0000005b625e8cfd68a4c068e62a8f59f065f62e9a4e87e81987b73ab1b8b3a04e3633d5bda2e0a95a7cdfee9b4a7e718e091d4b2cfa3baeeae0ec62b3fdf4c836eb2c0900000095d238b5d88a613622ffdd8ddf36e82980e46f00026c7aabfeb0444a493f25136aabf40e5b7484f7da5937e6111fc8ebd3d4a35fc881d3e17e0a55d3829788c92d7c765905b699"]) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) 08:35:15 executing program 4: perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fdatasync(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="b700000001ed9fffbfa30000000000000703000031feffff720af0fff8ffffff71a4f0ff00000000b7060000000000012d4005000000000046040000ffed00003400000000ffffffae640000000000007b0a00fe000000001f14000000000000b7000000000000009500000000000000023bc065b7a32e7f3be3e448078484efdd61917adef6ee1caa2b4f8ef1e50becb39bc461e91a7168c5181554a090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef70548aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd8dff0c710e4cdbf4fc41fbba4f94369e646b8ee6de2109fbe4ef154400e2438ec649dc74a1a6188f50643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda8a3658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53976c9e10aceb539f38887ad1714e72ba7a54f0c33d39000d06ad99edc3a6138d5fcfba53f8d0c67ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdf098bc908f523d228a40f9411fe72be928a432efa4bdd46756d50b928f63fc77b83ee81294484fa6da21b62987c71c1d6e6297eadbab95444937b029e3bd90eef51977a085eaa790167cdd110d9fcc36a8dc6cf1c8e24fe23d7b6727a611b731c6fc186844deadc5bdaa83c0556cbb3c0596ecc9413ae6e640db66d145a196070e70500000000000000df9aabe9955526185f6e3a050e058a3fd8a6707cf000697bd43dbe5925f2a526e584500e941314de904a2413363d49c5218bda21a5a2be9ade7a4b"], &(0x7f00000001c0)='GPL\x00'}, 0x48) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0000005b625e8cfd68a4c068e62a8f59f065f62e9a4e87e81987b73ab1b8b3a04e3633d5bda2e0a95a7cdfee9b4a7e718e091d4b2cfa3baeeae0ec62b3fdf4c836eb2c0900000095d238b5d88a613622ffdd8ddf36e82980e46f00026c7aabfeb0444a493f25136aabf40e5b7484f7da5937e6111fc8ebd3d4a35fc881d3e17e0a55d3829788c92d7c765905b699"]) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) 08:35:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r0, r1, 0x0) [ 238.074875][ T9015] device vlan0 entered promiscuous mode 08:35:15 executing program 4: syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x4c66d, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='.\x00', 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000240)='./bus\x00', 0x105010, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x42, 0x0) writev(r2, &(0x7f0000000880)=[{&(0x7f0000000280)="abe1fbe93ea881e6055123fd1fe5f5d062b6818de4fb7f3ef48efb750b1d5c84253b83ed24a270c54306f0a5d358d2635bcbd7ba83ef4496afa8c7296a16a57e623fb61441ff95026242229bf9d7ac9e87bf794bdc20ccf5bc0e03f7fd11a05cbb0528267e399374efc45498c0c70186e2cacc4391677893b53d451f239d4688ba690b5fb55755f8ea9acc132478893a9bff95c30e64d6fc7c9bd3bab36b2e24e58f1a9f9c301ceaf236bc416c89f9af9c42c3251ec1ce27f0664b08f95b5de2429bd5dfc8117beeba5dfb12afb24d03ca0164774af1e9c36a474a2c29", 0xdd}, {&(0x7f0000000400)}, {&(0x7f0000000600)}, {0x0}], 0x4) r3 = memfd_create(&(0x7f0000000180)='\x14\xccmPn\x9be\x13\x1d\xe5\x1c\x95\x14tc\x93\xe6\xd1\xa47\xf9\vc8tU\x90\x13\xf3\xfc9\x9bP\xe5\x12\x85\x9c\x86\x87\xe3\x88\xdb\xb5\xd5\xe0q\xfb\r?\x1c\xf5$Q\xdbKo\xe0\x0f\xf1W\xc9w\x10\xa9\xdeW^\x9e\x8eV\xcf8\x00\x02\xb6a\f\xe1\x8a\xeaw\xfe\x8b\xc2\nh}\xc3|p\'\xf0\x8eM-?\xccG_\x16\xa4\x1bQn\xd0\x06\xc7FIR\xd3\x88\f/@*\xe6\x8a\x13)H\xd5\xe7\xa4\xaf\xc5\xe6\xb2p$\xb9\xce\x98\xedY\x8a\xb2t\xaan|\x8a\xa9\x9dC*\xc5\r\x8e\xbb\x1e\xf6:i\xa5r`\xa4ij\x1b\x9a\xfe\x94\x95\xec26!