b997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r8 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, r7, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r10 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r11 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r11, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r9, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, 0xffffffffffffffff, 0x12, 0x3}, 0x10) [ 1298.351129][T20675] device 2609 entered promiscuous mode [ 1298.390114][T20682] device 2610 entered promiscuous mode [ 1298.427712][T20683] device 2611 entered promiscuous mode 15:23:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1298.552769][T20681] device 2187 entered promiscuous mode [ 1298.626483][T20688] device 2188 entered promiscuous mode [ 1298.659622][T20689] device 2189 entered promiscuous mode 15:23:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) [ 1298.675973][T20708] validate_nla: 57 callbacks suppressed [ 1298.675984][T20708] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 1298.716135][T20707] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1298.727541][T20709] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 1298.731501][T20686] device 1750 entered promiscuous mode [ 1298.768452][T20713] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1298.800367][T20693] device 1751 entered promiscuous mode [ 1298.829198][T20715] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 15:23:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) [ 1298.879309][T20712] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1298.896505][T20694] device 1838 entered promiscuous mode [ 1298.925017][T20719] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1298.955229][T20699] device 1839 entered promiscuous mode [ 1298.971412][T20721] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 15:23:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r3 = gettid() write$cgroup_pid(r2, &(0x7f00000005c0)=r3, 0x12) r4 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r3, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) write$cgroup_subtree(r5, &(0x7f00000002c0)=ANY=[], 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r7, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r8 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, r7, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r10 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r11 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r11, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r9, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, 0xffffffffffffffff, 0x12, 0x3}, 0x10) [ 1299.005909][T20698] device 1511 entered promiscuous mode 15:23:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r1, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1299.073904][T20724] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 1299.154431][T20720] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 1299.268426][T20703] device 2267 entered promiscuous mode [ 1299.334142][T20708] device 2268 entered promiscuous mode 15:23:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r3 = gettid() write$cgroup_pid(r2, &(0x7f00000005c0)=r3, 0x12) r4 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r3, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) write$cgroup_subtree(r5, &(0x7f00000002c0)=ANY=[], 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r7, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r8 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, r7, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r10 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r11 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r11, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r9, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, 0xffffffffffffffff, 0x12, 0x3}, 0x10) [ 1299.382749][T20709] device 2269 entered promiscuous mode [ 1299.410671][T20707] device 2612 entered promiscuous mode [ 1299.446983][T20713] device 2613 entered promiscuous mode [ 1299.500075][T20715] device 2614 entered promiscuous mode 15:23:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1299.622014][T20712] device 2190 entered promiscuous mode [ 1299.709340][T20719] device 2191 entered promiscuous mode 15:23:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) [ 1299.760325][T20721] device 2192 entered promiscuous mode [ 1299.795408][T20724] device 1752 entered promiscuous mode [ 1299.863023][T20720] device 1753 entered promiscuous mode 15:23:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) 15:23:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r1, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1299.915234][T20731] device 1512 entered promiscuous mode [ 1300.092692][T20728] device 1840 entered promiscuous mode [ 1300.136564][T20732] device 1841 entered promiscuous mode [ 1300.171622][T20736] device 1842 entered promiscuous mode 15:23:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r3 = gettid() write$cgroup_pid(r2, &(0x7f00000005c0)=r3, 0x12) r4 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r3, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) write$cgroup_subtree(r5, &(0x7f00000002c0)=ANY=[], 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r7, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r8 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, r7, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r10 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r11 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r11, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r9, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, 0xffffffffffffffff, 0x12, 0x3}, 0x10) [ 1300.360717][T20735] device 2270 entered promiscuous mode [ 1300.439732][T20740] device 2615 entered promiscuous mode [ 1300.473818][T20741] device 2271 entered promiscuous mode 15:23:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r3 = gettid() write$cgroup_pid(r2, &(0x7f00000005c0)=r3, 0x12) r4 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r3, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) write$cgroup_subtree(r5, &(0x7f00000002c0)=ANY=[], 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x297ef) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r8 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r10 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r11 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r11, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r9, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r7, 0x12, 0x3}, 0x10) [ 1300.499611][T20746] device 2272 entered promiscuous mode [ 1300.519441][T20742] device 2616 entered promiscuous mode [ 1300.551232][T20747] device 2617 entered promiscuous mode 15:23:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1300.620166][T20750] device 2193 entered promiscuous mode [ 1300.651356][T20745] device 2194 entered promiscuous mode [ 1300.689530][T20757] device 2195 entered promiscuous mode 15:23:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) [ 1300.756995][T20758] device 1754 entered promiscuous mode [ 1300.872622][T20755] device 1755 entered promiscuous mode 15:23:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) [ 1300.912768][T20756] device 1513 entered promiscuous mode 15:23:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r1, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1301.170573][T20764] device 1843 entered promiscuous mode [ 1301.197402][T20765] device 1844 entered promiscuous mode [ 1301.217679][T20766] device 1845 entered promiscuous mode 15:23:32 executing program 5: perf_event_open(&(0x7f0000001980)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x73) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() write$cgroup_pid(r1, &(0x7f00000005c0)=r2, 0x12) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f00000005c0)=r4, 0x12) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) r6 = perf_event_open(&(0x7f00000001c0)={0x66c155efa3d0f130, 0x70, 0x80, 0x6, 0x8, 0x20, 0x0, 0x756, 0x10, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x10, 0xa8eb, 0x7fff, 0x6, 0x1, 0x6, 0x2}, r4, 0x2, r5, 0x1) perf_event_open(&(0x7f0000000140)={0x97a69a905576d888, 0x70, 0x1, 0x2, 0x4, 0x1, 0x0, 0x2000000000001, 0x0, 0x91676b6f37f92ebd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3f, 0x0, @perf_config_ext={0x9, 0x8}, 0x15a11, 0x2, 0x8, 0x8, 0xfff, 0x5d25, 0xffff}, 0x0, 0xc, r6, 0x8) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r7, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xc, 0x7, 0x7, 0x1, 0x0, 0x1, 0x400, [], 0x0, r7, 0x5, 0x3}, 0x3c) sendmsg$inet(r0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) [ 1301.490925][T20774] device 2618 entered promiscuous mode [ 1301.511376][T20779] device 2196 entered promiscuous mode [ 1301.536722][T20775] device 2619 entered promiscuous mode [ 1301.556917][T20769] device 2273 entered promiscuous mode [ 1301.577314][T20771] device 2274 entered promiscuous mode 15:23:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r3 = gettid() write$cgroup_pid(r2, &(0x7f00000005c0)=r3, 0x12) r4 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r3, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) write$cgroup_subtree(r5, &(0x7f00000002c0)=ANY=[], 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) sendmsg$tipc(r8, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r9 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, r8, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r10 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r10, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r11 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r12 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r12, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r10, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r7, 0x12, 0x3}, 0x10) [ 1301.597041][T20780] device 2620 entered promiscuous mode 15:23:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1301.682117][T20778] device 2197 entered promiscuous mode [ 1301.779210][T20782] device 2198 entered promiscuous mode 15:23:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) [ 1301.821681][T20783] device 2275 entered promiscuous mode 15:23:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r3 = gettid() write$cgroup_pid(r2, &(0x7f00000005c0)=r3, 0x12) r4 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r3, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) write$cgroup_subtree(r5, &(0x7f00000002c0)=ANY=[], 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) sendmsg$tipc(r8, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r9 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, r8, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r10 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r10, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r11 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r12 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r12, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r10, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r7, 0x12, 0x3}, 0x10) [ 1301.904868][T20793] device 1514 entered promiscuous mode 15:23:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1302.000555][T20791] device 1756 entered promiscuous mode [ 1302.070537][T20786] device 1757 entered promiscuous mode 15:23:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) [ 1302.381068][T20803] device 2621 entered promiscuous mode [ 1302.403115][T20827] device 1758 entered promiscuous mode [ 1302.422812][T20804] device 2622 entered promiscuous mode 15:23:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1302.440553][T20806] device 2623 entered promiscuous mode [ 1302.603545][T20801] device 1846 entered promiscuous mode [ 1302.628896][T20813] device 2199 entered promiscuous mode [ 1302.651046][T20814] device 1847 entered promiscuous mode 15:23:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r3 = gettid() write$cgroup_pid(r2, &(0x7f00000005c0)=r3, 0x12) r4 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r3, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) write$cgroup_subtree(r5, &(0x7f00000002c0)=ANY=[], 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r8, &(0x7f0000000080), 0x297ef) r9 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, r8, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r10 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r10, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r11 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r12 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r12, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r10, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r7, 0x12, 0x3}, 0x10) [ 1302.675423][T20819] device 1848 entered promiscuous mode [ 1302.818824][T20810] device 2200 entered promiscuous mode [ 1302.849316][T20822] device 2201 entered promiscuous mode 15:23:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) [ 1302.887332][T20818] device 1515 entered promiscuous mode 15:23:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1302.986461][T20811] device 2276 entered promiscuous mode [ 1303.092150][T20826] device 1759 entered promiscuous mode 15:23:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) [ 1303.146782][T20816] device 2277 entered promiscuous mode [ 1303.218181][T20828] device 2278 entered promiscuous mode 15:23:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r3 = gettid() write$cgroup_pid(r2, &(0x7f00000005c0)=r3, 0x12) r4 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r3, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) write$cgroup_subtree(r5, &(0x7f00000002c0)=ANY=[], 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) sendmsg$tipc(r8, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r9 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, r8, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r10 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r10, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r11 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r12 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r12, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r10, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r7, 0x12, 0x3}, 0x10) [ 1303.273701][T20833] device 2624 entered promiscuous mode 15:23:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1303.379894][T20832] device 2625 entered promiscuous mode [ 1303.403837][T20834] device 2626 entered promiscuous mode [ 1303.613258][T20838] device 1849 entered promiscuous mode [ 1303.636594][T20843] device 1850 entered promiscuous mode [ 1303.658154][T20846] device 1851 entered promiscuous mode 15:23:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) [ 1303.815290][T20841] device 2202 entered promiscuous mode [ 1303.842147][T20848] device 2203 entered promiscuous mode [ 1303.877322][T20853] device 2204 entered promiscuous mode [ 1303.882961][T20871] validate_nla: 64 callbacks suppressed [ 1303.883014][T20871] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 1303.909454][T20845] device 1516 entered promiscuous mode 15:23:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) [ 1303.928596][T20872] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 15:23:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1304.028952][T20852] device 1760 entered promiscuous mode [ 1304.080221][T20854] device 1761 entered promiscuous mode 15:23:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r1, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) [ 1304.155130][T20881] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1304.220741][T20878] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1304.246766][T20859] device 2279 entered promiscuous mode [ 1304.262791][T20880] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1304.290982][T20863] device 2627 entered promiscuous mode [ 1304.309415][T20886] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1304.334912][T20860] device 2280 entered promiscuous mode [ 1304.337667][T20884] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 1304.363711][T20864] device 2628 entered promiscuous mode [ 1304.383299][T20888] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 15:23:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r3 = gettid() write$cgroup_pid(r2, &(0x7f00000005c0)=r3, 0x12) r4 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r3, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) write$cgroup_subtree(r5, &(0x7f00000002c0)=ANY=[], 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) sendmsg$tipc(r8, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r9 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, r8, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/316], 0x0, 0x33}, 0x20) r10 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r10, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r11 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r12 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r12, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r10, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r7, 0x12, 0x3}, 0x10) [ 1304.385306][T20865] device 2281 entered promiscuous mode [ 1304.434742][T20866] device 2629 entered promiscuous mode 15:23:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1304.666286][T20871] device 1852 entered promiscuous mode [ 1304.704491][T20895] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 15:23:36 executing program 5 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1304.718688][T20872] device 1853 entered promiscuous mode [ 1304.750313][T20897] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1304.768957][T20881] device 1517 entered promiscuous mode 15:23:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1304.859411][T20901] FAULT_INJECTION: forcing a failure. [ 1304.859411][T20901] name failslab, interval 1, probability 0, space 0, times 0 [ 1304.877867][T20901] CPU: 0 PID: 20901 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1304.885437][T20901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1304.885445][T20901] Call Trace: [ 1304.885543][T20901] dump_stack+0x172/0x1f0 [ 