\xe82', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)}], 0x1, 0x81805, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) fsetxattr$security_capability(r3, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v3={0x3000000, [{0x7ff, 0x9b}, {0x7ffffeff, 0x4}], r4}, 0x18, 0x2) sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) 08:35:15 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 238.305456][ T27] audit: type=1804 audit(1595666115.434:4): pid=9044 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir287895219/syzkaller.sBXyot/36/bus" dev="sda1" ino=15836 res=1 errno=0 [ 238.460210][ T27] audit: type=1800 audit(1595666115.434:5): pid=9044 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15836 res=0 errno=0 [ 238.534360][ T9025] device vlan0 left promiscuous mode [ 238.609693][ T27] audit: type=1804 audit(1595666115.544:6): pid=9047 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir287895219/syzkaller.sBXyot/36/bus" dev="sda1" ino=15836 res=1 errno=0 08:35:15 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) [ 239.068275][ T9026] device vlan0 entered promiscuous mode [ 239.084506][ T27] audit: type=1804 audit(1595666116.214:7): pid=9047 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir287895219/syzkaller.sBXyot/36/bus" dev="sda1" ino=15836 res=1 errno=0 08:35:16 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r3, 0x400454cd, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 239.177162][ T27] audit: type=1804 audit(1595666116.244:8): pid=9047 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir287895219/syzkaller.sBXyot/36/bus" dev="sda1" ino=15836 res=1 errno=0 08:35:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r0, r1, 0x0) 08:35:16 executing program 4: syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x4c66d, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='.\x00', 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000240)='./bus\x00', 0x105010, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x42, 0x0) writev(r2, &(0x7f0000000880)=[{&(0x7f0000000280)="abe1fbe93ea881e6055123fd1fe5f5d062b6818de4fb7f3ef48efb750b1d5c84253b83ed24a270c54306f0a5d358d2635bcbd7ba83ef4496afa8c7296a16a57e623fb61441ff95026242229bf9d7ac9e87bf794bdc20ccf5bc0e03f7fd11a05cbb0528267e399374efc45498c0c70186e2cacc4391677893b53d451f239d4688ba690b5fb55755f8ea9acc132478893a9bff95c30e64d6fc7c9bd3bab36b2e24e58f1a9f9c301ceaf236bc416c89f9af9c42c3251ec1ce27f0664b08f95b5de2429bd5dfc8117beeba5dfb12afb24d03ca0164774af1e9c36a474a2c29", 0xdd}, {&(0x7f0000000400)}, {&(0x7f0000000600)}, {0x0}], 0x4) r3 = memfd_create(&(0x7f0000000180)='\x14\xccmPn\x9be\x13\x1d\xe5\x1c\x95\x14tc\x93\xe6\xd1\xa47\xf9\vc8tU\x90\x13\xf3\xfc9\x9bP\xe5\x12\x85\x9c\x86\x87\xe3\x88\xdb\xb5\xd5\xe0q\xfb\r?\x1c\xf5$Q\xdbKo\xe0\x0f\xf1W\xc9w\x10\xa9\xdeW^\x9e\x8eV\xcf8\x00\x02\xb6a\f\xe1\x8a\xeaw\xfe\x8b\xc2\nh}\xc3|p\'\xf0\x8eM-?\xccG_\x16\xa4\x1bQn\xd0\x06\xc7FIR\xd3\x88\f/@*\xe6\x8a\x13)H\xd5\xe7\xa4\xaf\xc5\xe6\xb2p$\xb9\xce\x98\xedY\x8a\xb2t\xaan|\x8a\xa9\x9dC*\xc5\r\x8e\xbb\x1e\xf6:i\xa5r`\xa4ij\x1b\x9a\xfe\x94\x95\xec26!\xe82', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)}], 0x1, 0x81805, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) fsetxattr$security_capability(r3, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000100)=@v3={0x3000000, [{0x7ff, 0x9b}, {0x7ffffeff, 0x4}], r4}, 0x18, 0x2) sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) [ 239.302179][ T27] audit: type=1804 audit(1595666116.264:9): pid=9058 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir287895219/syzkaller.sBXyot/36/bus" dev="sda1" ino=15836 res=1 errno=0 [ 239.556063][ T27] audit: type=1804 audit(1595666116.514:10): pid=9065 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir287895219/syzkaller.sBXyot/37/bus" dev="sda1" ino=15849 res=1 errno=0 [ 239.670003][ T9046] device vlan0 left promiscuous mode [ 239.806526][ T27] audit: type=1800 audit(1595666116.514:11): pid=9065 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15849 res=0 errno=0 08:35:17 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:35:17 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) 08:35:17 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x0, 0x0, @pic={0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f00000000c0)={0x9}) 08:35:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) [ 240.273707][ T9050] device vlan0 entered promiscuous mode [ 240.282185][ T9060] device vlan0 left promiscuous mode 08:35:17 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:17 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000011000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x301882, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000080)={0x50, 0x0, 0x7, {0x7, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}}, 0x50) epoll_create(0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r1, 0x8208200) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 08:35:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) [ 240.748221][ T9061] device vlan0 entered promiscuous mode [ 240.779850][ T9091] device vlan0 left promiscuous mode 08:35:17 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:35:18 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r3, 0x400454cd, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:18 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000011000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x301882, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000080)={0x50, 0x0, 0x7, {0x7, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}}, 0x50) epoll_create(0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r1, 0x8208200) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 08:35:18 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) [ 241.289029][ T9094] device vlan0 entered promiscuous mode 08:35:18 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) 08:35:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 241.718863][ T9105] device vlan0 left promiscuous mode [ 242.147541][ T9108] device vlan0 entered promiscuous mode 08:35:19 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:35:19 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000500) ioctl$TUNSETLINK(r3, 0x400454cd, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 242.515461][ T9125] device vlan0 left promiscuous mode 08:35:19 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) [ 242.913767][ T9128] device vlan0 entered promiscuous mode 08:35:20 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454c8, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:35:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) [ 243.001130][ T9133] device vlan0 left promiscuous mode 08:35:20 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000500) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:20 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) [ 243.511608][ T9135] device vlan0 entered promiscuous mode [ 243.532063][ T9145] device vlan0 left promiscuous mode [ 244.097501][ T9146] device vlan0 entered promiscuous mode [ 244.135960][ T27] kauditd_printk_skb: 2 callbacks suppressed 08:35:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) 08:35:21 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454c8, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:35:21 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) [ 244.135974][ T27] audit: type=1800 audit(1595666121.264:14): pid=9110 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=15795 res=0 errno=0 08:35:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) 08:35:21 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454c8, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:35:21 executing program 0: pipe(&(0x7f0000000100)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) 08:35:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) [ 244.468080][ T9158] device vlan0 left promiscuous mode 08:35:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) 08:35:21 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000500) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) 08:35:21 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) [ 