1304.885567][T20901] should_fail.cold+0xa/0x15 [ 1304.885586][T20901] ? fault_create_debugfs_attr+0x180/0x180 [ 1304.885610][T20901] ? ___might_sleep+0x163/0x2c0 [ 1304.885629][T20901] __should_failslab+0x121/0x190 [ 1304.885660][T20901] should_failslab+0x9/0x14 [ 1304.885678][T20901] kmem_cache_alloc+0x2aa/0x710 [ 1304.885695][T20901] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1304.885709][T20901] ? iov_iter_alignment+0x1c9/0x830 [ 1304.885731][T20901] do_blockdev_direct_IO+0x378/0x8420 [ 1304.885749][T20901] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1304.885763][T20901] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1304.885782][T20901] ? ___might_sleep+0x163/0x2c0 [ 1304.903457][T20901] ? mark_lock+0xc2/0x1220 [ 1304.903472][T20901] ? mark_buffer_dirty+0x190/0x6c0 [ 1304.903488][T20901] ? bget_one+0x30/0x30 [ 1304.903502][T20901] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1304.903522][T20901] ? sb_init_dio_done_wq+0x80/0x80 [ 1304.903535][T20901] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1304.903556][T20901] ? __kasan_check_read+0x11/0x20 [ 1304.913920][T20901] ? __lock_acquire+0x16f2/0x4a00 [ 1304.913965][T20901] ? lock_downgrade+0x920/0x920 [ 1304.913986][T20901] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1304.914002][T20901] __blockdev_direct_IO+0xa1/0xca [ 1304.914015][T20901] ? __blockdev_direct_IO+0xa1/0xca [ 1304.914026][T20901] ? bget_one+0x30/0x30 [ 1304.914042][T20901] ext4_direct_IO+0xd60/0x1c30 [ 1304.914057][T20901] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1304.914085][T20901] generic_file_direct_write+0x20a/0x4a0 [ 1304.914109][T20901] __generic_file_write_iter+0x2ee/0x630 [ 1304.923871][T20901] ext4_file_write_iter+0x317/0x13c0 [ 1304.923896][T20901] ? ext4_release_file+0x380/0x380 [ 1304.933238][T20901] ? mark_lock+0xc2/0x1220 [ 1304.933265][T20901] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1304.933278][T20901] ? iov_iter_init+0xee/0x220 [ 1304.933298][T20901] new_sync_write+0x4d3/0x770 [ 1304.933315][T20901] ? new_sync_read+0x800/0x800 [ 1304.933339][T20901] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1304.933366][T20901] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1304.944761][T20901] ? __this_cpu_preempt_check+0x3a/0x210 15:23:36 executing program 5 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1304.944781][T20901] __vfs_write+0xe1/0x110 [ 1304.944798][T20901] vfs_write+0x268/0x5d0 [ 1304.944819][T20901] ksys_write+0x14f/0x290 [ 1304.944836][T20901] ? __ia32_sys_read+0xb0/0xb0 [ 1304.944853][T20901] ? do_syscall_64+0x26/0x760 [ 1304.944933][T20901] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1304.944951][T20901] ? do_syscall_64+0x26/0x760 [ 1304.955886][T20901] __x64_sys_write+0x73/0xb0 [ 1304.955907][T20901] do_syscall_64+0xfa/0x760 [ 1304.955930][T20901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1304.966716][T20901] RIP: 0033:0x459a59 [ 1304.966733][T20901] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1304.966741][T20901] RSP: 002b:00007fbf1c922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1304.966755][T20901] RAX: ffffffffffffffda RBX: 00007fbf1c922c90 RCX: 0000000000459a59 [ 1304.966768][T20901] RDX: 0000000000032600 RSI: 0000000020000000 RDI: 0000000000000005 [ 1304.976246][T20901] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1304.976254][T20901] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf1c9236d4 [ 1304.976260][T20901] R13: 00000000004c9ea0 R14: 00000000004e1ac0 R15: 0000000000000006 [ 1305.190110][T20912] FAULT_INJECTION: forcing a failure. [ 1305.190110][T20912] name failslab, interval 1, probability 0, space 0, times 0 [ 1305.206418][T20912] CPU: 1 PID: 20912 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1305.249348][T20912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1305.259400][T20912] Call Trace: [ 1305.259422][T20912] dump_stack+0x172/0x1f0 [ 1305.259445][T20912] should_fail.cold+0xa/0x15 [ 1305.259464][T20912] ? fault_create_debugfs_attr+0x180/0x180 [ 1305.259484][T20912] ? ___might_sleep+0x163/0x2c0 [ 1305.259504][T20912] __should_failslab+0x121/0x190 [ 1305.259519][T20912] should_failslab+0x9/0x14 [ 1305.259537][T20912] __kmalloc+0x2e0/0x770 [ 1305.267135][T20912] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1305.267152][T20912] ? ext4_find_extent+0x76e/0x9d0 [ 1305.267172][T20912] ext4_find_extent+0x76e/0x9d0 [ 1305.267195][T20912] ? _raw_spin_unlock+0x2d/0x50 [ 1305.277560][T20912] ext4_ext_map_blocks+0x1dc/0x3ac0 [ 1305.277579][T20912] ? mark_held_locks+0xf0/0xf0 [ 1305.277601][T20912] ? ext4_ext_release+0x10/0x10 [ 1305.287368][T20912] ? __kasan_check_write+0x14/0x20 [ 1305.287383][T20912] ? down_read+0x109/0x430 [ 1305.287402][T20912] ? down_read_killable+0x490/0x490 [ 1305.294744][T20878] device 2205 entered promiscuous mode [ 1305.296123][T20912] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1305.296139][T20912] ? ext4_es_lookup_extent+0x426/0xd40 [ 1305.296153][T20912] ? __kasan_check_write+0x14/0x20 [ 1305.296170][T20912] ? up_read+0x1d2/0x810 [ 1305.316979][T20912] ext4_map_blocks+0xdc7/0x17e0 [ 1305.317004][T20912] ? ext4_issue_zeroout+0x190/0x190 [ 1305.317020][T20912] ? get_user_pages_unlocked+0x3b4/0x4a0 [ 1305.317046][T20912] _ext4_get_block+0x242/0x5f0 [ 1305.326968][T20912] ? ext4_map_blocks+0x17e0/0x17e0 [ 1305.326989][T20912] ? ext4_journal_check_start+0x1ba/0x260 [ 1305.327010][T20912] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1305.327028][T20912] ? __ext4_journal_start_sb+0x146/0x4d0 [ 1305.336957][T20912] ext4_get_block_trans+0x17b/0x2b0 [ 1305.336979][T20912] ? ext4_dio_get_block_overwrite+0x140/0x140 [ 1305.336998][T20912] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1305.337016][T20912] ? iov_iter_advance+0x295/0xf70 [ 1305.346581][T20912] ? csum_and_copy_to_iter+0x1600/0x1600 [ 1305.346601][T20912] ext4_dio_get_block+0x78/0xc0 [ 1305.346620][T20912] do_blockdev_direct_IO+0x1227/0x8420 [ 1305.346668][T20912] ? sb_init_dio_done_wq+0x80/0x80 [ 1305.346689][T20912] ? __kasan_check_read+0x11/0x20 [ 1305.358425][T20912] ? __lock_acquire+0x16f2/0x4a00 [ 1305.358464][T20912] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1305.358492][T20912] ? lock_downgrade+0x920/0x920 [ 1305.369032][T20912] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1305.369053][T20912] __blockdev_direct_IO+0xa1/0xca [ 1305.369067][T20912] ? __blockdev_direct_IO+0xa1/0xca [ 1305.369079][T20912] ? bget_one+0x30/0x30 [ 1305.369098][T20912] ext4_direct_IO+0xd60/0x1c30 15:23:37 executing program 5 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1305.378162][T20912] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1305.378195][T20912] generic_file_direct_write+0x20a/0x4a0 [ 1305.378218][T20912] __generic_file_write_iter+0x2ee/0x630 [ 1305.378237][T20912] ext4_file_write_iter+0x317/0x13c0 [ 1305.389032][T20912] ? ext4_release_file+0x380/0x380 [ 1305.389058][T20912] ? ext4_file_write_iter+0x1b/0x13c0 [ 1305.389079][T20912] new_sync_write+0x4d3/0x770 [ 1305.389098][T20912] ? new_sync_read+0x800/0x800 [ 1305.398944][T20912] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1305.398968][T20912] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1305.398985][T20912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1305.399006][T20912] __vfs_write+0xe1/0x110 [ 1305.410925][T20912] vfs_write+0x268/0x5d0 [ 1305.410946][T20912] ksys_write+0x14f/0x290 [ 1305.410963][T20912] ? __ia32_sys_read+0xb0/0xb0 [ 1305.410981][T20912] ? do_syscall_64+0x26/0x760 [ 1305.411002][T20912] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1305.421813][T20912] ? do_syscall_64+0x26/0x760 [ 1305.421835][T20912] __x64_sys_write+0x73/0xb0 [ 1305.421853][T20912] do_syscall_64+0xfa/0x760 [ 1305.421873][T20912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1305.421890][T20912] RIP: 0033:0x459a59 [ 1305.421903][T20912] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1305.421915][T20912] RSP: 002b:00007fbf1c922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1305.433666][T20912] RAX: ffffffffffffffda RBX: 00007fbf1c922c90 RCX: 0000000000459a59 [ 1305.433675][T20912] RDX: 0000000000032600 RSI: 0000000020000000 RDI: 0000000000000005 [ 1305.433684][T20912] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1305.433692][T20912] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf1c9236d4 [ 1305.433701][T20912] R13: 00000000004c9ea0 R14: 00000000004e1ac0 R15: 0000000000000006 [ 1305.549679][T20917] FAULT_INJECTION: forcing a failure. [ 1305.549679][T20917] name failslab, interval 1, probability 0, space 0, times 0 [ 1305.584746][T20880] device 2206 entered promiscuous mode [ 1305.588919][T20917] CPU: 0 PID: 20917 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1305.642712][T20917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1305.642719][T20917] Call Trace: [ 1305.642742][T20917] dump_stack+0x172/0x1f0 [ 1305.642764][T20917] should_fail.cold+0xa/0x15 [ 1305.642783][T20917] ? fault_create_debugfs_attr+0x180/0x180 [ 1305.642800][T20917] ? mark_held_locks+0xa4/0xf0 [ 1305.642821][T20917] __should_failslab+0x121/0x190 [ 1305.642838][T20917] should_failslab+0x9/0x14 [ 1305.642853][T20917] kmem_cache_alloc+0x47/0x710 [ 1305.642867][T20917] ? __kasan_check_write+0x14/0x20 [ 1305.642879][T20917] ? do_raw_write_lock+0x124/0x290 [ 1305.642899][T20917] __es_insert_extent+0x2cc/0xf20 [ 1305.642919][T20917] ext4_es_insert_extent+0x2d2/0xa70 [ 1305.667301][T20917] ? ext4_es_scan_clu+0xe0/0xe0 [ 1305.667327][T20917] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1305.667346][T20917] ? ext4_es_find_extent_range+0x124/0x660 [ 1305.667366][T20917] ? ext4_es_find_extent_range+0x3e3/0x660 [ 1305.667384][T20917] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1305.667403][T20917] ? ext4_es_find_extent_range+0x131/0x660 [ 1305.703880][T20917] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 1305.703898][T20917] ? ext4_rereserve_cluster+0x240/0x240 [ 1305.703914][T20917] ? ext4_find_extent+0x76e/0x9d0 [ 1305.703935][T20917] ? ext4_find_extent+0x6a6/0x9d0 [ 1305.703954][T20917] ? mark_held_locks+0xa4/0xf0 [ 1305.703973][T20917] ext4_ext_map_blocks+0x1930/0x3ac0 [ 1305.703996][T20917] ? ext4_ext_release+0x10/0x10 [ 1305.704021][T20917] ? __kasan_check_write+0x14/0x20 [ 1305.704034][T20917] ? down_read+0x109/0x430 [ 1305.704049][T20917] ? down_read_killable+0x490/0x490 [ 1305.704065][T20917] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1305.704077][T20917] ? ext4_es_lookup_extent+0x426/0xd40 [ 1305.704090][T20917] ? __kasan_check_write+0x14/0x20 [ 1305.704101][T20917] ? up_read+0x1d2/0x810 [ 1305.704121][T20917] ext4_map_blocks+0xdc7/0x17e0 [ 1305.727241][T20917] ? ext4_issue_zeroout+0x190/0x190 [ 1305.727276][T20917] _ext4_get_block+0x242/0x5f0 [ 1305.727295][T20917] ? ext4_map_blocks+0x17e0/0x17e0 [ 1305.727314][T20917] ? ext4_journal_check_start+0x1ba/0x260 [ 1305.727332][T20917] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1305.727345][T20917] ? __ext4_journal_start_sb+0x146/0x4d0 [ 1305.727364][T20917] ext4_get_block_trans+0x17b/0x2b0 [ 1305.727383][T20917] ? ext4_dio_get_block_overwrite+0x140/0x140 [ 1305.727401][T20917] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1305.727420][T20917] ? iov_iter_advance+0x295/0xf70 [ 1305.734998][T20917] ? csum_and_copy_to_iter+0x1600/0x1600 [ 1305.735018][T20917] ext4_dio_get_block+0x78/0xc0 [ 1305.735038][T20917] do_blockdev_direct_IO+0x1227/0x8420 [ 1305.735065][T20917] ? ___might_sleep+0x163/0x2c0 [ 1305.735101][T20917] ? sb_init_dio_done_wq+0x80/0x80 [ 1305.735121][T20917] ? __kasan_check_read+0x11/0x20 [ 1305.735134][T20917] ? __lock_acquire+0x16f2/0x4a00 [ 1305.735167][T20917] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1305.735193][T20917] ? lock_downgrade+0x920/0x920 [ 1305.735214][T20917] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1305.735230][T20917] __blockdev_direct_IO+0xa1/0xca [ 1305.735246][T20917] ? __blockdev_direct_IO+0xa1/0xca [ 1305.750363][T20917] ? bget_one+0x30/0x30 [ 1305.750384][T20917] ext4_direct_IO+0xd60/0x1c30 [ 1305.750409][T20917] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1305.750441][T20917] generic_file_direct_write+0x20a/0x4a0 [ 1305.750465][T20917] __generic_file_write_iter+0x2ee/0x630 [ 1305.759888][T20917] ext4_file_write_iter+0x317/0x13c0 [ 1305.759911][T20917] ? ext4_release_file+0x380/0x380 [ 1305.759927][T20917] ? mark_lock+0xc2/0x1220 [ 1305.759955][T20917] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1305.759968][T20917] ? iov_iter_init+0xee/0x220 [ 1305.759989][T20917] new_sync_write+0x4d3/0x770 [ 1305.774923][T20917] ? new_sync_read+0x800/0x800 [ 1305.774953][T20917] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1305.774977][T20917] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1305.774995][T20917] ? __this_cpu_preempt_check+0x3a/0x210 [ 1305.775011][T20917] __vfs_write+0xe1/0x110 [ 1305.775028][T20917] vfs_write+0x268/0x5d0 [ 1305.775045][T20917] ksys_write+0x14f/0x290 [ 1305.775059][T20917] ? __ia32_sys_read+0xb0/0xb0 [ 1305.775077][T20917] ? do_syscall_64+0x26/0x760 [ 1305.775092][T20917] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1305.775108][T20917] ? do_syscall_64+0x26/0x760 [ 1306.125851][T20917] __x64_sys_write+0x73/0xb0 [ 1306.130560][T20917] do_syscall_64+0xfa/0x760 [ 1306.135090][T20917] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1306.140971][T20917] RIP: 0033:0x459a59 [ 1306.144856][T20917] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1306.164443][T20917] RSP: 002b:00007fbf1c922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1306.172835][T20917] RAX: ffffffffffffffda RBX: 00007fbf1c922c90 RCX: 0000000000459a59 [ 1306.180792][T20917] RDX: 0000000000032600 RSI: 0000000020000000 RDI: 0000000000000005 [ 1306.188746][T20917] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1306.196710][T20917] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf1c9236d4 [ 1306.204663][T20917] R13: 00000000004c9ea0 R14: 00000000004e1ac0 R15: 0000000000000006 15:23:37 executing program 5 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 15:23:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) [ 1306.225975][T20886] device 2207 entered promiscuous mode [ 1306.256464][T20884] device 1762 entered promiscuous mode [ 1306.323486][T20888] device 1763 entered promiscuous mode [ 1306.365837][T20924] FAULT_INJECTION: forcing a failure. [ 1306.365837][T20924] name failslab, interval 1, probability 0, space 0, times 0 [ 1306.398236][T20895] device 2630 entered promiscuous mode [ 1306.408558][T20924] CPU: 1 PID: 20924 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1306.416162][T20924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1306.426213][T20924] Call Trace: [ 1306.429506][T20924] dump_stack+0x172/0x1f0 [ 1306.429530][T20924] should_fail.cold+0xa/0x15 [ 1306.429551][T20924] ? fault_create_debugfs_attr+0x180/0x180 [ 1306.438455][T20924] ? ___might_sleep+0x163/0x2c0 [ 1306.438477][T20924] __should_failslab+0x121/0x190 [ 1306.438495][T20924] should_failslab+0x9/0x14 [ 1306.449110][T20924] __kmalloc+0x2e0/0x770 [ 1306.449135][T20924] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1306.449150][T20924] ? ext4_find_extent+0x76e/0x9d0 [ 1306.449168][T20924] ext4_find_extent+0x76e/0x9d0 [ 1306.458581][T20924] ? ext4_map_blocks+0xda8/0x17e0 [ 1306.458602][T20924] ext4_ext_map_blocks+0x1dc/0x3ac0 [ 1306.458629][T20924] ? ext4_ext_release+0x10/0x10 [ 1306.458651][T20924] ? lock_acquire+0x190/0x410 [ 1306.469015][T20924] ? ext4_map_blocks+0x4b3/0x17e0 [ 1306.469038][T20924] ? __kasan_check_write+0x14/0x20 [ 1306.469059][T20924] ? down_write+0xdf/0x150 [ 1306.469077][T20924] ? down_write_killable+0x170/0x170 [ 1306.478919][T20924] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1306.478934][T20924] ? ext4_es_lookup_extent+0x426/0xd40 [ 1306.478949][T20924] ? __kasan_check_write+0x14/0x20 [ 1306.478962][T20924] ? up_read+0x1d2/0x810 [ 1306.478980][T20924] ext4_map_blocks+0x52b/0x17e0 [ 1306.489160][T20924] ? ext4_issue_zeroout+0x190/0x190 [ 1306.489177][T20924] ? get_user_pages_unlocked+0x3b4/0x4a0 [ 1306.489206][T20924] _ext4_get_block+0x242/0x5f0 [ 1306.498721][T20924] ? ext4_map_blocks+0x17e0/0x17e0 [ 1306.498739][T20924] ? ext4_journal_check_start+0x1ba/0x260 [ 1306.498760][T20924] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1306.498773][T20924] ? __ext4_journal_start_sb+0x146/0x4d0 [ 1306.498793][T20924] ext4_get_block_trans+0x17b/0x2b0 [ 1306.508903][T20924] ? ext4_dio_get_block_overwrite+0x140/0x140 [ 1306.508923][T20924] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1306.508937][T20924] ? iov_iter_advance+0x295/0xf70 [ 1306.508956][T20924] ? csum_and_copy_to_iter+0x1600/0x1600 [ 1306.518623][T20924] ext4_dio_get_block+0x78/0xc0 [ 1306.518644][T20924] do_blockdev_direct_IO+0x1227/0x8420 [ 1306.518677][T20924] ? ___might_sleep+0x163/0x2c0 [ 1306.530349][T20924] ? sb_init_dio_done_wq+0x80/0x80 [ 1306.530368][T20924] ? __kasan_check_read+0x11/0x20 [ 1306.530386][T20924] ? __lock_acquire+0x16f2/0x4a00 [ 1306.539719][T20924] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1306.539749][T20924] ? lock_downgrade+0x920/0x920 [ 1306.547061][T20892] device 2282 entered promiscuous mode [ 1306.549765][T20924] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 15:23:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r1, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) [ 1306.549786][T20924] __blockdev_direct_IO+0xa1/0xca [ 1306.549800][T20924] ? __blockdev_direct_IO+0xa1/0xca [ 1306.549817][T20924] ? bget_one+0x30/0x30 [ 1306.571006][T20924] ext4_direct_IO+0xd60/0x1c30 [ 1306.571026][T20924] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1306.571056][T20924] generic_file_direct_write+0x20a/0x4a0 [ 1306.582912][T20924] __generic_file_write_iter+0x2ee/0x630 [ 1306.582935][T20924] ext4_file_write_iter+0x317/0x13c0 [ 1306.582956][T20924] ? ext4_release_file+0x380/0x380 [ 1306.582969][T20924] ? mark_lock+0xc2/0x1220 [ 1306.582989][T20924] ? __kasan_check_read+0x11/0x20 [ 1306.594204][T20924] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1306.594219][T20924] ? iov_iter_init+0xee/0x220 [ 1306.594240][T20924] new_sync_write+0x4d3/0x770 [ 1306.594259][T20924] ? new_sync_read+0x800/0x800 [ 