244.819794][ T9159] device vlan0 entered promiscuous mode [ 244.894746][ T9171] device vlan0 left promiscuous mode [ 245.085194][ T9174] device vlan0 entered promiscuous mode 08:35:22 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='map_files\x00') fcntl$notify(r0, 0x402, 0x4) 08:35:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) 08:35:22 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) 08:35:22 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:22 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:35:22 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 245.193228][ T9188] device vlan0 left promiscuous mode 08:35:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) 08:35:22 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) 08:35:22 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) 08:35:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x3fc, 0x0) flock(r1, 0x1) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) flock(r2, 0x2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 08:35:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, &(0x7f0000000140)=0x140000a16, 0x4) [ 245.582984][ T9192] device vlan0 entered promiscuous mode 08:35:22 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:35:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, &(0x7f0000000140)=0x140000a16, 0x4) 08:35:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, &(0x7f0000000140)=0x140000a16, 0x4) 08:35:23 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) [ 245.942688][ T9198] device vlan0 left promiscuous mode 08:35:23 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, r3, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0x0) [ 246.254739][ T9202] device vlan0 entered promiscuous mode 08:35:23 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0x0) 08:35:23 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) 08:35:23 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 246.419868][ T9223] device vlan0 left promiscuous mode 08:35:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x54}}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfc76, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)}, 0x48) 08:35:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0x0) 08:35:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140), 0x4) 08:35:23 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) [ 246.752942][ T9226] device vlan0 entered promiscuous mode 08:35:24 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:35:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140), 0x4) 08:35:24 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140), 0x4) [ 247.167787][ T9235] device vlan0 left promiscuous mode [ 247.359346][ T9236] device vlan0 entered promiscuous mode 08:35:24 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x54}}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfc76, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)}, 0x48) 08:35:24 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) [ 247.518009][ T9253] device vlan0 left promiscuous mode 08:35:24 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xecef}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x30009, 0x1c10000000000000) [ 247.794047][ T9257] device vlan0 entered promiscuous mode [ 247.834303][ T9271] device vlan0 left promiscuous mode 08:35:25 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:35:25 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r2, 0x48280) fcntl$setstatus(r1, 0x4, 0x6100) write$FUSE_NOTIFY_STORE(r1, 0x0, 0x87ffffc) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) write(r1, &(0x7f0000000300)="8a", 0x1) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ftruncate(r0, 0x200004) r6 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) sendfile(r6, r6, 0x0, 0x8080fffffffe) 08:35:25 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:25 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) [ 248.251881][ T9274] device vlan0 entered promiscuous mode [ 248.355352][ T9281] device vlan0 left promiscuous mode 08:35:25 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) 08:35:25 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x107c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f00001f5000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000400)="c4c2318cbd6600000066bad004b05eee0f20d835080000000f22d8b8010000000f01d967400f01c966ba2100ed48b8a3090000000000000f23c80f21f8350000b0000f23f866ba4300b000eec401f9c640f750b9800000c00f3235004000000f30", 0x61}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000040)) 08:35:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) [ 248.801133][ T9285] device vlan0 entered promiscuous mode [ 248.854807][ T9292] device vlan0 left promiscuous mode 08:35:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:35:26 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:26 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000200)=ANY=[], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) dup2(r3, r1) [ 249.195961][ T9295] device vlan0 entered promiscuous mode 08:35:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) 08:35:26 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0x0, 0xefffffcf, 0x81}, 0x0, 0x4, r2, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 249.259333][ T9308] device vlan0 left promiscuous mode [ 249.679190][ T9312] device vlan0 entered promiscuous mode 08:35:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:35:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) [ 249.777352][ T9320] device vlan0 left promiscuous mode 08:35:26 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, 0x0, 0x4, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 250.045379][ T9321] device vlan0 entered promiscuous mode [ 250.086653][ T9332] device vlan0 left promiscuous mode 08:35:27 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) [ 250.476020][ T9334] device vlan0 entered promiscuous mode [ 250.538349][ T9341] device vlan0 left promiscuous mode [ 250.878396][ T9343] device vlan0 entered promiscuous mode [ 250.898892][ T7181] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 08:35:28 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x107c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f00001f5000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000400)="c4c2318cbd6600000066bad004b05eee0f20d835080000000f22d8b8010000000f01d967400f01c966ba2100ed48b8a3090000000000000f23c80f21f8350000b0000f23f866ba4300b000eec401f9c640f750b9800000c00f3235004000000f30", 0x61}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000040)) 08:35:28 executing program 0: 08:35:28 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:35:28 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, 0x0, 0x4, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) 08:35:28 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:28 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x107c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f00001f5000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000400)="c4c2318cbd6600000066bad004b05eee0f20d835080000000f22d8b8010000000f01d967400f01c966ba2100ed48b8a3090000000000000f23c80f21f8350000b0000f23f866ba4300b000eec401f9c640f750b9800000c00f3235004000000f30", 0x61}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000040)) [ 251.370426][ T9365] device vlan0 left promiscuous mode 08:35:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) [ 251.889173][ T9367] device vlan0 left promiscuous mode 08:35:29 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, 0x0, 0x4, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 252.266414][ T9371] device vlan0 entered promiscuous mode 08:35:29 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, 0x0, 0x4, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:29 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:35:29 