1306.594285][T20924] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1306.604988][T20924] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1306.605007][T20924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1306.605028][T20924] __vfs_write+0xe1/0x110 15:23:38 executing program 5 (fault-call:3 fault-nth:4): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1306.605044][T20924] vfs_write+0x268/0x5d0 [ 1306.605062][T20924] ksys_write+0x14f/0x290 [ 1306.615497][T20924] ? __ia32_sys_read+0xb0/0xb0 [ 1306.615516][T20924] ? do_syscall_64+0x26/0x760 [ 1306.615533][T20924] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1306.615547][T20924] ? do_syscall_64+0x26/0x760 [ 1306.615571][T20924] __x64_sys_write+0x73/0xb0 [ 1306.625840][T20924] do_syscall_64+0xfa/0x760 [ 1306.625861][T20924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1306.625873][T20924] RIP: 0033:0x459a59 [ 1306.625891][T20924] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1306.625904][T20924] RSP: 002b:00007fbf1c922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1306.635988][T20924] RAX: ffffffffffffffda RBX: 00007fbf1c922c90 RCX: 0000000000459a59 [ 1306.635997][T20924] RDX: 0000000000032600 RSI: 0000000020000000 RDI: 0000000000000005 [ 1306.636005][T20924] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1306.636013][T20924] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf1c9236d4 [ 1306.636021][T20924] R13: 00000000004c9ea0 R14: 00000000004e1ac0 R15: 0000000000000006 [ 1306.894363][T20935] FAULT_INJECTION: forcing a failure. [ 1306.894363][T20935] name failslab, interval 1, probability 0, space 0, times 0 [ 1306.920665][T20897] device 2631 entered promiscuous mode [ 1306.923883][T20935] CPU: 0 PID: 20935 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1306.933789][T20935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1306.943844][T20935] Call Trace: [ 1306.943867][T20935] dump_stack+0x172/0x1f0 [ 1306.943888][T20935] should_fail.cold+0xa/0x15 [ 1306.943905][T20935] ? fault_create_debugfs_attr+0x180/0x180 [ 1306.943931][T20935] __should_failslab+0x121/0x190 [ 1306.943946][T20935] should_failslab+0x9/0x14 [ 1306.943964][T20935] kmem_cache_alloc+0x2aa/0x710 [ 1306.971335][T20935] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1306.971354][T20935] ? __mark_inode_dirty+0x3d1/0x1390 [ 1306.971376][T20935] ext4_mb_new_blocks+0x5b9/0x3900 [ 1306.971398][T20935] ? ext4_find_extent+0x76e/0x9d0 [ 1306.981970][T20935] ext4_ext_map_blocks+0x23c9/0x3ac0 [ 1306.981998][T20935] ? ext4_ext_release+0x10/0x10 [ 1306.982016][T20935] ? lock_acquire+0x190/0x410 [ 1306.982030][T20935] ? ext4_map_blocks+0x4b3/0x17e0 [ 1306.982068][T20935] ext4_map_blocks+0x52b/0x17e0 [ 1306.982090][T20935] ? ext4_issue_zeroout+0x190/0x190 [ 1306.982112][T20935] ? lock_is_held_type+0x272/0x320 [ 1306.992485][T20935] _ext4_get_block+0x242/0x5f0 [ 1306.992505][T20935] ? ext4_map_blocks+0x17e0/0x17e0 [ 1306.992524][T20935] ? ext4_journal_check_start+0x1ba/0x260 [ 1306.992544][T20935] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1306.992557][T20935] ? __ext4_journal_start_sb+0x146/0x4d0 [ 1306.992577][T20935] ext4_get_block_trans+0x17b/0x2b0 [ 1306.992595][T20935] ? ext4_dio_get_block_overwrite+0x140/0x140 [ 1306.992617][T20935] ext4_dio_get_block+0x78/0xc0 [ 1306.992635][T20935] do_blockdev_direct_IO+0x1227/0x8420 [ 1307.002913][T20935] ? ___might_sleep+0x163/0x2c0 [ 1307.002951][T20935] ? sb_init_dio_done_wq+0x80/0x80 [ 1307.002971][T20935] ? __kasan_check_read+0x11/0x20 [ 1307.002985][T20935] ? __lock_acquire+0x16f2/0x4a00 [ 1307.003020][T20935] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1307.003044][T20935] ? lock_downgrade+0x920/0x920 [ 1307.003065][T20935] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1307.013000][T20935] __blockdev_direct_IO+0xa1/0xca [ 1307.013015][T20935] ? __blockdev_direct_IO+0xa1/0xca [ 1307.013031][T20935] ? bget_one+0x30/0x30 [ 1307.013050][T20935] ext4_direct_IO+0xd60/0x1c30 [ 1307.013069][T20935] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1307.013097][T20935] generic_file_direct_write+0x20a/0x4a0 [ 1307.013121][T20935] __generic_file_write_iter+0x2ee/0x630 [ 1307.013139][T20935] ext4_file_write_iter+0x317/0x13c0 [ 1307.013150][T20935] ? __kasan_check_read+0x11/0x20 [ 1307.013172][T20935] ? ext4_release_file+0x380/0x380 [ 1307.023010][T20935] ? mark_held_locks+0xa4/0xf0 [ 1307.023029][T20935] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1307.023044][T20935] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1307.023060][T20935] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1307.023077][T20935] ? retint_kernel+0x2b/0x2b [ 1307.023095][T20935] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1307.023107][T20935] ? iov_iter_init+0xee/0x220 [ 1307.023127][T20935] new_sync_write+0x4d3/0x770 [ 1307.023145][T20935] ? new_sync_read+0x800/0x800 15:23:38 executing program 5 (fault-call:3 fault-nth:5): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1307.023170][T20935] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1307.023190][T20935] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1307.033470][T20935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1307.033494][T20935] __vfs_write+0xe1/0x110 [ 1307.033512][T20935] vfs_write+0x268/0x5d0 [ 1307.033531][T20935] ksys_write+0x14f/0x290 [ 1307.033547][T20935] ? __ia32_sys_read+0xb0/0xb0 [ 1307.033563][T20935] ? do_syscall_64+0x26/0x760 [ 1307.033579][T20935] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1307.033591][T20935] ? do_syscall_64+0x26/0x760 [ 1307.033607][T20935] __x64_sys_write+0x73/0xb0 [ 1307.033622][T20935] do_syscall_64+0xfa/0x760 [ 1307.033645][T20935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1307.043473][T20935] RIP: 0033:0x459a59 [ 1307.043490][T20935] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1307.043498][T20935] RSP: 002b:00007fbf1c922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1307.043512][T20935] RAX: ffffffffffffffda RBX: 00007fbf1c922c90 RCX: 0000000000459a59 [ 1307.043521][T20935] RDX: 0000000000032600 RSI: 0000000020000000 RDI: 0000000000000005 [ 1307.043529][T20935] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1307.043538][T20935] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf1c9236d4 [ 1307.043547][T20935] R13: 00000000004c9ea0 R14: 00000000004e1ac0 R15: 0000000000000006 [ 1307.267359][T20942] FAULT_INJECTION: forcing a failure. [ 1307.267359][T20942] name failslab, interval 1, probability 0, space 0, times 0 [ 1307.282724][T20942] CPU: 0 PID: 20942 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1307.290509][T20942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1307.326462][T20942] Call Trace: [ 1307.326484][T20942] dump_stack+0x172/0x1f0 [ 1307.326502][T20942] should_fail.cold+0xa/0x15 [ 1307.326518][T20942] ? fault_create_debugfs_attr+0x180/0x180 [ 1307.326538][T20942] ? ___might_sleep+0x163/0x2c0 [ 1307.326563][T20942] __should_failslab+0x121/0x190 [ 1307.342482][T20942] should_failslab+0x9/0x14 [ 1307.342499][T20942] kmem_cache_alloc+0x2aa/0x710 [ 1307.342515][T20942] ? ext4_mb_complex_scan_group+0x9d0/0x9d0 [ 1307.342535][T20942] ext4_mb_new_inode_pa+0x1b8/0x1430 [ 1307.342556][T20942] ext4_mb_new_blocks+0x2fe7/0x3900 [ 1307.342576][T20942] ? ext4_find_extent+0x76e/0x9d0 [ 1307.358517][T20942] ext4_ext_map_blocks+0x23c9/0x3ac0 [ 1307.358541][T20942] ? ext4_ext_release+0x10/0x10 [ 1307.358561][T20942] ? lock_acquire+0x190/0x410 [ 1307.378658][T20942] ? ext4_map_blocks+0x4b3/0x17e0 [ 1307.390998][T20896] device 2283 entered promiscuous mode [ 1307.392148][T20942] ? ext4_map_blocks+0x46d/0x17e0 [ 1307.392166][T20942] ext4_map_blocks+0x52b/0x17e0 [ 1307.392190][T20942] ? ext4_issue_zeroout+0x190/0x190 [ 1307.406863][T20942] ? get_user_pages_unlocked+0x3b4/0x4a0 [ 1307.416620][T20942] _ext4_get_block+0x242/0x5f0 [ 1307.425935][T20942] ? ext4_map_blocks+0x17e0/0x17e0 [ 1307.425951][T20942] ? ext4_journal_check_start+0x1ba/0x260 [ 1307.425969][T20942] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1307.425983][T20942] ? __ext4_journal_start_sb+0x146/0x4d0 [ 1307.426000][T20942] ext4_get_block_trans+0x17b/0x2b0 [ 1307.426018][T20942] ? ext4_dio_get_block_overwrite+0x140/0x140 [ 1307.426041][T20942] ext4_dio_get_block+0x78/0xc0 [ 1307.426059][T20942] do_blockdev_direct_IO+0x1227/0x8420 [ 1307.426084][T20942] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1307.426117][T20942] ? sb_init_dio_done_wq+0x80/0x80 [ 1307.426135][T20942] ? __kasan_check_read+0x11/0x20 [ 1307.426151][T20942] ? __lock_acquire+0x16f2/0x4a00 [ 1307.426183][T20942] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1307.426209][T20942] ? lock_downgrade+0x920/0x920 [ 1307.426230][T20942] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1307.426247][T20942] __blockdev_direct_IO+0xa1/0xca [ 1307.426261][T20942] ? __blockdev_direct_IO+0xa1/0xca [ 1307.426274][T20942] ? bget_one+0x30/0x30 [ 1307.426291][T20942] ext4_direct_IO+0xd60/0x1c30 [ 1307.426308][T20942] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1307.426338][T20942] generic_file_direct_write+0x20a/0x4a0 [ 1307.426363][T20942] __generic_file_write_iter+0x2ee/0x630 [ 1307.426375][T20942] ? ext4_file_write_iter+0x721/0x13c0 [ 1307.426394][T20942] ext4_file_write_iter+0x317/0x13c0 [ 1307.426407][T20942] ? trace_hardirqs_on+0x67/0x240 [ 1307.426428][T20942] ? ext4_release_file+0x380/0x380 [ 1307.426441][T20942] ? mark_lock+0xc2/0x1220 [ 1307.426462][T20942] ? mark_held_locks+0xa4/0xf0 [ 1307.426477][T20942] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1307.426491][T20942] ? iov_iter_init+0xee/0x220 [ 1307.426512][T20942] new_sync_write+0x4d3/0x770 [ 1307.426536][T20942] ? new_sync_read+0x800/0x800 15:23:39 executing program 5 (fault-call:3 fault-nth:6): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1307.426556][T20942] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1307.426579][T20942] ? retint_kernel+0x2b/0x2b [ 1307.426610][T20942] __vfs_write+0xe1/0x110 [ 1307.426631][T20942] vfs_write+0x268/0x5d0 [ 1307.426650][T20942] ksys_write+0x14f/0x290 [ 1307.426665][T20942] ? __ia32_sys_read+0xb0/0xb0 [ 1307.426683][T20942] ? do_syscall_64+0x26/0x760 [ 1307.437826][T20942] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1307.437843][T20942] ? do_syscall_64+0x26/0x760 [ 1307.448017][T20942] __x64_sys_write+0x73/0xb0 [ 1307.458128][T20942] do_syscall_64+0xfa/0x760 [ 1307.467794][T20942] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1307.478308][T20942] RIP: 0033:0x459a59 [ 1307.488345][T20942] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1307.509521][T20942] RSP: 002b:00007fbf1c922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1307.526636][T20942] RAX: ffffffffffffffda RBX: 00007fbf1c922c90 RCX: 0000000000459a59 [ 1307.537503][T20942] RDX: 0000000000032600 RSI: 0000000020000000 RDI: 0000000000000005 [ 1307.537516][T20942] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1307.548390][T20942] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf1c9236d4 [ 1307.555658][T20900] device 2632 entered promiscuous mode [ 1307.558476][T20942] R13: 00000000004c9ea0 R14: 00000000004e1ac0 R15: 0000000000000006 [ 1307.691284][T20946] FAULT_INJECTION: forcing a failure. [ 1307.691284][T20946] name failslab, interval 1, probability 0, space 0, times 0 [ 1307.697521][T20946] CPU: 0 PID: 20946 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1307.708152][T20946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1307.759628][T20946] Call Trace: [ 1307.759651][T20946] dump_stack+0x172/0x1f0 [ 1307.759673][T20946] should_fail.cold+0xa/0x15 [ 1307.759691][T20946] ? fault_create_debugfs_attr+0x180/0x180 [ 1307.759716][T20946] __should_failslab+0x121/0x190 [ 1307.783680][T20946] should_failslab+0x9/0x14 [ 1307.783699][T20946] kmem_cache_alloc+0x47/0x710 [ 1307.783716][T20946] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1307.783737][T20946] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 1307.797326][T20946] ? do_raw_write_lock+0x124/0x290 [ 1307.797352][T20946] __es_insert_extent+0x2cc/0xf20 [ 1307.797375][T20946] ext4_es_insert_extent+0x2d2/0xa70 [ 1307.818129][T20946] ? ext4_es_scan_clu+0xe0/0xe0 [ 1307.835710][T20946] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1307.835725][T20946] ? ext4_es_lookup_extent+0x426/0xd40 [ 1307.835748][T20946] ext4_map_blocks+0x7ed/0x17e0 [ 1307.835767][T20946] ? ext4_issue_zeroout+0x190/0x190 [ 1307.835795][T20946] _ext4_get_block+0x242/0x5f0 [ 1307.835812][T20946] ? ext4_map_blocks+0x17e0/0x17e0 [ 1307.835828][T20946] ? ext4_journal_check_start+0x1ba/0x260 [ 1307.835848][T20946] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1307.843435][T20946] ? __ext4_journal_start_sb+0x146/0x4d0 [ 1307.843456][T20946] ext4_get_block_trans+0x17b/0x2b0 [ 1307.843477][T20946] ? ext4_dio_get_block_overwrite+0x140/0x140 [ 1307.843495][T20946] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1307.843507][T20946] ? iov_iter_advance+0x295/0xf70 [ 1307.843520][T20946] ? csum_and_copy_to_iter+0x1600/0x1600 [ 1307.843538][T20946] ext4_dio_get_block+0x78/0xc0 [ 1307.843555][T20946] do_blockdev_direct_IO+0x1227/0x8420 [ 1307.843576][T20946] ? _raw_spin_unlock_irq+0x28/0x90 [ 1307.859248][T20946] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1307.859293][T20946] ? sb_init_dio_done_wq+0x80/0x80 [ 1307.859312][T20946] ? __kasan_check_read+0x11/0x20 [ 1307.874271][T20946] ? mark_lock+0xc2/0x1220 [ 1307.874288][T20946] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1307.874314][T20946] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1307.874327][T20946] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1307.874347][T20946] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1307.874374][T20946] ? retint_kernel+0x2b/0x2b [ 1307.874395][T20946] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1307.889959][T20946] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1307.889979][T20946] __blockdev_direct_IO+0xa1/0xca [ 1307.889993][T20946] ? __blockdev_direct_IO+0xa1/0xca [ 1307.890010][T20946] ? bget_one+0x30/0x30 [ 1307.932362][T20946] ext4_direct_IO+0xd60/0x1c30 [ 1307.932383][T20946] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1307.932413][T20946] generic_file_direct_write+0x20a/0x4a0 [ 1307.932436][T20946] __generic_file_write_iter+0x2ee/0x630 [ 1307.932455][T20946] ext4_file_write_iter+0x317/0x13c0 [ 1307.932475][T20946] ? ext4_release_file+0x380/0x380 [ 1307.932488][T20946] ? mark_lock+0xc2/0x1220 [ 1307.932513][T20946] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1307.932526][T20946] ? iov_iter_init+0xee/0x220 [ 1307.932547][T20946] new_sync_write+0x4d3/0x770 [ 1307.944481][T20946] ? new_sync_read+0x800/0x800 [ 1307.944511][T20946] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1307.944530][T20946] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1307.944546][T20946] ? __this_cpu_preempt_check+0x3a/0x210 [ 1307.944564][T20946] __vfs_write+0xe1/0x110 [ 1307.944579][T20946] vfs_write+0x268/0x5d0 [ 1307.944597][T20946] ksys_write+0x14f/0x290 [ 1307.944614][T20946] ? __ia32_sys_read+0xb0/0xb0 [ 1307.944630][T20946] ? do_syscall_64+0x26/0x760 [ 1307.944645][T20946] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1307.944663][T20946] ? do_syscall_64+0x26/0x760 [ 1307.961521][T20946] __x64_sys_write+0x73/0xb0 [ 1307.961542][T20946] do_syscall_64+0xfa/0x760 [ 1307.961563][T20946] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1307.961578][T20946] RIP: 0033:0x459a59 [ 1307.972290][T20946] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1307.972299][T20946] RSP: 002b:00007fbf1c922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 15:23:39 executing program 1 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:23:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1307.972314][T20946] RAX: ffffffffffffffda RBX: 00007fbf1c922c90 RCX: 0000000000459a59 [ 1307.972323][T20946] RDX: 0000000000032600 RSI: 0000000020000000 RDI: 0000000000000005 [ 1307.972332][T20946] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1307.972339][T20946] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf1c9236d4 [ 1307.972347][T20946] R13: 00000000004c9ea0 R14: 00000000004e1ac0 R15: 0000000000000006 [ 1308.269342][T20902] device 2284 entered promiscuous mode 15:23:39 executing program 5 (fault-call:3 fault-nth:7): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1308.327100][T20910] device 1518 entered promiscuous mode 15:23:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1308.439266][T20955] FAULT_INJECTION: forcing a failure. [ 1308.439266][T20955] name failslab, interval 1, probability 0, space 0, times 0 [ 1308.447368][T20927] device 2208 entered promiscuous mode [ 1308.471515][T20955] CPU: 0 PID: 20955 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 1308.479096][T20955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1308.489467][T20955] Call Trace: [ 1308.492779][T20955] dump_stack+0x172/0x1f0 [ 1308.497145][T20955] should_fail.cold+0xa/0x15 [ 1308.501761][T20955] ? fault_create_debugfs_attr+0x180/0x180 [ 1308.507597][T20955] __should_failslab+0x121/0x190 [ 1308.512558][T20955] should_failslab+0x9/0x14 [ 1308.517229][T20955] kmem_cache_alloc+0x2aa/0x710 [ 1308.522094][T20955] ? trace_hardirqs_on_caller+0x6a/0x240 [ 1308.527747][T20955] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1308.533998][T20955] ? iov_iter_alignment+0x1c9/0x830 [ 1308.539203][T20955] do_blockdev_direct_IO+0x378/0x8420 [ 1308.539226][T20955] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1308.539240][T20955] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1308.539262][T20955] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1308.562354][T20955] ? mark_buffer_dirty+0x190/0x6c0 [ 1308.567483][T20955] ? bget_one+0x30/0x30 [ 1308.571647][T20955] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1308.578167][T20955] ? sb_init_dio_done_wq+0x80/0x80 [ 1308.583282][T20955] ? __kasan_check_read+0x11/0x20 [ 1308.583300][T20955] ? mark_lock+0xc2/0x1220 [ 1308.583313][T20955] ? __lock_acquire+0x16f2/0x4a00 [ 1308.583337][T20955] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1308.583351][T20955] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1308.583382][T20955] ? retint_kernel+0x2b/0x2b [ 