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 252.665878][ T9396] device vlan0 left promiscuous mode [ 253.009129][ T9397] device vlan0 entered promiscuous mode 08:35:30 executing program 4: 08:35:30 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) r1 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, 0x0, 0x4, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:30 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:35:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) 08:35:30 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:30 executing program 4: [ 253.691461][ T9414] device vlan0 left promiscuous mode [ 254.014984][ T9413] device vlan0 entered promiscuous mode [ 254.026905][ T9416] device vlan0 entered promiscuous mode [ 254.071408][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 08:35:31 executing program 0: 08:35:31 executing program 4: 08:35:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) 08:35:31 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:35:31 executing program 5: r0 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, 0x0, 0x4, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:31 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) [ 254.360109][ T9436] device vlan0 left promiscuous mode 08:35:31 executing program 4: 08:35:31 executing program 5: r0 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, 0x0, 0x4, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:31 executing program 0: 08:35:31 executing program 4: 08:35:31 executing program 0: 08:35:32 executing program 0: 08:35:32 executing program 4: [ 254.980247][ T9439] device vlan0 entered promiscuous mode 08:35:32 executing program 4: 08:35:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) 08:35:32 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:35:32 executing program 5: r0 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, 0x0, 0x4, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:32 executing program 0: 08:35:32 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00', @remote}) r1 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0xe9, 0x0, &(0x7f0000000980)="7be3d8585e8a8840aa83b142baf67683bd216ce7957f3749777927a43fff6b66a7a2c416cc7996e91715a2b5d62c12a17e10203ef7dabb23af43b3f1b10fa5aa8b18bab6eb8d48fe06c118ec4301f0645a9b3de7b68e9de5001a667ba6a74d284291209b678c8d58e8c3dc00d73f260dcf724e58dc1f23b06c1bda3cd40bdd0ec91f3252fe539799e9d7a706e30dd0e31fe0058e7f9ecbbedfe7e57940f06ef3552c28af6dcc6a0bdac337efef68d83fa66fe12523ab201d214ba9551bb6d92c60193f7befc0fa4d0916e3012f9873346248f275b848b0092932ef2982c07217961bc3336edaa8b257", 0x0}, 0x40) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:32 executing program 4: 08:35:32 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454c9, 0x9) ioctl$TUNSETPERSIST(r0, 0x400454c8, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:35:32 executing program 0: 08:35:32 executing program 5: r0 = socket$kcm(0x2, 0x0, 0x2) r1 = socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x6, 0xa0144, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x47c000000000000}, 0x16810, 0x1, 0x7, 0x8, 0xd40, 0xefffffcf, 0x81}, 0x0, 0x4, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)="7105258404cb4774c60e3eaaeed892dedafdf934efbbdcf624767248d5c3be15a5991160fe48928dbdaacaa0bc555a586f45ddb2ec8113cc387cbe801db719e99ff1faa9153533148b558acd993bd20aae15acb8107df4", 0x57}, {&(0x7f00000005c0)="a5c65c87bfe0d15995b4289afa67f5114175f694795aecb9502d6ca9dd97d437b3d82d58edb7ea3a5adda9afd2794966f76066210dfdebb72487c52980b3baf6f7e7ee6fa26859bb969aff4e53b43e1c9dd44068b8e3e40247c41365317f7a45ac6708a523f73f8f5ef30f5a8ac22fa2ebab9112cbe56da9c9426e92dea2384f3699e3774483a22d5ac56e7634f793a1e20da353f95c605c0ffa92e22e72ae30de669c865cb3e61931aae6d837a9ce7466704108595fdb443d8ec31e9adc78d8187f55e5a49fd8824ccbb31d02b521573e53c75bff0de6d350", 0xd9}, {&(0x7f00000006c0)="b74906eb39217e798c20e32e0db8f65c70441fe5f48916f813a7152ddcb29788a01b2b306b5d0283c0d09459a033279c9072573da4c49fc73ff10c9fb6a60c22d0ddc076951fb997cfe686821191bafb26faf51427e2647d29b5032f17a9b2390bd488518ef348fc35cd1d0b7e51506b72b2563689accb058dfff73f2f6378c9833da87bcc80822a1f7c86633f9ea52ab1453a341a1577ab8d95fc641463be57cf51d06e4dd98424f0a5e266ddb8", 0xae}, {&(0x7f0000000040)}], 0x4}, 0x1) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 08:35:32 executing program 4: 08:35:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) 08:35:32 executing program 4: [ 255.546544][ T9463] device vlan0 left promiscuous mode 08:35:32 executing program 0: 08:35:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x812a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0xda00) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) write$cgroup_int(r0, &(0x7f0000000200), 0x44000) 08:35:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(0x0, r2, 0x0, r1, 0x2) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x800, 0x8420, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x7ff, 0x1}, 0x0, 0x9, 0x4, 0x8, 0x9, 0x6, 0x81}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a08, 0x1700) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x46, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, r4, 0xe, 0xffffffffffffffff, 0xf) 08:35:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002003, 0x0}}], 0xc6, 0x0) [ 255.756858][ T9492] ------------[ cut here ]------------ [ 255.762646][ T9492] WARNING: CPU: 0 PID: 9492 at arch/x86/entry/common.c:692 idtentry_exit+0x4a/0x90 [ 255.771967][ T9492] Kernel panic - not syncing: panic_on_warn set ... [ 255.778561][ T9492] CPU: 0 PID: 9492 Comm: syz-executor.0 Not tainted 5.8.0-rc6-next-20200724-syzkaller #0 [ 255.788378][ T9492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.798434][ T9492] Call Trace: [ 255.801742][ T9492] dump_stack+0x18f/0x20d [ 255.806115][ T9492] panic+0x2e3/0x75c [ 255.810015][ T9492] ? __warn_printk+0xf3/0xf3 [ 255.814613][ T9492] ? printk+0xba/0xed [ 255.818606][ T9492] ? log_store.cold+0x16/0x16 [ 255.823295][ T9492] ? no_context+0x120/0x9f0 [ 255.827803][ T9492] ? __warn.cold+0x5/0x45 [ 255.832140][ T9492] ? idtentry_exit+0x4a/0x90 [ 255.836727][ T9492] __warn.cold+0x20/0x45 [ 255.840972][ T9492] ? idtentry_exit+0x4a/0x90 [ 255.845573][ T9492] report_bug+0x1bd/0x210 [ 255.849922][ T9492] handle_bug+0x38/0x90 [ 255.854088][ T9492] exc_invalid_op+0x14/0x40 [ 255.858673][ T9492] asm_exc_invalid_op+0x12/0x20 [ 255.863536][ T9492] RIP: 0010:idtentry_exit+0x4a/0x90 [ 255.868815][ T9492] Code: 91 00 00 00 02 74 18 40 84 f6 75 3e 65 8b 05 2d 8b 15 78 a9 ff ff ff 7f 74 14 e9 11 98 8d f9 40 84 f6 75 42 c3 e9 86 fc ff ff <0f> 0b eb c7 e8 8d 95 75 f9 65 48 8b 04 25 c0 fe 01 00 48 8b 00 a8 [ 255.888430][ T9492] RSP: 0018:ffffc9000683f2d0 EFLAGS: 00010002 [ 255.896535][ T9492] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffc90006219000 [ 255.904509][ T9492] RDX: 0000000000040000 RSI: 0000000000000000 RDI: ffffc9000683f308 [ 255.912504][ T9492] RBP: ffffc9000683f308 R08: 0000000000000000 R09: 0000000000000000 [ 255.920501][ T9492] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 255.928471][ T9492] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 255.936458][ T9492] exc_page_fault+0xc2/0x160 [ 255.938688][ T9466] device vlan0 entered promiscuous mode [ 255.941045][ T9492] asm_exc_page_fault+0x1e/0x30 [ 255.941061][ T9492] RIP: 0010:__softirqentry_text_end+0x39/0x55 [ 255.941077][ T9492] Code: e0 04 e0 ff b8 f2 ff ff ff 31 d2 e9 b6 67 cc ff 41 bf f2 ff ff ff 31 c0 e9 dc 41 e1 f8 41 bf f2 ff ff ff 31 ed e9 f7 41 e1 f8 <41> be f2 ff ff ff 48 31 c0 e9 04 45 e1 f8 41 be f2 ff ff ff 48 31 [ 255.941084][ T9492] RSP: 0018:ffffc9000683f3b0 EFLAGS: 00010046 [ 255.983216][ T9492] RAX: 00000000000056b8 RBX: ffffc9000683f470 RCX: ffffc90006219000 [ 255.991231][ T9492] RDX: 0000000000040000 RSI: ffffffff81014f60 RDI: 