1308.583402][T20955] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1308.583420][T20955] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1308.583437][T20955] __blockdev_direct_IO+0xa1/0xca [ 1308.583449][T20955] ? __blockdev_direct_IO+0xa1/0xca [ 1308.583465][T20955] ? bget_one+0x30/0x30 [ 1308.608613][T20955] ext4_direct_IO+0xd60/0x1c30 [ 1308.608634][T20955] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1308.627097][T20955] generic_file_direct_write+0x20a/0x4a0 [ 1308.627128][T20955] __generic_file_write_iter+0x2ee/0x630 [ 1308.627147][T20955] ext4_file_write_iter+0x317/0x13c0 [ 1308.627168][T20955] ? ext4_release_file+0x380/0x380 [ 1308.627182][T20955] ? retint_kernel+0x2b/0x2b [ 1308.627210][T20955] new_sync_write+0x4d3/0x770 [ 1308.627227][T20955] ? new_sync_read+0x800/0x800 [ 1308.627253][T20955] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1308.627277][T20955] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1308.641623][T20955] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1308.641647][T20955] __vfs_write+0xe1/0x110 [ 1308.641663][T20955] vfs_write+0x268/0x5d0 [ 1308.641681][T20955] ksys_write+0x14f/0x290 [ 1308.641696][T20955] ? __ia32_sys_read+0xb0/0xb0 [ 1308.641714][T20955] ? do_syscall_64+0x26/0x760 [ 1308.641730][T20955] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1308.641742][T20955] ? do_syscall_64+0x26/0x760 [ 1308.641758][T20955] __x64_sys_write+0x73/0xb0 [ 1308.641775][T20955] do_syscall_64+0xfa/0x760 [ 1308.641794][T20955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1308.641804][T20955] RIP: 0033:0x459a59 [ 1308.641822][T20955] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1308.679229][T20955] RSP: 002b:00007f753cae4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1308.679245][T20955] RAX: ffffffffffffffda RBX: 00007f753cae4c90 RCX: 0000000000459a59 [ 1308.679252][T20955] RDX: 0000000000032600 RSI: 0000000020000000 RDI: 0000000000000005 [ 1308.679260][T20955] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1308.679269][T20955] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f753cae56d4 [ 1308.679277][T20955] R13: 00000000004c9ea0 R14: 00000000004e1ac0 R15: 0000000000000006 [ 1308.725437][T20964] FAULT_INJECTION: forcing a failure. [ 1308.725437][T20964] name failslab, interval 1, probability 0, space 0, times 0 [ 1308.740503][T20964] CPU: 0 PID: 20964 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1308.749271][T20964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1308.749277][T20964] Call Trace: [ 1308.749301][T20964] dump_stack+0x172/0x1f0 [ 1308.749323][T20964] should_fail.cold+0xa/0x15 [ 1308.778667][T20964] ? fault_create_debugfs_attr+0x180/0x180 [ 1308.778682][T20964] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1308.778706][T20964] __should_failslab+0x121/0x190 [ 1308.778724][T20964] should_failslab+0x9/0x14 [ 1308.778741][T20964] kmem_cache_alloc+0x47/0x710 [ 1308.778759][T20964] ? ___might_sleep+0x163/0x2c0 [ 1308.778776][T20964] ? mempool_alloc+0x380/0x380 [ 1308.778787][T20964] mempool_alloc_slab+0x47/0x60 [ 1308.778800][T20964] mempool_alloc+0x169/0x380 [ 1308.778819][T20964] ? mempool_destroy+0x40/0x40 [ 1308.778843][T20964] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1308.778860][T20964] ? mark_buffer_write_io_error+0x190/0x190 [ 1308.778880][T20964] bio_alloc_bioset+0x3b9/0x680 [ 1308.795245][T20964] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1308.795263][T20964] ? bvec_alloc+0x2f0/0x2f0 [ 1308.795287][T20964] do_blockdev_direct_IO+0x241e/0x8420 [ 1308.811231][T20964] ? sb_init_dio_done_wq+0x80/0x80 [ 1308.811255][T20964] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1308.827168][T20964] ? retint_kernel+0x2b/0x2b [ 1308.827185][T20964] ? trace_hardirqs_on_caller+0x6a/0x240 [ 1308.827211][T20964] ? __this_cpu_preempt_check+0x3a/0x210 [ 1308.857343][T20964] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1308.857373][T20964] ? lock_downgrade+0x920/0x920 15:23:40 executing program 1 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1308.857391][T20964] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1308.857409][T20964] __blockdev_direct_IO+0xa1/0xca [ 1308.857421][T20964] ? __blockdev_direct_IO+0xa1/0xca [ 1308.857433][T20964] ? bget_one+0x30/0x30 [ 1308.857449][T20964] ext4_direct_IO+0xd60/0x1c30 [ 1308.857466][T20964] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1308.857500][T20964] generic_file_direct_write+0x20a/0x4a0 [ 1308.869599][T20925] device 2209 entered promiscuous mode [ 1308.869771][T20964] __generic_file_write_iter+0x2ee/0x630 [ 1308.890444][T20964] ext4_file_write_iter+0x317/0x13c0 [ 1308.890468][T20964] ? ext4_release_file+0x380/0x380 [ 1308.890486][T20964] ? mark_lock+0xc2/0x1220 [ 1308.900088][T20964] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1308.900103][T20964] ? iov_iter_init+0xee/0x220 [ 1308.900128][T20964] new_sync_write+0x4d3/0x770 [ 1308.914278][T20964] ? new_sync_read+0x800/0x800 [ 1308.914304][T20964] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1308.914327][T20964] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1308.914345][T20964] ? __this_cpu_preempt_check+0x3a/0x210 [ 1308.914362][T20964] __vfs_write+0xe1/0x110 [ 1308.914378][T20964] vfs_write+0x268/0x5d0 [ 1308.914394][T20964] ksys_write+0x14f/0x290 [ 1308.914407][T20964] ? __ia32_sys_read+0xb0/0xb0 [ 1308.914426][T20964] ? do_syscall_64+0x26/0x760 [ 1308.925399][T20964] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1308.925417][T20964] ? do_syscall_64+0x26/0x760 [ 1308.925437][T20964] __x64_sys_write+0x73/0xb0 [ 1308.925452][T20964] do_syscall_64+0xfa/0x760 [ 1308.925471][T20964] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1308.925481][T20964] RIP: 0033:0x459a59 [ 1308.925494][T20964] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1308.925502][T20964] RSP: 002b:00007fbf1c922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1308.925515][T20964] RAX: ffffffffffffffda RBX: 00007fbf1c922c90 RCX: 0000000000459a59 [ 1308.925524][T20964] RDX: 0000000000032600 RSI: 0000000020000000 RDI: 0000000000000005 [ 1308.925532][T20964] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1308.925541][T20964] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf1c9236d4 [ 1308.925549][T20964] R13: 00000000004c9ea0 R14: 00000000004e1ac0 R15: 0000000000000006 [ 1308.928569][T20965] validate_nla: 13 callbacks suppressed [ 1308.928578][T20965] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1309.097870][T20971] FAULT_INJECTION: forcing a failure. [ 1309.097870][T20971] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.153308][T20971] CPU: 0 PID: 20971 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 1309.182258][T20971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1309.182264][T20971] Call Trace: [ 1309.182284][T20971] dump_stack+0x172/0x1f0 [ 1309.182303][T20971] should_fail.cold+0xa/0x15 [ 1309.182320][T20971] ? fault_create_debugfs_attr+0x180/0x180 [ 1309.182341][T20971] ? ___might_sleep+0x163/0x2c0 [ 1309.182359][T20971] __should_failslab+0x121/0x190 [ 1309.182375][T20971] should_failslab+0x9/0x14 [ 1309.182389][T20971] __kmalloc+0x2e0/0x770 [ 1309.182411][T20971] ? ext4_find_extent+0x76e/0x9d0 [ 1309.182430][T20971] ext4_find_extent+0x76e/0x9d0 [ 1309.182447][T20971] ? ___preempt_schedule_notrace+0x16/0x30 [ 1309.182469][T20971] ext4_ext_map_blocks+0x1dc/0x3ac0 [ 1309.182484][T20971] ? mark_held_locks+0xf0/0xf0 [ 1309.182505][T20971] ? ext4_ext_release+0x10/0x10 [ 1309.182530][T20971] ? __kasan_check_write+0x14/0x20 [ 1309.182545][T20971] ? down_read+0x109/0x430 [ 1309.182560][T20971] ? down_read_killable+0x490/0x490 [ 1309.182576][T20971] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1309.182592][T20971] ? ext4_es_lookup_extent+0x426/0xd40 [ 1309.198531][T20971] ext4_map_blocks+0xdc7/0x17e0 [ 1309.198547][T20971] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1309.198566][T20971] ? ext4_issue_zeroout+0x190/0x190 [ 1309.198581][T20971] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1309.198604][T20971] ? __this_cpu_preempt_check+0x3a/0x210 [ 1309.198624][T20971] ? retint_kernel+0x2b/0x2b [ 1309.214637][T20971] _ext4_get_block+0x242/0x5f0 15:23:40 executing program 5 (fault-call:3 fault-nth:8): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1309.214655][T20971] ? ext4_map_blocks+0x17e0/0x17e0 [ 1309.214670][T20971] ? ext4_journal_check_start+0xc5/0x260 [ 1309.214685][T20971] ? ext4_journal_check_start+0x1ba/0x260 [ 1309.214707][T20971] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1309.228264][T20971] ? __ext4_journal_start_sb+0x146/0x4d0 [ 1309.228283][T20971] ext4_get_block_trans+0x17b/0x2b0 [ 1309.228303][T20971] ? ext4_dio_get_block_overwrite+0x140/0x140 [ 1309.228320][T20971] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1309.228333][T20971] ? iov_iter_advance+0x295/0xf70 [ 1309.228361][T20971] ext4_dio_get_block+0x78/0xc0 [ 1309.248441][T20971] do_blockdev_direct_IO+0x1227/0x8420 [ 1309.248465][T20971] ? ___might_sleep+0x163/0x2c0 [ 1309.260750][T20932] device 1764 entered promiscuous mode [ 1309.261786][T20971] ? sb_init_dio_done_wq+0x80/0x80 [ 1309.261807][T20971] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1309.261823][T20971] ? retint_kernel+0x2b/0x2b [ 1309.261841][T20971] ? trace_hardirqs_on_caller+0x6a/0x240 [ 1309.276531][T20971] ? __this_cpu_preempt_check+0x3a/0x210 [ 1309.276553][T20971] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1309.286316][T20971] ? lock_downgrade+0x920/0x920 [ 1309.295010][T20971] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1309.295027][T20971] __blockdev_direct_IO+0xa1/0xca [ 1309.295040][T20971] ? __blockdev_direct_IO+0xa1/0xca [ 1309.295052][T20971] ? bget_one+0x30/0x30 [ 1309.295069][T20971] ext4_direct_IO+0xd60/0x1c30 [ 1309.295085][T20971] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1309.295116][T20971] generic_file_direct_write+0x20a/0x4a0 [ 1309.304953][T20971] __generic_file_write_iter+0x2ee/0x630 [ 1309.304973][T20971] ext4_file_write_iter+0x317/0x13c0 [ 1309.304986][T20971] ? __kasan_check_read+0x11/0x20 [ 1309.305005][T20971] ? ext4_release_file+0x380/0x380 [ 1309.305018][T20971] ? mark_held_locks+0xa4/0xf0 [ 1309.305038][T20971] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1309.316020][T20971] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1309.316037][T20971] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1309.316052][T20971] ? retint_kernel+0x2b/0x2b [ 1309.316068][T20971] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 15:23:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) [ 1309.316081][T20971] ? iov_iter_init+0xee/0x220 [ 1309.316102][T20971] new_sync_write+0x4d3/0x770 [ 1309.316124][T20971] ? new_sync_read+0x800/0x800 [ 1309.316152][T20971] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1309.331028][T20971] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1309.331050][T20971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1309.340627][T20971] __vfs_write+0xe1/0x110 [ 1309.340649][T20971] vfs_write+0x268/0x5d0 [ 1309.352312][T20971] ksys_write+0x14f/0x290 [ 1309.352328][T20971] ? __ia32_sys_read+0xb0/0xb0 [ 1309.352346][T20971] ? do_syscall_64+0x26/0x760 [ 1309.352362][T20971] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1309.352375][T20971] ? do_syscall_64+0x26/0x760 [ 1309.352392][T20971] __x64_sys_write+0x73/0xb0 [ 1309.352406][T20971] do_syscall_64+0xfa/0x760 [ 1309.352423][T20971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1309.352434][T20971] RIP: 0033:0x459a59 [ 1309.352452][T20971] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:23:41 executing program 1 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1309.363147][T20971] RSP: 002b:00007f753cae4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1309.363162][T20971] RAX: ffffffffffffffda RBX: 00007f753cae4c90 RCX: 0000000000459a59 [ 1309.363170][T20971] RDX: 0000000000032600 RSI: 0000000020000000 RDI: 0000000000000005 [ 1309.363177][T20971] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1309.363184][T20971] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f753cae56d4 [ 1309.363192][T20971] R13: 00000000004c9ea0 R14: 00000000004e1ac0 R15: 0000000000000006 [ 1309.498986][T20977] FAULT_INJECTION: forcing a failure. [ 1309.498986][T20977] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.513976][T20977] CPU: 0 PID: 20977 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1309.520714][T20977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1309.520720][T20977] Call Trace: [ 1309.520744][T20977] dump_stack+0x172/0x1f0 [ 1309.520766][T20977] should_fail.cold+0xa/0x15 [ 1309.520786][T20977] ? fault_create_debugfs_attr+0x180/0x180 [ 1309.520806][T20977] ? __this_cpu_preempt_check+0x3a/0x210 [ 1309.520827][T20977] __should_failslab+0x121/0x190 [ 1309.532077][T20977] should_failslab+0x9/0x14 [ 1309.532097][T20977] kmem_cache_alloc+0x47/0x710 [ 1309.532116][T20977] ? __sanitizer_cov_trace_switch+0x13/0x80 [ 1309.532136][T20977] bvec_alloc+0x14d/0x2f0 [ 1309.532153][T20977] bio_alloc_bioset+0x465/0x680 [ 1309.532170][T20977] ? bvec_alloc+0x2f0/0x2f0 [ 1309.532195][T20977] do_blockdev_direct_IO+0x241e/0x8420 [ 1309.532232][T20977] ? sb_init_dio_done_wq+0x80/0x80 [ 1309.532250][T20977] ? __kasan_check_read+0x11/0x20 [ 1309.543480][T20977] ? __lock_acquire+0x16f2/0x4a00 [ 1309.543514][T20977] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1309.543539][T20977] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1309.543559][T20977] ? __this_cpu_preempt_check+0x3a/0x210 [ 1309.543573][T20977] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1309.543589][T20977] __blockdev_direct_IO+0xa1/0xca [ 1309.543603][T20977] ? __blockdev_direct_IO+0xa1/0xca [ 1309.543615][T20977] ? bget_one+0x30/0x30 [ 1309.543633][T20977] ext4_direct_IO+0xd60/0x1c30 [ 1309.543649][T20977] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1309.543677][T20977] generic_file_direct_write+0x20a/0x4a0 [ 1309.543701][T20977] __generic_file_write_iter+0x2ee/0x630 [ 1309.543721][T20977] ext4_file_write_iter+0x317/0x13c0 [ 1309.543733][T20977] ? mark_held_locks+0xa4/0xf0 [ 1309.543754][T20977] ? ext4_release_file+0x380/0x380 [ 1309.543774][T20977] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1309.543795][T20977] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1309.543808][T20977] ? iov_iter_init+0xee/0x220 [ 1309.543830][T20977] new_sync_write+0x4d3/0x770 [ 1309.543847][T20977] ? new_sync_read+0x800/0x800 [ 1309.543874][T20977] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1309.554154][T20977] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1309.554174][T20977] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1309.554194][T20977] __vfs_write+0xe1/0x110 [ 1309.554215][T20977] vfs_write+0x268/0x5d0 [ 1309.564068][T20977] ksys_write+0x14f/0x290 [ 1309.571590][T20933] device 2210 entered promiscuous mode [ 1309.574940][T20977] ? __ia32_sys_read+0xb0/0xb0 [ 1309.574957][T20977] ? do_syscall_64+0x26/0x760 [ 1309.574973][T20977] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1309.574985][T20977] ? do_syscall_64+0x26/0x760 [ 1309.575001][T20977] __x64_sys_write+0x73/0xb0 [ 1309.575015][T20977] do_syscall_64+0xfa/0x760 [ 1309.575035][T20977] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1309.591095][T20977] RIP: 0033:0x459a59 [ 1309.611291][T20977] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1309.622760][T20977] RSP: 002b:00007fbf1c922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1309.622774][T20977] RAX: ffffffffffffffda RBX: 00007fbf1c922c90 RCX: 0000000000459a59 [ 1309.622783][T20977] RDX: 0000000000032600 RSI: 0000000020000000 RDI: 0000000000000005 [ 1309.622791][T20977] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1309.622799][T20977] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf1c9236d4 [ 1309.622806][T20977] R13: 00000000004c9ea0 R14: 00000000004e1ac0 R15: 0000000000000006 [ 1309.829287][T20982] FAULT_INJECTION: forcing a failure. [ 1309.829287][T20982] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.872440][T20982] CPU: 1 PID: 20982 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 1309.882359][T20987] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1309.883921][T20982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1309.883928][T20982] Call Trace: [ 1309.883948][T20982] dump_stack+0x172/0x1f0 [ 1309.883968][T20982] should_fail.cold+0xa/0x15 [ 1309.904537][T20982] ? fault_create_debugfs_attr+0x180/0x180 [ 1309.904557][T20982] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1309.904577][T20982] __should_failslab+0x121/0x190 [ 1309.904598][T20982] should_failslab+0x9/0x14 [ 1309.915938][T20982] kmem_cache_alloc+0x47/0x710 [ 1309.925964][T20982] ? __es_insert_extent+0x22e/0xf20 [ 1309.925981][T20982] __es_insert_extent+0x2cc/0xf20 [ 1309.926000][T20982] ext4_es_insert_extent+0x2d2/0xa70 [ 1309.926018][T20982] ? ext4_es_scan_clu+0xe0/0xe0 [ 1309.926041][T20982] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1309.932260][T20988] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1309.936572][T20982] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1309.978335][T20991] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1309.979572][T20982] ? ext4_es_find_extent_range+0x131/0x660 [ 1309.979596][T20982] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 1310.022908][T20982] ? ext4_rereserve_cluster+0x240/0x240 [ 1310.022927][T20982] ? write_comp_data+0x10/0x70 [ 1310.022947][T20982] ? ext4_find_extent+0x6a6/0x9d0 [ 1310.022962][T20982] ? __kasan_check_read+0x11/0x20 [ 1310.022977][T20982] ? mark_lock+0xc2/0x1220 [ 1310.022995][T20982] ext4_ext_map_blocks+0x1930/0x3ac0 [ 1310.023009][T20982] ? mark_held_locks+0xa4/0xf0 [ 1310.023026][T20982] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1310.023047][T20982] ? ext4_ext_release+0x10/0x10 [ 1310.023066][T20982] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1310.052434][T20982] ? __this_cpu_preempt_check+0x3a/0x210 [ 1310.052451][T20982] ? retint_kernel+0x2b/0x2b [ 1310.052482][T20982] ext4_map_blocks+0xdc7/0x17e0 [ 1310.052506][T20982] ? ext4_issue_zeroout+0x190/0x190 [ 1310.052521][T20982] ? get_user_pages_unlocked+0x3b4/0x4a0 [ 1310.052548][T20982] _ext4_get_block+0x242/0x5f0 [ 1310.052570][T20982] ? ext4_map_blocks+0x17e0/0x17e0 [ 1310.068955][T20982] ? ext4_journal_check_start+0x1ba/0x260 [ 1310.068976][T20982] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1310.068990][T20982] ? __ext4_journal_start_sb+0x146/0x4d0 15:23:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r1, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) 15:23:41 executing program 5 (fault-call:3 fault-nth:9): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 15:23:41 executing program 1 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1310.069011][T20982] ext4_get_block_trans+0x17b/0x2b0 [ 1310.069030][T20982] ? ext4_dio_get_block_overwrite+0x140/0x140 [ 1310.069053][T20982] ext4_dio_get_block+0x78/0xc0 [ 1310.085065][T20982] do_blockdev_direct_IO+0x1227/0x8420 [ 1310.085093][T20982] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1310.085127][T20982] ? sb_init_dio_done_wq+0x80/0x80 [ 1310.085146][T20982] ? __kasan_check_read+0x11/0x20 [ 1310.085161][T20982] ? __lock_acquire+0x16f2/0x4a00 [ 1310.085194][T20982] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1310.085227][T20982] ? lock_downgrade+0x920/0x920 [ 1310.101168][T20982] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1310.101187][T20982] __blockdev_direct_IO+0xa1/0xca [ 1310.101202][T20982] ? __blockdev_direct_IO+0xa1/0xca [ 1310.101216][T20982] ? bget_one+0x30/0x30 [ 1310.101233][T20982] ext4_direct_IO+0xd60/0x1c30 [ 1310.101253][T20982] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1310.121620][T20982] generic_file_direct_write+0x20a/0x4a0 [ 1310.121646][T20982] __generic_file_write_iter+0x2ee/0x630 [ 1310.121668][T20982] ext4_file_write_iter+0x317/0x13c0 [ 1310.121693][T20982] ? ext4_release_file+0x380/0x380 [ 1310.139907][T20982] ? __this_cpu_preempt_check+0x3a/0x210 [ 1310.139927][T20982] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1310.139940][T20982] ? iov_iter_init+0xee/0x220 [ 1310.139962][T20982] new_sync_write+0x4d3/0x770 [ 1310.139980][T20982] ? new_sync_read+0x800/0x800 [ 1310.139995][T20982] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1310.140020][T20982] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1310.140040][T20982] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1310.147640][T20982] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1310.147663][T20982] __vfs_write+0xe1/0x110 [ 1310.147685][T20982] vfs_write+0x268/0x5d0 [ 1310.147705][T20982] ksys_write+0x14f/0x290 [ 1310.147720][T20982] ? __ia32_sys_read+0xb0/0xb0 [ 1310.147740][T20982] ? do_syscall_64+0x26/0x760 [ 1310.158110][T20982] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1310.158128][T20982] ? do_syscall_64+0x26/0x760 [ 1310.158150][T20982] __x64_sys_write+0x73/0xb0 [ 1310.158167][T20982] do_syscall_64+0xfa/0x760 [ 1310.158191][T20982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1310.167061][T20929] device 1765 entered promiscuous mode [ 1310.168637][T20982] RIP: 0033:0x459a59 [ 1310.168656][T20982] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1310.168664][T20982] RSP: 002b:00007f753cae4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1310.168683][T20982] RAX: ffffffffffffffda RBX: 00007f753cae4c90 RCX: 0000000000459a59 [ 1310.168691][T20982] RDX: 0000000000032600 RSI: 0000000020000000 RDI: 0000000000000005 [ 1310.168699][T20982] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1310.168712][T20982] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f753cae56d4 [ 1310.188156][T20982] R13: 00000000004c9ea0 R14: 00000000004e1ac0 R15: 0000000000000006 [ 1310.460197][T20998] FAULT_INJECTION: forcing a failure. [ 1310.460197][T20998] name failslab, interval 1, probability 0, space 0, times 0 [ 1310.473522][T20998] CPU: 0 PID: 20998 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1310.484048][T20998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1310.484055][T20998] Call Trace: [ 1310.484078][T20998] dump_stack+0x172/0x1f0 [ 1310.484100][T20998] should_fail.cold+0xa/0x15 [ 1310.495633][T20998] ? mark_held_locks+0xa4/0xf0 [ 1310.506164][T20998] ? fault_create_debugfs_attr+0x180/0x180 [ 1310.506180][T20998] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1310.506199][T20998] ? retint_kernel+0x2b/0x2b [ 1310.514754][T20998] ? trace_hardirqs_on_caller+0x6a/0x240 [ 1310.514777][T20998] __should_failslab+0x121/0x190 [ 1310.514793][T20998] should_failslab+0x9/0x14 [ 1310.514809][T20998] kmem_cache_alloc_node+0x56/0x740 [ 1310.514825][T20998] ? retint_kernel+0x2b/0x2b [ 1310.514848][T20998] create_task_io_context+0x33/0x450 [ 1310.514871][T20998] generic_make_request_checks+0x1b88/0x2210 [ 1310.530378][T20998] ? mark_lock+0xc2/0x1220 [ 1310.539618][T20998] ? trace_event_raw_event_block_rq_requeue+0x640/0x640 [ 1310.555498][T20998] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1310.555513][T20998] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1310.555528][T20998] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1310.555545][T20998] ? __kasan_check_read+0x11/0x20 [ 1310.555566][T20998] generic_make_request+0x8f/0xb50 [ 1310.555582][T20998] ? mark_held_locks+0xa4/0xf0 [ 1310.555600][T20998] ? blk_queue_enter+0xe50/0xe50 [ 1310.564419][T20997] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 1310.579097][T20998] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1310.579114][T20998] ? lockdep_hardirqs_on+0x421/0x5e0 15:23:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1310.579128][T20998] ? retint_kernel+0x2b/0x2b [ 1310.579141][T20998] ? trace_hardirqs_on_caller+0x6a/0x240 [ 1310.579165][T20998] submit_bio+0x113/0x600 [ 1310.579180][T20998] ? submit_bio+0x113/0x600 [ 1310.579200][T20998] ? generic_make_request+0xb50/0xb50 [ 1310.579227][T20998] ? _raw_spin_unlock_irqrestore+0x95/0xe0 [ 1310.579245][T20998] do_blockdev_direct_IO+0x6d8b/0x8420 [ 1310.579258][T20998] ? rwlock_bug.part.0+0x90/0x90 [ 1310.579301][T20998] ? sb_init_dio_done_wq+0x80/0x80 [ 1310.579321][T20998] ? __kasan_check_read+0x11/0x20 [ 1310.579335][T20998] ? mark_lock+0xc2/0x1220 [ 1310.579359][T20998] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1310.579375][T20998] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1310.579398][T20998] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1310.579423][T20998] ? __this_cpu_preempt_check+0x3a/0x210 [ 1310.579438][T20998] ? retint_kernel+0x2b/0x2b [ 1310.579463][T20998] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1310.595830][T20998] __blockdev_direct_IO+0xa1/0xca [ 1310.595845][T20998] ? __blockdev_direct_IO+0xa1/0xca [ 1310.595861][T20998] ? bget_one+0x30/0x30 [ 1310.595880][T20998] ext4_direct_IO+0xd60/0x1c30 [ 1310.595895][T20998] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1310.595922][T20998] generic_file_direct_write+0x20a/0x4a0 [ 1310.611942][T20998] __generic_file_write_iter+0x2ee/0x630 [ 1310.611963][T20998] ext4_file_write_iter+0x317/0x13c0 [ 1310.611977][T20998] ? mark_lock+0xc2/0x1220 [ 1310.611997][T20998] ? ext4_release_file+0x380/0x380 [ 1310.612012][T20998] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1310.612030][T20998] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1310.622832][T20952] device 2633 entered promiscuous mode [ 1310.627954][T20998] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1310.627977][T20998] ? retint_kernel+0x2b/0x2b [ 1310.658123][T20998] ? trace_hardirqs_on_caller+0x6a/0x240 [ 1310.658140][T20998] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1310.658151][T20998] ? iov_iter_init+0xee/0x220 [ 1310.658169][T20998] new_sync_write+0x4d3/0x770 [ 1310.658186][T20998] ? new_sync_read+0x800/0x800 [ 1310.658210][T20998] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1310.658230][T20998] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1310.667265][T21001] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 1310.670410][T20998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1310.670434][T20998] __vfs_write+0xe1/0x110 [ 1310.670452][T20998] vfs_write+0x268/0x5d0 [ 1310.681006][T20998] ksys_write+0x14f/0x290 [ 1310.681024][T20998] ? __ia32_sys_read+0xb0/0xb0 [ 1310.681040][T20998] ? do_syscall_64+0x26/0x760 [ 1310.681060][T20998] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1310.690930][T20998] ? do_syscall_64+0x26/0x760 [ 1310.690957][T20998] __x64_sys_write+0x73/0xb0 [ 1310.715763][T20998] do_syscall_64+0xfa/0x760 [ 1310.715787][T20998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1310.715802][T20998] RIP: 0033:0x459a59 [ 1310.731447][T20998] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1310.731456][T20998] RSP: 002b:00007fbf1c922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1310.731471][T20998] RAX: ffffffffffffffda RBX: 00007fbf1c922c90 RCX: 0000000000459a59 [ 1310.731480][T20998] RDX: 0000000000032600 RSI: 0000000020000000 RDI: 0000000000000005 [ 1310.731493][T20998] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1310.758498][T20998] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf1c9236d4 [ 1310.758506][T20998] R13: 00000000004c9ea0 R14: 00000000004e1ac0 R15: 0000000000000006 15:23:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1311.154281][T20962] device 1519 entered promiscuous mode [ 1311.197151][T20957] device 2634 entered promiscuous mode [ 1311.255512][T20965] device 2635 entered promiscuous mode 15:23:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) 15:23:42 executing program 5 (fault-call:3 fault-nth:10): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 15:23:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32602) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1311.331164][T20987] device 2211 entered promiscuous mode [ 1311.480133][T20988] device 2212 entered promiscuous mode [ 1311.495120][T21020] FAULT_INJECTION: forcing a failure. [ 1311.495120][T21020] name failslab, interval 1, probability 0, space 0, times 0 [ 1311.508770][T21020] CPU: 0 PID: 21020 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1311.516331][T21020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1311.526426][T21020] Call Trace: [ 1311.529748][T21020] dump_stack+0x172/0x1f0 [ 1311.534105][T21020] should_fail.cold+0xa/0x15 [ 1311.538712][T21020] ? fault_create_debugfs_attr+0x180/0x180 [ 1311.544532][T21020] ? __kasan_check_read+0x11/0x20 [ 1311.549570][T21020] ? mark_lock+0xc2/0x1220 [ 1311.554011][T21020] __should_failslab+0x121/0x190 [ 1311.554908][T21026] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1311.558952][T21020] should_failslab+0x9/0x14 [ 1311.558998][T21020] kmem_cache_alloc+0x47/0x710 [ 1311.559019][T21020] ? mark_held_locks+0xa4/0xf0 [ 1311.581075][T21020] ? mempool_alloc+0x380/0x380 [ 1311.585850][T21020] mempool_alloc_slab+0x47/0x60 [ 1311.590021][T21016] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1311.590708][T21020] mempool_alloc+0x169/0x380 [ 1311.590723][T21020] ? trace_hardirqs_on_caller+0x6a/0x240 [ 1311.590744][T21020] ? mempool_destroy+0x40/0x40 [ 1311.590770][T21020] ? __kasan_check_read+0x11/0x20 [ 1311.609108][T21020] sg_pool_alloc+0xb8/0xd0 [ 1311.609129][T21020] __sg_alloc_table+0x26b/0x3b0 [ 1311.618900][T21020] sg_alloc_table_chained+0xa9/0x200 [ 1311.618913][T21020] ? mac_pton+0x2e0/0x2e0 [ 1311.619013][T21020] scsi_init_io+0x127/0x6e0 [ 1311.619082][T21020] sd_init_command+0x207/0x32d9 [ 1311.633537][T21020] ? retint_kernel+0x2b/0x2b [ 1311.633571][T21020] scsi_queue_rq+0x14a9/0x3020 [ 1311.633598][T21020] blk_mq_dispatch_rq_list+0x9f8/0x19e0 [ 1311.633615][T21020] ? lock_downgrade+0x920/0x920 [ 1311.633634][T21020] ? elv_rqhash_del+0x131/0x170 [ 1311.633651][T21020] ? cache_grow_begin.cold+0xe/0x2f [ 1311.633669][T21020] ? blk_mq_get_driver_tag+0x590/0x590 [ 1311.633687][T21020] ? dd_dispatch_request+0x242/0x8e0 [ 1311.633703][T21020] ? scsi_mq_get_budget+0x155/0x320 [ 1311.642537][T21020] blk_mq_do_dispatch_sched+0x1a3/0x430 [ 1311.642561][T21020] ? blk_mq_sched_free_hctx_data+0x1f0/0x1f0 [ 1311.642581][T21020] ? mark_held_locks+0xa4/0xf0 [ 1311.642597][T21020] blk_mq_sched_dispatch_requests+0x3f4/0x6d0 [ 1311.642611][T21020] ? lock_acquire+0x190/0x410 [ 1311.642626][T21020] ? blk_mq_sched_restart+0x90/0x90 [ 1311.642638][T21020] ? __kasan_check_read+0x11/0x20 [ 1311.642661][T21020] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1311.642681][T21020] __blk_mq_run_hw_queue+0x1cc/0x2e0 [ 1311.642699][T21020] ? blk_mq_hctx_mark_pending+0x250/0x250 [ 1311.648681][T21031] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1311.652232][T21020] ? __blk_mq_delay_run_hw_queue+0xb8/0x600 [ 1311.652250][T21020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1311.652268][T21020] __blk_mq_delay_run_hw_queue+0x53e/0x600 [ 1311.652288][T21020] blk_mq_run_hw_queue+0x19d/0x350 15:23:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32603) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1311.652303][T21020] ? blk_mq_delay_run_hw_queue+0x30/0x30 [ 1311.652327][T21020] ? dd_dispatch_request+0x8e0/0x8e0 [ 1311.652343][T21020] blk_mq_sched_insert_requests+0x308/0x680 [ 1311.652364][T21020] blk_mq_flush_plug_list+0x87a/0xd90 [ 1311.652378][T21020] ? generic_make_request+0x6fc/0xb50 [ 1311.652399][T21020] ? blk_mq_insert_requests+0x640/0x640 [ 1311.652416][T21020] ? trace_hardirqs_on_caller+0x6a/0x240 [ 1311.652434][T21020] blk_flush_plug_list+0x349/0x520 [ 1311.652448][T21020] ? submit_bio+0x11b/0x600 [ 1311.652466][T21020] ? generic_make_request+0xb50/0xb50 [ 1311.652487][T21020] ? blk_insert_cloned_request+0x530/0x530 [ 1311.673424][T21020] blk_finish_plug+0x58/0xa2 [ 1311.673440][T21020] do_blockdev_direct_IO+0x4aaa/0x8420 [ 1311.673477][T21020] ? sb_init_dio_done_wq+0x80/0x80 [ 1311.673493][T21020] ? __kasan_check_read+0x11/0x20 [ 1311.673510][T21020] ? mark_lock+0xc2/0x1220 [ 1311.673524][T21020] ? __lock_acquire+0x16f2/0x4a00 [ 1311.673553][T21020] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1311.673570][T21020] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1311.684231][T21020] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1311.684257][T21020] ? retint_kernel+0x2b/0x2b [ 1311.684275][T21020] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1311.684293][T21020] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 1311.684310][T21020] __blockdev_direct_IO+0xa1/0xca [ 1311.684323][T21020] ? __blockdev_direct_IO+0xa1/0xca [ 1311.684335][T21020] ? bget_one+0x30/0x30 [ 1311.684358][T21020] ext4_direct_IO+0xd60/0x1c30 [ 1311.711174][T21020] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 15:23:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32604) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1311.711208][T21020] generic_file_direct_write+0x20a/0x4a0 [ 1311.711231][T21020] __generic_file_write_iter+0x2ee/0x630 [ 1311.711250][T21020] ext4_file_write_iter+0x317/0x13c0 [ 1311.732165][T21020] ? __kasan_check_read+0x11/0x20 [ 1311.732191][T21020] ? ext4_release_file+0x380/0x380 [ 1311.732207][T21020] ? mark_held_locks+0xa4/0xf0 [ 1311.732224][T21020] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1311.732237][T21020] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1311.732252][T21020] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1311.732266][T21020] ? retint_kernel+0x2b/0x2b [ 1311.732282][T21020] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1311.732296][T21020] ? iov_iter_init+0xee/0x220 [ 1311.732315][T21020] new_sync_write+0x4d3/0x770 [ 1311.732331][T21020] ? new_sync_read+0x800/0x800 [ 1311.732355][T21020] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1311.749563][T21020] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1311.749584][T21020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1311.749607][T21020] __vfs_write+0xe1/0x110 [ 1311.749625][T21020] vfs_write+0x268/0x5d0 [ 1311.749642][T21020] ksys_write+0x14f/0x290 [ 1311.749659][T21020] ? __ia32_sys_read+0xb0/0xb0 [ 1311.791600][T21020] ? do_syscall_64+0x26/0x760 [ 1311.791618][T21020] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1311.791633][T21020] ? do_syscall_64+0x26/0x760 [ 1311.791654][T21020] __x64_sys_write+0x73/0xb0 [ 1311.791668][T21020] do_syscall_64+0xfa/0x760 [ 1311.791687][T21020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1311.802909][T21020] RIP: 0033:0x459a59 [ 1311.802925][T21020] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1311.802934][T21020] RSP: 002b:00007fbf1c922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1311.802948][T21020] RAX: ffffffffffffffda RBX: 00007fbf1c922c90 RCX: 0000000000459a59 [ 1311.802957][T21020] RDX: 0000000000032600 RSI: 0000000020000000 RDI: 0000000000000005 [ 1311.802966][T21020] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1311.802975][T21020] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf1c9236d4 [ 1311.802983][T21020] R13: 00000000004c9ea0 R14: 00000000004e1ac0 R15: 0000000000000006 [ 1312.154914][T20991] device 2213 entered promiscuous mode 15:23:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) 15:23:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32605) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1312.199154][T20997] device 1766 entered promiscuous mode [ 1312.250575][T21001] device 1767 entered promiscuous mode 15:23:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r1, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/316], 0x0, 0x33}, 0x20) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) 15:23:43 executing program 5 (fault-call:3 fault-nth:11): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1312.350637][T21026] device 2636 entered promiscuous mode [ 1312.402237][T21049] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1312.422312][T21016] device 1520 entered promiscuous mode [ 1312.436518][T21054] FAULT_INJECTION: forcing a failure. [ 1312.436518][T21054] name failslab, interval 1, probability 0, space 0, times 0 [ 1312.450360][T21054] CPU: 0 PID: 21054 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1312.450378][T21054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1312.467981][T21054] Call Trace: [ 1312.471290][T21054] dump_stack+0x172/0x1f0 [ 1312.475630][T21054] should_fail.cold+0xa/0x15 [ 1312.480224][T21054] ? fault_create_debugfs_attr+0x180/0x180 [ 1312.486048][T21054] ? __kasan_check_read+0x11/0x20 [ 1312.491081][T21054] ? __lock_acquire+0x8a0/0x4a00 [ 1312.496028][T21054] ? __kasan_check_read+0x11/0x20 [ 1312.501066][T21054] __should_failslab+0x121/0x190 [ 1312.506014][T21054] should_failslab+0x9/0x14 [ 1312.510525][T21054] kmem_cache_alloc+0x47/0x710 [ 1312.515436][T21054] ? ___might_sleep+0x163/0x2c0 [ 1312.520316][T21054] ? mempool_alloc+0x380/0x380 [ 1312.525101][T21054] mempool_alloc_slab+0x47/0x60 [ 1312.529954][T21054] mempool_alloc+0x169/0x380 [ 1312.529975][T21054] ? mempool_destroy+0x40/0x40 [ 1312.529993][T21054] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1312.530014][T21054] ? ___might_sleep+0x163/0x2c0 [ 1312.550402][T21054] bio_alloc_bioset+0x3b9/0x680 [ 1312.550422][T21054] ? bvec_alloc+0x2f0/0x2f0 [ 1312.550448][T21054] submit_bh_wbc+0x1c5/0x900 [ 1312.559765][T21054] __sync_dirty_buffer+0x12b/0x350 [ 1312.569435][T21054] sync_dirty_buffer+0x1b/0x20 [ 1312.574208][T21054] ext4_write_inode+0x54b/0x600 [ 1312.579073][T21054] ? __ext4_iget+0x3e20/0x3e20 [ 1312.583848][T21054] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1312.589394][T21054] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1312.589409][T21054] ? __kasan_check_read+0x11/0x20 15:23:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1312.589425][T21054] ? do_raw_spin_unlock+0x57/0x270 [ 1312.605491][T21054] __writeback_single_inode+0xd67/0x1400 [ 1312.605513][T21054] writeback_single_inode+0x2cf/0x440 [ 1312.605531][T21054] sync_inode_metadata+0xa8/0xe0 [ 1312.605546][T21054] ? sync_inode+0x30/0x30 [ 1312.605576][T21054] __generic_file_fsync+0x169/0x200 [ 1312.605595][T21054] ext4_sync_file+0x89a/0x15c0 [ 1312.605610][T21054] ? ext4_getfsmap+0x940/0x940 [ 1312.605628][T21054] vfs_fsync_range+0x141/0x230 [ 1312.605647][T21054] ext4_file_write_iter+0x406/0x13c0 [ 1312.605665][T21054] ? ext4_release_file+0x380/0x380 [ 1312.605683][T21054] ? mark_lock+0xc2/0x1220 [ 1312.645360][T21054] ? __kasan_check_read+0x11/0x20 [ 1312.645378][T21054] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1312.645396][T21054] ? iov_iter_init+0xee/0x220 [ 1312.676097][T21054] new_sync_write+0x4d3/0x770 [ 1312.676117][T21054] ? new_sync_read+0x800/0x800 [ 1312.685722][T21054] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1312.691892][T21054] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1312.694323][T21031] device 2637 entered promiscuous mode [ 1312.697272][T21054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1312.697293][T21054] __vfs_write+0xe1/0x110 [ 1312.697308][T21054] vfs_write+0x268/0x5d0 [ 1312.697324][T21054] ksys_write+0x14f/0x290 [ 1312.697343][T21054] ? __ia32_sys_read+0xb0/0xb0 [ 1312.697360][T21054] ? do_syscall_64+0x26/0x760 [ 1312.697376][T21054] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1312.697387][T21054] ? do_syscall_64+0x26/0x760 [ 1312.697411][T21054] __x64_sys_write+0x73/0xb0 [ 1312.747067][T21054] do_syscall_64+0xfa/0x760 [ 1312.751579][T21054] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1312.757481][T21054] RIP: 0033:0x459a59 [ 1312.761377][T21054] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1312.780991][T21054] RSP: 002b:00007fbf1c922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1312.789527][T21054] RAX: ffffffffffffffda RBX: 00007fbf1c922c90 RCX: 0000000000459a59 15:23:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32606) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:23:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1312.797506][T21054] RDX: 0000000000032600 RSI: 0000000020000000 RDI: 0000000000000005 [ 1312.805707][T21054] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1312.813822][T21054] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf1c9236d4 [ 1312.821806][T21054] R13: 00000000004c9ea0 R14: 00000000004e1ac0 R15: 0000000000000006 15:23:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32607) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1313.029457][T21049] device 2214 entered promiscuous mode 15:23:44 executing program 5 (fault-call:3 fault-nth:12): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1313.079725][T21060] device 2215 entered promiscuous mode 15:23:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) 15:23:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32608) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1313.301348][T21058] device 1768 entered promiscuous mode [ 1313.330211][T21088] FAULT_INJECTION: forcing a failure. [ 1313.330211][T21088] name failslab, interval 1, probability 0, space 0, times 0 [ 1313.352204][T21088] CPU: 0 PID: 21088 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1313.359795][T21088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1313.369858][T21088] Call Trace: [ 1313.373169][T21088] dump_stack+0x172/0x1f0 [ 1313.377518][T21088] should_fail.cold+0xa/0x15 [ 1313.382130][T21088] ? fault_create_debugfs_attr+0x180/0x180 [ 1313.387950][T21088] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1313.393765][T21088] __should_failslab+0x121/0x190 [ 1313.398709][T21088] should_failslab+0x9/0x14 [ 1313.403223][T21088] kmem_cache_alloc+0x47/0x710 [ 1313.408002][T21088] ? ___might_sleep+0x163/0x2c0 [ 1313.412864][T21088] ? mempool_alloc+0x380/0x380 [ 1313.417630][T21088] mempool_alloc_slab+0x47/0x60 [ 1313.422487][T21088] mempool_alloc+0x169/0x380 [ 1313.427090][T21088] ? mempool_destroy+0x40/0x40 [ 1313.431869][T21088] ? __kasan_check_read+0x11/0x20 [ 1313.436898][T21088] ? __lock_acquire+0x16f2/0x4a00 [ 1313.441934][T21088] ? reacquire_held_locks+0x208/0x510 [ 1313.447440][T21088] ? writeback_single_inode+0x2f4/0x440 [ 1313.453004][T21088] bio_alloc_bioset+0x3b9/0x680 [ 1313.457962][T21088] ? bvec_alloc+0x2f0/0x2f0 [ 1313.462493][T21088] submit_bh_wbc+0x1c5/0x900 [ 1313.467105][T21088] write_dirty_buffer+0xd0/0x180 [ 1313.472101][T21088] sync_mapping_buffers+0x3b5/0xb50 [ 1313.477319][T21088] ? write_dirty_buffer+0x180/0x180 [ 1313.482528][T21088] ? _atomic_dec_and_lock_irqsave+0x280/0x280 [ 1313.488601][T21088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1313.494868][T21088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1313.501125][T21088] ? iput+0x562/0x900 [ 1313.505123][T21088] ext4_sync_file+0xebb/0x15c0 [ 1313.509897][T21088] ? ext4_getfsmap+0x940/0x940 [ 1313.514668][T21088] vfs_fsync_range+0x141/0x230 [ 1313.514709][T21088] ext4_file_write_iter+0x406/0x13c0 [ 1313.524739][T21088] ? ext4_release_file+0x380/0x380 [ 1313.524756][T21088] ? mark_lock+0xc2/0x1220 [ 1313.524778][T21088] ? __kasan_check_read+0x11/0x20 [ 1313.524794][T21088] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1313.524812][T21088] ? iov_iter_init+0xee/0x220 [ 1313.539350][T21088] new_sync_write+0x4d3/0x770 [ 1313.539371][T21088] ? new_sync_read+0x800/0x800 [ 1313.539400][T21088] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1313.539420][T21088] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1313.539441][T21088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1313.577379][T21088] __vfs_write+0xe1/0x110 [ 1313.581711][T21088] vfs_write+0x268/0x5d0 [ 1313.581731][T21088] ksys_write+0x14f/0x290 [ 1313.581748][T21088] ? __ia32_sys_read+0xb0/0xb0 [ 1313.581768][T21088] ? do_syscall_64+0x26/0x760 [ 1313.581784][T21088] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1313.581796][T21088] ? do_syscall_64+0x26/0x760 [ 1313.581814][T21088] __x64_sys_write+0x73/0xb0 [ 1313.581830][T21088] do_syscall_64+0xfa/0x760 [ 1313.581848][T21088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1313.581859][T21088] RIP: 0033:0x459a59 [ 1313.581874][T21088] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:23:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32609) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1313.581880][T21088] RSP: 002b:00007fbf1c922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1313.581892][T21088] RAX: ffffffffffffffda RBX: 00007fbf1c922c90 RCX: 0000000000459a59 [ 1313.581898][T21088] RDX: 0000000000032600 RSI: 0000000020000000 RDI: 0000000000000005 [ 1313.581911][T21088] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1313.590445][T21088] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf1c9236d4 [ 1313.590454][T21088] R13: 00000000004c9ea0 R14: 00000000004e1ac0 R15: 0000000000000006 15:23:45 executing program 5 (fault-call:3 fault-nth:13): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 15:23:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r1, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) [ 1313.757569][T21062] device 1769 entered promiscuous mode [ 1313.789791][T21064] device 1521 entered promiscuous mode 15:23:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1313.864750][T21075] device 2638 entered promiscuous mode [ 1313.871625][T21109] FAULT_INJECTION: forcing a failure. [ 1313.871625][T21109] name failslab, interval 1, probability 0, space 0, times 0 [ 1313.908803][T21109] CPU: 1 PID: 21109 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1313.916385][T21109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1313.926454][T21109] Call Trace: [ 1313.926479][T21109] dump_stack+0x172/0x1f0 [ 1313.926503][T21109] should_fail.cold+0xa/0x15 [ 1313.926528][T21109] ? fault_create_debugfs_attr+0x180/0x180 [ 1313.938696][T21109] ? __kasan_check_read+0x11/0x20 [ 1313.938713][T21109] ? __lock_acquire+0x8a0/0x4a00 [ 1313.938726][T21109] ? mark_lock+0xc2/0x1220 [ 1313.938742][T21109] ? __perf_event_task_sched_in+0x640/0x820 [ 1313.938762][T21109] __should_failslab+0x121/0x190 [ 1313.949556][T21109] should_failslab+0x9/0x14 [ 1313.949574][T21109] kmem_cache_alloc+0x47/0x710 [ 1313.949594][T21109] ? ___might_sleep+0x163/0x2c0 [ 1313.949612][T21109] ? mempool_alloc+0x380/0x380 [ 1313.949628][T21109] mempool_alloc_slab+0x47/0x60 [ 1313.958943][T21109] mempool_alloc+0x169/0x380 [ 1313.958965][T21109] ? mempool_destroy+0x40/0x40 [ 1313.958987][T21109] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1313.959007][T21109] ? ___might_sleep+0x163/0x2c0 [ 1313.959029][T21109] bio_alloc_bioset+0x3b9/0x680 [ 1313.969832][T21109] ? bvec_alloc+0x2f0/0x2f0 [ 1313.969862][T21109] submit_bh_wbc+0x1c5/0x900 [ 1313.969886][T21109] __sync_dirty_buffer+0x12b/0x350 [ 1313.969907][T21109] sync_dirty_buffer+0x1b/0x20 [ 1313.979136][T21109] ext4_write_inode+0x54b/0x600 [ 1313.979155][T21109] ? __ext4_iget+0x3e20/0x3e20 [ 1313.979176][T21109] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1313.979193][T21109] ? rcu_read_lock_any_held.part.0+0x50/0x50 15:23:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x3260c) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1313.979206][T21109] ? __kasan_check_read+0x11/0x20 [ 1313.979222][T21109] ? do_raw_spin_unlock+0x57/0x270 [ 1313.988801][T21109] __writeback_single_inode+0xd67/0x1400 [ 1313.988827][T21109] writeback_single_inode+0x2cf/0x440 [ 1313.988847][T21109] sync_inode_metadata+0xa8/0xe0 [ 1313.988862][T21109] ? sync_inode+0x30/0x30 [ 1313.988885][T21109] ? iput+0x562/0x900 [ 1313.998287][T21109] ext4_sync_file+0xee2/0x15c0 [ 1313.998303][T21109] ? ext4_getfsmap+0x940/0x940 [ 1313.998323][T21109] vfs_fsync_range+0x141/0x230 [ 1313.998344][T21109] ext4_file_write_iter+0x406/0x13c0 [ 1313.998364][T21109] ? ext4_release_file+0x380/0x380 [ 1314.009324][T21109] ? mark_lock+0xc2/0x1220 [ 1314.009346][T21109] ? __kasan_check_read+0x11/0x20 [ 1314.009364][T21109] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1314.009379][T21109] ? iov_iter_init+0xee/0x220 [ 1314.009403][T21109] new_sync_write+0x4d3/0x770 [ 1314.019066][T21109] ? new_sync_read+0x800/0x800 [ 1314.019095][T21109] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1314.019118][T21109] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1314.019135][T21109] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1314.019154][T21109] __vfs_write+0xe1/0x110 [ 1314.028229][T21109] vfs_write+0x268/0x5d0 [ 1314.028248][T21109] ksys_write+0x14f/0x290 [ 1314.028265][T21109] ? __ia32_sys_read+0xb0/0xb0 [ 1314.028284][T21109] ? do_syscall_64+0x26/0x760 [ 1314.028301][T21109] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1314.028318][T21109] ? do_syscall_64+0x26/0x760 [ 1314.038152][T21109] __x64_sys_write+0x73/0xb0 [ 1314.038172][T21109] do_syscall_64+0xfa/0x760 [ 1314.038195][T21109] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1314.038207][T21109] RIP: 0033:0x459a59 [ 1314.038221][T21109] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1314.038233][T21109] RSP: 002b:00007fbf1c922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1314.047823][T21109] RAX: ffffffffffffffda RBX: 00007fbf1c922c90 RCX: 0000000000459a59 [ 1314.047832][T21109] RDX: 0000000000032600 RSI: 0000000020000000 RDI: 0000000000000005 [ 1314.047841][T21109] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1314.047850][T21109] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf1c9236d4 [ 1314.047859][T21109] R13: 00000000004c9ea0 R14: 00000000004e1ac0 R15: 0000000000000006 [ 1314.062263][T21077] device 2639 entered promiscuous mode [ 1314.122694][T21115] validate_nla: 9 callbacks suppressed [ 1314.122703][T21115] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 15:23:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x3260d) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1314.175261][T21114] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1314.260456][T21113] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 15:23:45 executing program 5 (fault-call:3 fault-nth:14): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1314.380140][T21082] device 2640 entered promiscuous mode 15:23:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1314.430319][T21092] device 2216 entered promiscuous mode 15:23:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32612) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:23:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) [ 1314.490269][T21095] device 2217 entered promiscuous mode [ 1314.546887][T21131] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1314.651708][T21130] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1314.696647][T21142] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 15:23:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 15:23:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32632) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1314.839947][T21114] device 1522 entered promiscuous mode [ 1314.867589][T21141] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1314.930998][T21150] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1314.952385][T21113] device 1770 entered promiscuous mode 15:23:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1314.976825][T21153] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 15:23:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32602) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1315.040023][T21115] device 1771 entered promiscuous mode 15:23:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r1, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/316], 0x0, 0x33}, 0x20) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) 15:23:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32633) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1315.140161][T21131] device 2641 entered promiscuous mode [ 1315.269600][T21163] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 15:23:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32603) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 15:23:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32634) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1315.373773][T21130] device 2642 entered promiscuous mode 15:23:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32604) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1315.449657][T21142] device 2643 entered promiscuous mode 15:23:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1315.540170][T21141] device 2218 entered promiscuous mode [ 1315.636695][T21150] device 2219 entered promiscuous mode 15:23:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32635) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1315.720078][T21153] device 2220 entered promiscuous mode 15:23:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) 15:23:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32605) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1315.769843][T21163] device 1523 entered promiscuous mode [ 1315.919230][T21173] device 1772 entered promiscuous mode 15:23:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) 15:23:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x326c0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:23:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32606) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1316.153679][T21172] device 1773 entered promiscuous mode 15:23:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) 15:23:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32607) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 15:23:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x326e6) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1316.487723][T21190] device 2644 entered promiscuous mode 15:23:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x326ea) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:23:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32608) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1316.561007][T21194] device 2645 entered promiscuous mode [ 1316.587888][T21198] device 2646 entered promiscuous mode 15:23:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1316.652800][T21207] device 2221 entered promiscuous mode [ 1316.786171][T21203] device 2222 entered promiscuous mode 15:23:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32609) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1316.847641][T21212] device 2223 entered promiscuous mode 15:23:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) 15:23:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x326ed) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1316.928294][T21224] device 1524 entered promiscuous mode 15:23:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) 15:23:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x3260c) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 15:23:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x326f2) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1317.230636][T21232] device 1774 entered promiscuous mode [ 1317.313380][T21236] device 1775 entered promiscuous mode 15:23:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) 15:23:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x33200) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:23:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x3260d) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1317.645060][T21250] device 2647 entered promiscuous mode [ 1317.699646][T21254] device 2648 entered promiscuous mode 15:23:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32612) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1317.773017][T21262] device 2649 entered promiscuous mode 15:23:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) 15:23:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x33300) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:23:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32632) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1317.953153][T21268] device 2224 entered promiscuous mode [ 1318.059438][T21272] device 1525 entered promiscuous mode [ 1318.129548][T21279] device 2225 entered promiscuous mode [ 1318.184261][T21281] device 2226 entered promiscuous mode 15:23:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) 15:23:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32633) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 15:23:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) 15:23:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x33400) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1318.235573][T21289] device 1776 entered promiscuous mode 15:23:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) [ 1318.408820][T21287] device 1777 entered promiscuous mode 15:23:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32634) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 15:23:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x33500) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1318.538356][T21315] device 2650 entered promiscuous mode 15:23:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32635) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 15:23:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x34000) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1318.811400][T21311] device 2651 entered promiscuous mode [ 1318.900017][T21320] device 2652 entered promiscuous mode 15:23:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) 15:23:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x326c0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1318.968838][T21331] device 1526 entered promiscuous mode 15:23:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1319.250679][T21335] device 2227 entered promiscuous mode [ 1319.269023][T21372] validate_nla: 29 callbacks suppressed [ 1319.270388][T21372] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1319.322947][T21380] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1319.323711][T21377] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1319.346438][T21339] device 2228 entered promiscuous mode [ 1319.362255][T21343] device 1778 entered promiscuous mode 15:23:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380)}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) 15:23:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:23:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x326ee) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1319.372329][T21381] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1319.390065][T21352] device 2229 entered promiscuous mode [ 1319.406656][T21346] device 1779 entered promiscuous mode 15:23:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) 15:23:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x326f0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1319.599619][T21393] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 1319.649139][T21396] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 1319.656940][T21395] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1319.705859][T21390] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 15:23:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffff5ff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1319.752158][T21397] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 15:23:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x326f2) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1319.873349][T21372] device 2653 entered promiscuous mode [ 1319.967866][T21380] device 2654 entered promiscuous mode 15:23:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x33200) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1320.081030][T21377] device 1527 entered promiscuous mode 15:23:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1320.150942][T21381] device 2655 entered promiscuous mode 15:23:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) 15:23:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x33300) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1320.404965][T21393] device 1780 entered promiscuous mode [ 1320.437333][T21422] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 15:23:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffdef) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1320.499898][T21395] device 2230 entered promiscuous mode [ 1320.625602][T21390] device 2231 entered promiscuous mode [ 1320.658717][T21396] device 1781 entered promiscuous mode [ 1320.729952][T21397] device 2232 entered promiscuous mode 15:23:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380)}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) 15:23:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x33400) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 15:23:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) 15:23:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x33500) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 15:23:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1321.081957][T21422] device 1528 entered promiscuous mode 15:23:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x34000) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 15:23:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffffffffffdef) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1321.290594][T21426] device 2656 entered promiscuous mode 15:23:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1321.413750][T21432] device 2657 entered promiscuous mode [ 1321.471348][T21437] device 2658 entered promiscuous mode 15:23:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) 15:23:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.stat\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xef, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1321.686965][T21446] device 1782 entered promiscuous mode [ 1321.751255][T21452] device 1783 entered promiscuous mode 15:23:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r4 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r3, r1, 0xf}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:23:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) [ 1321.824319][T21451] device 2233 entered promiscuous mode [ 1321.896254][T21449] device 2234 entered promiscuous mode [ 1321.995932][T21457] device 2235 entered promiscuous mode 15:23:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380)}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) [ 1322.054988][T21463] device 1529 entered promiscuous mode 15:23:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) 15:23:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffff5ff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1322.136527][T21489] device 2659 entered promiscuous mode 15:23:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='memory.events\x00') openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:23:54 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6, 0x1f, 0x7, 0x3, 0x0, 0xad, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x0, @perf_bp={&(0x7f0000000000), 0x10}, 0x2040, 0xff, 0x8001, 0x5, 0x1, 0x1, 0xf39c}, 0x0, 0xa, r0, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001b00)={0xffffffffffffffff}) sendmsg$sock(r4, &(0x7f0000001f40)={&(0x7f0000001b40)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001c40)="e82168de4cdb5fb78cd415f490fd038c15e526c907896757d0c797341717210d31965820325a5c88d5d742927b039b1ffe75a0f781b9b1638681aabbcefbc69a1b504f9e366b531566f5f90e1122d65f56f7730fc3148c5ec3b0bb4d65e7cf3038f3d8f521b381167b", 0x69}, {&(0x7f0000001cc0)="96dc24ca09100cc8a68bd1735dc81b7a19b2c844dda52db1d4111d66eabd0b5a0c750ed864b938c76daea7c497b4a71f32e1bd7a87d7b19bc94959c58662e0e4395339b0d3745586e9521a5b9213b61a5d860ca47d073dce4b79f9a330ded69f6d4e545780e1d7f2c3362c63a6bdd03bf5dfc9b9f0e5ee3658daab88bb172e6dfe8b711d4b4a0730", 0x88}, {&(0x7f0000001d80)="856b2b2f5bd12a52191b94f4299d1279f2ade095a0f98375cb404aed8e500d2c25ab2ac8f0e2173f45b618ecbb742f27740ed3065281dcd6383d539272a5f609183d3c52d1c9a670cd34385860339b4fc685a96ab4c923d12917", 0x5a}, {&(0x7f0000001e00)="3862549e977dbc0203e5d68fccf28b6aedc5b1b2277037357eac94f286c11b253b051c49b90f7efce4683b76b8ae5a58061501085dc0ef553ac46593b540a3cfab04ea1541f7296ee8120a42b2fefcd296e82d9d6f98e3e6d24ea499f285be76585a3c595275839bd8ac2657f475cf07f7ddb6ed37bc9d99e36892738db0eb0024f2f65de918486139a389e8edb7ffbc10e7bc871aa46569e4c736a6a54392b87b1c9e04", 0xa4}, {&(0x7f0000001bc0)="5d8163cfabab0b92715f7c6de622bfef10ebeb0aebcf5ecfa98fae52f88e6eecdac64a", 0x23}], 0x5}, 0x800) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r5 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x28, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r2, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(r2, &(0x7f0000001c00)='cpu.stat\x00', 0x7a05, 0x1700) r6 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1322.506918][T21486] device 2660 entered promiscuous mode [ 1322.571716][T21491] device 2661 entered promiscuous mode 15:23:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) 15:23:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffdef) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1322.798007][T21496] device 1784 entered promiscuous mode 15:23:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r4 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1322.871563][T21500] device 1785 entered promiscuous mode 15:23:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) [ 1322.944321][T21512] device 2236 entered promiscuous mode 15:23:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffffffffffdef) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1323.065638][T21506] device 2237 entered promiscuous mode [ 1323.146789][T21519] device 2238 entered promiscuous mode 15:23:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup(r4, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:23:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x0, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) [ 1323.198167][T21509] device 1530 entered promiscuous mode 15:23:54 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={&(0x7f0000000680)=@ipx={0x4, 0xf8, 0x1, "b0f71a92b648", 0x40}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000700)="513763c06a003cb400dfae0a9f00b6e31e7ab2c6fcd2cb3b1145669612e46614e3758699ab7add6ce11416783fe8b1989c48bb0c5cb882457134c4e9c67cc79e8bcb7644a90785bf1a3a76891f80a345b592bdad0d9f72ac29a8d5c17e41f0cdd6b4ff8018a187a19b494de2af741ae026a1c6cfb8427f14dafb87c073cf73d0aed7063de02706881cce81011dffbb986d5ddd797119e7bda5d6ce06fc40b0946b5e13460aa89bd05d4e609411d95ab23bfb68db4aca7eaec98235c5131ba9c60d61f7ee54e2b3486bb4482dce12e2f53d1664f25c003e8259c69d706dd39f81f6181458058f3e82438460ed063d", 0xee}, {&(0x7f0000000800)="7094abcbd5fc1e4c451a863c952a9b217c7ce48b0698dba763e4928867730a68bad0d18395ae779e97c35544e304ae1897d0516f1f801164c58a1c10c8101da7604e6886d268219fcca3f59ab97ea547aeed94697881834d6e9320d13d73ceb0b25cca112c1a35d475cf820a63d500a586e98d73e1ef69a4f75df8c6ee0c4724cb511e23043c667c0c27b222273e12b4d6", 0x91}, {&(0x7f00000008c0)="a263e9e5fe3836592960d1df073058b6583a0f5a798aebb30591ff984cd3e97426b5effdedd996dc43e8967521edca7748cfdeee8faa067c15acc231b19b1eee249d102deca205f56f99fa2b27f7019e460b23ae44c19385eb2f8d75702be6cc6c8c6c3d7bc638ef1220cfa01b1e4313e9bea6442842e6c8b32637f610bbeee17e0967d095531ee35c463bb446a3fbba90c77b502d85d551f1a58d5a5a299bf30807309bea91bbd575aa8c9e3104a667cfc1c83e843485b6b6e6", 0xba}], 0x3, &(0x7f0000000980)=[{0x88, 0x117, 0x1, "84686a76bfd96536b5d8b954b6e2fa22590a2cc5051372c6ca4ee01a1482806f83c147f47b574de65f3f1d01ae0a8d6fdc2c02efbdaa65fd9801701e7b9385669bd4bfdb5a6fe3ce5b3de8d41eaae7feb221c7eb9c564bda603c185549d103a96c564a469256f9e088e7d3df98d3af57d7cd11bf4a75a1"}, {0x90, 0x118, 0x4, "96f5d263f88053616e38770cb4ad16d4683f48d23165d729a5ce28f23045de9241839ceb53e99c00b32931420b81c3789fa78b2eb36229ecaeba1cf4a5bd53c0226562335eeb06b9602dd3ea055b67398d22549cab34f8de6dd8322f985b53e834e6e2a4bf4d859b318a61f6395afe8f75f7a1a5b38a0a36a552"}, {0x88, 0x118, 0x57, "e26fa6894a56d2af0dae048bf23cbdf03c4db460b79b748289cc14957fd6e4f65b78c67fb2d7d8c552876f5f8b4ba9bc05df5181c638279e37ed49aa4f0c13ebd0002210eb1e881f1f1a79068948034d46dcc03642b1cab93c26ef779ef8205c067b71eccb19530e0d4157f0cd7be36dc2775078d6"}], 0x1a0}, 0x24000080) r4 = gettid() r5 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000240)=ANY=[@ANYBLOB="091f00000000000000000000000000000000000000000000000050f26eca2184"]) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r6 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r7, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r9, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r9, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r10 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r10) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r11, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) r13 = openat$cgroup_int(r12, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r13, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000cc0)=ANY=[@ANYRES32, @ANYRESDEC=r0, @ANYRESHEX=0x0, @ANYRESHEX=r7, @ANYRES16=r8, @ANYPTR=&(0x7f00000011c0)=ANY=[@ANYRESDEC=r9, @ANYPTR, @ANYRES16=r3, @ANYRESDEC=r10, @ANYPTR64=&(0x7f0000000c00)=ANY=[@ANYRESOCT=r7], @ANYRES64=r4, @ANYRESOCT, @ANYRES32=r3, @ANYPTR64=&(0x7f0000001040)=ANY=[@ANYBLOB="bf604976c1dcd79c8e1af9617cfd8d9610d511dd0ce021a9bedf5d1796fa45cd49f5e66ace542eb03995ced8deb8704825b6a2e8ca7eae8697e91b2aa971b77ea351dfa934f56051448a1222c35abb3c691bfa96e689d4bd36b3256ff2e4c383334b572ddd8c110475cfbfed157261c306697fae6010d3bffb757b3ecfe01b12895d018687885aadfe354c7ea1185355edc3320869209117d97f3fa8d5ba4dd740c675f599f5ca3463407b63eaedc6cf7f8544517d1ca38e0f83fb4a4d8dbb2b7acb6f9a9917de2a89a787bad5a25a6364745a88c787344998b063c7bae55b883a9a5b83dee78e8d0867ffcd341a", @ANYPTR64, @ANYRESHEX=r11, @ANYPTR64, @ANYRESDEC=r7, @ANYRESDEC, @ANYRES16=r13, @ANYPTR, @ANYRESOCT=0x0, @ANYPTR64]], @ANYRES16=0x0], 0x0, 0x48}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='memory.events\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r14 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000bc0), 0x4}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r14) r15 = perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x89, 0xff, 0x1, 0x3f, 0x0, 0x3, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x6, @perf_bp={&(0x7f00000003c0), 0x4}, 0x100, 0x7fff, 0x3, 0xe, 0x541, 0x7, 0x3ff}, r4, 0x6, r14, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r15, 0x40082406, &(0x7f0000000540)='memory.events\x00') r16 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r17 = gettid() r18 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r19 = gettid() write$cgroup_pid(r18, &(0x7f00000005c0)=r19, 0x12) perf_event_open(&(0x7f0000000600)={0x3, 0x70, 0x20, 0x40, 0x4, 0x7f, 0x0, 0xffffffff, 0x49903, 0x7, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_config_ext={0x36, 0x3}, 0x2000, 0x80000001, 0x1, 0x7, 0xc4ca, 0x8, 0x3f}, r19, 0x8, r5, 0x1) write$cgroup_pid(r16, &(0x7f00000005c0)=r17, 0x12) r20 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r20) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x1, 0x7f, 0x0, 0x0, 0x88d6, 0xdad8d31b7a8615af, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x81, 0x8, @perf_config_ext={0x1, 0x80}, 0x20000, 0x80, 0x4, 0x4, 0x7, 0x6, 0x5}, r17, 0x10, r20, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 15:23:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) 15:23:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x657a, 0xc2}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="080000000000000000000000000000000000000000000000000000f7fb00faa00e3b7fa724151400"/49]) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1323.585481][T21534] device 2662 entered promiscuous mode [ 1323.643401][T21537] device 2663 entered promiscuous mode 15:23:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1323.738971][T21546] device 2664 entered promiscuous mode [ 1323.796526][T21549] device 1786 entered promiscuous mode 15:23:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x20, 0x3e, 0x8, 0x81, 0x0, 0xfffffffffffff801, 0x100, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa44, 0xe, @perf_bp={&(0x7f0000000000), 0x1}, 0x200, 0x20000000000, 0xd74, 0x8, 0x5, 0xfffff001, 0x800}, 0x0, 0x9, r0, 0x4) [ 1323.904195][T21551] device 1787 entered promiscuous mode 15:23:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) [ 1324.131522][T21565] device 2239 entered promiscuous mode 15:23:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x4, 0x8, 0x0, 0x0, 0x70140337, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1324.241270][T21568] device 2240 entered promiscuous mode [ 1324.279390][T21603] validate_nla: 31 callbacks suppressed [ 1324.279400][T21603] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 1324.300365][T21577] device 2241 entered promiscuous mode [ 1324.330502][T21573] device 1531 entered promiscuous mode 15:23:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x0, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) 15:23:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) 