0000000000000006 [ 255.999239][ T9492] RBP: 0000000000000000 R08: 0000000000000000 R09: ffff8880528fa0c7 [ 256.007242][ T9492] R10: 0000000000000000 R11: 0000000000000001 R12: ffffc9000683f47c [ 256.015260][ T9492] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8880528fa0c0 [ 256.023289][ T9492] ? perf_callchain_user+0x800/0xba0 [ 256.028610][ T9492] get_perf_callchain+0x321/0x620 [ 256.033671][ T9492] ? put_callchain_entry+0x90/0x90 [ 256.038812][ T9492] ? get_perf_callchain+0x3e0/0x620 [ 256.044039][ T9492] perf_callchain+0x165/0x1c0 [ 256.048738][ T9492] perf_prepare_sample+0x8fd/0x1d40 [ 256.053963][ T9492] ? perf_callchain+0x165/0x1c0 [ 256.058816][ T9492] ? perf_callchain+0x1c0/0x1c0 [ 256.063707][ T9492] ? perf_prepare_sample+0x8ab/0x1d40 [ 256.069087][ T9492] perf_event_output_forward+0xf3/0x270 [ 256.074641][ T9492] ? perf_prepare_sample+0x1d40/0x1d40 [ 256.080121][ T9492] ? perf_event_output_forward+0x18c/0x270 [ 256.085968][ T9492] __perf_event_overflow+0x13c/0x370 [ 256.091632][ T9492] ? unwind_next_frame+0xe3b/0x1f90 [ 256.096858][ T9492] perf_swevent_event+0x347/0x550 [ 256.101910][ T9492] ? tracing_generic_entry_update+0x1e3/0x260 [ 256.108015][ T9492] perf_tp_event+0x2e4/0xb50 [ 256.112608][ T9492] ? perf_swevent_event+0x347/0x550 [ 256.117805][ T9492] ? unwind_get_return_address+0x51/0x90 [ 256.123447][ T9492] ? perf_event_mmap_output+0xa30/0xa30 [ 256.129006][ T9492] ? perf_tp_event+0x622/0xb50 [ 256.133800][ T9492] ? ctx_sched_in+0x123/0x780 [ 256.138764][ T9492] ? __perf_install_in_context+0x36f/0xa10 [ 256.144603][ T9492] ? lock_downgrade+0x830/0x830 [ 256.149486][ T9492] ? perf_event_groups_insert+0x338/0x4e0 [ 256.155247][ T9492] ? mark_lock+0xbc/0x1710 [ 256.159676][ T9492] ? perf_trace_run_bpf_submit+0x11c/0x200 [ 256.165489][ T9492] perf_trace_run_bpf_submit+0x11c/0x200 [ 256.171146][ T9492] perf_trace_lock+0x2e2/0x4a0 [ 256.175940][ T9492] ? perf_trace_run_bpf_submit+0x11c/0x200 [ 256.181783][ T9492] ? __lockdep_free_key_range+0x110/0x110 [ 256.187548][ T9492] ? perf_trace_lock+0x2e2/0x4a0 [ 256.192519][ T9492] ? __do_sys_perf_event_open+0x1c5a/0x2b50 [ 256.198417][ T9492] ? __lockdep_free_key_range+0x110/0x110 [ 256.204163][ T9492] lock_release+0x571/0x8e0 [ 256.208679][ T9492] ? lock_downgrade+0x830/0x830 [ 256.213550][ T9492] ? lock_acquire+0x1f1/0xad0 [ 256.218222][ T9492] ? __do_sys_perf_event_open+0x1c0a/0x2b50 [ 256.224118][ T9492] ? find_held_lock+0x2d/0x110 [ 256.228872][ T9492] __mutex_unlock_slowpath+0x81/0x610 [ 256.234249][ T9492] ? mark_held_locks+0x9f/0xe0 [ 256.239011][ T9492] ? wait_for_completion+0x260/0x260 [ 256.244311][ T9492] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 256.250289][ T9492] ? trace_hardirqs_on+0x5f/0x220 [ 256.255348][ T9492] __do_sys_perf_event_open+0x1c5a/0x2b50 [ 256.261079][ T9492] ? perf_event_set_output+0x4c0/0x4c0 [ 256.266553][ T9492] ? put_timespec64+0xcb/0x120 [ 256.271313][ T9492] ? ns_to_timespec64+0xc0/0xc0 [ 256.276163][ T9492] ? lock_is_held_type+0xbb/0xf0 [ 256.281119][ T9492] ? do_syscall_64+0x1c/0xe0 [ 256.285714][ T9492] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 256.291698][ T9492] do_syscall_64+0x60/0xe0 [ 256.296116][ T9492] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 256.302017][ T9492] RIP: 0033:0x45c369 [ 256.305893][ T9492] Code: Bad RIP value. [ 256.309953][ T9492] RSP: 002b:00007fd357384c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 256.318375][ T9492] RAX: ffffffffffffffda RBX: 00000000000230c0 RCX: 000000000045c369 [ 256.326364][ T9492] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 256.334350][ T9492] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 256.342323][ T9492] R10: ffffffffffffffff R11: 0000000000000246 R12: 000000000078bf0c [ 256.350308][ T9492] R13: 00007ffc143fe37f R14: 00007fd3573859c0 R15: 000000000078bf0c [ 256.359477][ T9492] Kernel Offset: disabled [ 256.363872][ T9492] Rebooting in 86400 seconds..