15:23:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)=ANY=[@ANYBLOB="0800000000000d0000040000000072a170853902e9c3001b02f27071e0a1e7916b2c77"]) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000600)='/dev/net/tun\x00', 0x40100, 0x0) r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r7}, 0x10) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000640)=r7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, r5, 0x0, 0x3, &(0x7f0000000040)='&]\x00', 0xffffffffffffffff}, 0x30) write$cgroup_pid(r4, &(0x7f0000000100)=r8, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r9 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x18, 0x4, &(0x7f0000000140)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x106, 0x0, 0x0, 0x0, 0x8}, @generic={0x5, 0x5, 0x9, 0x5, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x1}], &(0x7f0000000280)='GPL\x00', 0x1000, 0x82, &(0x7f0000000380)=""/130, 0x41100, 0x7, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xc, 0x24c5}, 0x10}, 0x70) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000005c0)={0x0, r10, 0x16}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x9, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x8000}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000fdc0)=r11, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={r0, 0x10, &(0x7f0000000780)={&(0x7f0000000680)=""/198, 0xc6, r11}}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1324.580433][T21610] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1324.686070][T21570] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1324.700148][T21588] device 2665 entered promiscuous mode [ 1324.707280][T21613] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1324.735147][T21614] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1324.758895][T21620] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1324.772898][T21570] CPU: 0 PID: 21570 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1324.780496][T21570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1324.784764][T21613] device 2242 entered promiscuous mode [ 1324.790550][T21570] Call Trace: [ 1324.790573][T21570] dump_stack+0x172/0x1f0 [ 1324.790594][T21570] dump_header+0x10b/0x82d [ 1324.790616][T21570] oom_kill_process.cold+0x10/0x15 [ 1324.813276][T21570] out_of_memory+0x334/0x1340 [ 1324.817958][T21570] ? cgroup_file_notify+0x140/0x1b0 [ 1324.823165][T21570] ? oom_killer_disable+0x280/0x280 [ 1324.828376][T21570] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1324.833920][T21570] ? memcg_stat_show+0xc40/0xc40 [ 1324.838878][T21570] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1324.844688][T21570] ? cgroup_file_notify+0x140/0x1b0 [ 1324.849903][T21570] memory_max_write+0x262/0x3a0 [ 1324.854752][T21570] ? mem_cgroup_write+0x370/0x370 [ 1324.859779][T21570] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1324.865238][T21570] cgroup_file_write+0x241/0x790 [ 1324.870174][T21570] ? mem_cgroup_write+0x370/0x370 [ 1324.875196][T21570] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1324.880828][T21570] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1324.886479][T21570] kernfs_fop_write+0x2b8/0x480 [ 1324.891328][T21570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1324.897569][T21570] __vfs_write+0x8a/0x110 [ 1324.901981][T21570] ? kernfs_fop_open+0xd80/0xd80 [ 1324.906913][T21570] vfs_write+0x268/0x5d0 [ 1324.911151][T21570] ksys_write+0x14f/0x290 [ 1324.915475][T21570] ? __ia32_sys_read+0xb0/0xb0 [ 1324.920244][T21570] __x64_sys_write+0x73/0xb0 [ 1324.924845][T21570] ? do_syscall_64+0x5b/0x760 [ 1324.929523][T21570] do_syscall_64+0xfa/0x760 [ 1324.934030][T21570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1324.940173][T21570] RIP: 0033:0x459a59 [ 1324.944062][T21570] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1324.963656][T21570] RSP: 002b:00007fbf1c922c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1324.972060][T21570] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1324.980020][T21570] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000c [ 1324.987982][T21570] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1324.995947][T21570] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf1c9236d4 [ 1325.003910][T21570] R13: 00000000004c9e7e R14: 00000000004e1a90 R15: 00000000ffffffff [ 1325.037012][T21592] device 2666 entered promiscuous mode [ 1325.039923][T21570] memory: usage 8324kB, limit 0kB, failcnt 59 [ 1325.050021][T21570] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1325.063188][T21570] Memory cgroup stats for /syz5: [ 1325.063268][T21570] anon 16384 [ 1325.063268][T21570] file 102400 [ 1325.063268][T21570] kernel_stack 65536 [ 1325.063268][T21570] slab 7757824 [ 1325.063268][T21570] sock 0 [ 1325.063268][T21570] shmem 0 [ 1325.063268][T21570] file_mapped 0 [ 1325.063268][T21570] file_dirty 0 [ 1325.063268][T21570] file_writeback 0 [ 1325.063268][T21570] anon_thp 0 [ 1325.063268][T21570] inactive_anon 0 [ 1325.063268][T21570] active_anon 98304 [ 1325.063268][T21570] inactive_file 65536 [ 1325.063268][T21570] active_file 135168 [ 1325.063268][T21570] unevictable 0 [ 1325.063268][T21570] slab_reclaimable 3649536 [ 1325.063268][T21570] slab_unreclaimable 4108288 [ 1325.063268][T21570] pgfault 170544 [ 1325.063268][T21570] pgmajfault 0 [ 1325.063268][T21570] workingset_refault 0 [ 1325.063268][T21570] workingset_activate 0 [ 1325.063268][T21570] workingset_nodereclaim 0 [ 1325.063268][T21570] pgrefill 33 [ 1325.063268][T21570] pgscan 3330 [ 1325.063268][T21570] pgsteal 3275 [ 1325.063268][T21570] pgactivate 33 [ 1325.065195][T21599] device 2667 entered promiscuous mode [ 1325.068418][T21570] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=21569,uid=0 15:23:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1325.189546][T21570] Memory cgroup out of memory: Killed process 21569 (syz-executor.5) total-vm:72836kB, anon-rss:168kB, file-rss:35828kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1325.222561][ T1065] oom_reaper: reaped process 21569 (syz-executor.5), now anon-rss:0kB, file-rss:34868kB, shmem-rss:0kB [ 1325.245497][T21598] device 1788 entered promiscuous mode [ 1325.334746][T21603] device 1789 entered promiscuous mode 15:23:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r3, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r4, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) r6 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x0) write$cgroup_subtree(r0, &(0x7f0000001c40)=ANY=[], 0xffffffffffffffb8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r7 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1325.412799][T21628] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1325.415473][ T8765] syz-executor.5 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 15:23:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) [ 1325.473018][T21625] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1325.492680][T21610] device 2243 entered promiscuous mode 15:23:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x20}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1325.517215][T21631] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1325.532728][ T8765] CPU: 1 PID: 8765 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1325.540224][ T8765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1325.550287][ T8765] Call Trace: [ 1325.550307][ T8765] dump_stack+0x172/0x1f0 [ 1325.550328][ T8765] dump_header+0x10b/0x82d [ 1325.550339][ T8765] ? oom_kill_process+0x94/0x3f0 [ 1325.550358][ T8765] oom_kill_process.cold+0x10/0x15 [ 1325.572406][ T8765] out_of_memory+0x334/0x1340 [ 1325.577090][ T8765] ? lock_downgrade+0x920/0x920 [ 1325.581598][T21614] device 1532 entered promiscuous mode [ 1325.581940][ T8765] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1325.581958][ T8765] ? oom_killer_disable+0x280/0x280 [ 1325.581980][ T8765] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1325.604020][ T8765] ? memcg_stat_show+0xc40/0xc40 [ 1325.608978][ T8765] ? do_raw_spin_unlock+0x57/0x270 [ 1325.614227][ T8765] ? _raw_spin_unlock+0x2d/0x50 [ 1325.619098][ T8765] try_charge+0xf4b/0x1440 [ 1325.623517][ T8765] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1325.623531][ T8765] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1325.623549][ T8765] ? cache_grow_begin+0x122/0xd20 [ 1325.623562][ T8765] ? find_held_lock+0x35/0x130 [ 1325.623582][ T8765] ? cache_grow_begin+0x122/0xd20 [ 1325.649439][ T8765] __memcg_kmem_charge_memcg+0x7c/0x130 [ 1325.655013][ T8765] ? lock_downgrade+0x920/0x920 [ 1325.659878][ T8765] ? memcg_kmem_put_cache+0x50/0x50 [ 1325.665093][ T8765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1325.671335][ T8765] ? __kasan_check_read+0x11/0x20 [ 1325.671358][ T8765] cache_grow_begin+0x629/0xd20 [ 1325.671374][ T8765] ? __sanitizer_cov_trace_cmp4+0x1/0x20 [ 1325.671392][ T8765] ? mempolicy_slab_node+0x139/0x390 [ 1325.692244][ T8765] fallback_alloc+0x1fd/0x2d0 [ 1325.696940][ T8765] ____cache_alloc_node+0x1bc/0x1d0 [ 1325.696958][ T8765] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1325.696980][ T8765] kmem_cache_alloc+0x1ef/0x710 [ 1325.713311][ T8765] sk_prot_alloc+0x67/0x310 [ 1325.717827][ T8765] sk_alloc+0x39/0xf70 [ 1325.721930][ T8765] inet_create+0x368/0xe00 [ 1325.721990][ T8765] __sock_create+0x3d8/0x730 [ 1325.722011][ T8765] ? _raw_spin_unlock_irq+0x28/0x90 [ 1325.730996][ T8765] __sys_socket+0x103/0x220 [ 1325.731015][ T8765] ? move_addr_to_kernel+0x80/0x80 [ 1325.731031][ T8765] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1325.731049][ T8765] ? do_syscall_64+0x26/0x760 [ 1325.737527][T21638] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 1325.740720][ T8765] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1325.740734][ T8765] ? do_syscall_64+0x26/0x760 [ 1325.740757][ T8765] __x64_sys_socket+0x73/0xb0 [ 1325.755963][ T8765] do_syscall_64+0xfa/0x760 [ 1325.755986][ T8765] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1325.755997][ T8765] RIP: 0033:0x45c5a7 [ 1325.756017][ T8765] Code: 00 00 00 49 89 ca b8 36 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:23:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1325.779434][ T8765] RSP: 002b:00007ffdb7713288 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 1325.779448][ T8765] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045c5a7 [ 1325.779456][ T8765] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 1325.779465][ T8765] RBP: 0000000000001917 R08: 00007ffdb771330c R09: 000000000000000a [ 1325.779473][ T8765] R10: 00007ffdb7713310 R11: 0000000000000246 R12: 0000000000000000 [ 1325.779482][ T8765] R13: 00007ffdb7713a10 R14: 0000000000143166 R15: 00007ffdb7713a20 15:23:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x70, 0x8, 0x2, 0xfc, 0x9, 0x0, 0xfff, 0x202c2, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4a8, 0x2, @perf_config_ext={0x100, 0x5}, 0x10000, 0x8e17, 0x10001, 0x1, 0xc86, 0x5, 0x77}, 0x0, 0xb, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r2, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) openat$cgroup_ro(r2, &(0x7f0000000140)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)={[{0x2d, 'io'}, {0x2b, 'rdma'}]}, 0xa) gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)=ANY=[@ANYBLOB="0800000000000000000000000000000000000000000059b15f9c6cbe1e2700"/40]) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000004c0)='md5sum\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x7, 0x8, 0x3f, 0x96, 0x0, 0x3, 0x4000, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xe8a, 0x100}, 0x802, 0x2b546ecd, 0x1, 0x3, 0xea4a, 0x974d, 0x95}, 0xffffffffffffffff, 0xf, r4, 0x4) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r6, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r6, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) recvmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)=""/129, 0x81}], 0x1}, 0x40) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1325.946991][T21620] device 2244 entered promiscuous mode 15:23:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x0, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) [ 1325.993599][T21643] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1326.014708][T21628] device 2668 entered promiscuous mode [ 1326.026996][ T8765] memory: usage 7956kB, limit 0kB, failcnt 73 [ 1326.061924][ T8765] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1326.068864][ T8765] Memory cgroup stats for /syz5: [ 1326.069039][ T8765] anon 16384 [ 1326.069039][ T8765] file 102400 [ 1326.069039][ T8765] kernel_stack 0 [ 1326.069039][ T8765] slab 7757824 [ 1326.069039][ T8765] sock 0 [ 1326.069039][ T8765] shmem 0 [ 1326.069039][ T8765] file_mapped 0 [ 1326.069039][ T8765] file_dirty 0 [ 1326.069039][ T8765] file_writeback 0 [ 1326.069039][ T8765] anon_thp 0 [ 1326.069039][ T8765] inactive_anon 0 [ 1326.069039][ T8765] active_anon 98304 [ 1326.069039][ T8765] inactive_file 65536 [ 1326.069039][ T8765] active_file 135168 [ 1326.069039][ T8765] unevictable 0 [ 1326.069039][ T8765] slab_reclaimable 3649536 [ 1326.069039][ T8765] slab_unreclaimable 4108288 [ 1326.069039][ T8765] pgfault 170544 [ 1326.069039][ T8765] pgmajfault 0 [ 1326.069039][ T8765] workingset_refault 0 [ 1326.069039][ T8765] workingset_activate 0 [ 1326.069039][ T8765] workingset_nodereclaim 0 [ 1326.069039][ T8765] pgrefill 66 [ 1326.069039][ T8765] pgscan 3363 [ 1326.069039][ T8765] pgsteal 3275 [ 1326.069039][ T8765] pgactivate 33 [ 1326.219724][ T8765] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=8765,uid=0 [ 1326.238327][ T8765] Memory cgroup out of memory: Killed process 8765 (syz-executor.5) total-vm:72440kB, anon-rss:104kB, file-rss:35776kB, shmem-rss:0kB, UID:0 pgtables:122880kB oom_score_adj:0 [ 1326.257963][ T1065] oom_reaper: reaped process 8765 (syz-executor.5), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 1326.310174][T21625] device 2669 entered promiscuous mode [ 1326.348878][T21638] device 1790 entered promiscuous mode 15:23:57 executing program 2: perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) 15:23:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x6, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200)}, 0x244, 0x530, 0x8, 0x0, 0x6, 0x0, 0x400}, 0x0, 0xf, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:23:58 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r3 = gettid() r4 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r1, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000240)=ANY=[@ANYBLOB="080000000000000000000000000000000000000000000000790400"/40]) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0xd3d) r6 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x41, 0x40, 0x5, 0x1f, 0x0, 0x4, 0x12a10, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x1, 0xffffffffffff0001}, 0xe, 0x94da, 0x6, 0x9, 0x100, 0x0, 0xfff5}, r3, 0x8, r0, 0x1) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:23:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000280)=0x100) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1326.767376][T21631] device 2670 entered promiscuous mode [ 1326.789430][T21643] device 1533 entered promiscuous mode 15:23:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) 15:23:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1326.992916][T21653] device 2245 entered promiscuous mode 15:23:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = getpid() r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x10000000000, 0xfffffffffffffffd, 0x0, 0x3, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x8, 0x2}, 0x0, 0x0, &(0x7f0000000340)={0x3, 0xd, 0x0, 0x1}, &(0x7f0000000380)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0xc49}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, r4, 0x0, 0x14, &(0x7f0000000140)='eth\x02\xbbm\x06\x00\x00\x00\x00\x00\x00\x00-user\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r2, r3, 0x0, 0x2a, &(0x7f0000000280)='wlan1trustedppp1.!$)++posix_acl_access\x98[:\x00', r5}, 0x30) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r6 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r7 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r8, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r8, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000540)={'vxcan1\x00', 0x1}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1327.103212][T21655] device 2246 entered promiscuous mode 15:23:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x5, 0x2, 0x8, 0x0, 0x0, 0x8001, 0xa0006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x20, 0x2, 0x5a3f0ca4a8c6b914, 0xffffffff, 0x9, 0x3}, r1, 0x1, 0xffffffffffffffff, 0x4) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1327.172634][T21685] device 2671 entered promiscuous mode [ 1327.244059][T21657] device 2247 entered promiscuous mode 15:23:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x0, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) [ 1327.346259][T21662] device 1791 entered promiscuous mode [ 1327.452792][T21663] device 1792 entered promiscuous mode [ 1327.488147][ T7] device 0 left promiscuous mode 15:23:59 executing program 2: perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) 15:23:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r2, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r3 = openat$cgroup_subtree(r1, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r6, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r6, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r7}, 0x10) write$cgroup_subtree(r3, &(0x7f0000000380)=ANY=[@ANYRES32=r4, @ANYRES64, @ANYRES64, @ANYRESHEX, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRESHEX], @ANYRESHEX=r0, @ANYRES64=r5, @ANYRESHEX=r6, @ANYRES16=r7, @ANYBLOB="86dcab47bc05edb9b915f3c507c3151d8790034683902af3ebe58017476ab027a8decc7be8f057e6c7f2118b3028f3dc09b2ccf29e41b1eb80b618dd33ce62493176947984758151e8f8ad120502c94469c8e4723b7f2c786d636644"], 0xb8) r8 = openat$cgroup_ro(r1, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) openat$cgroup(r8, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r9 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r10 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1327.592221][ T7] device 1 left promiscuous mode [ 1327.683197][ T7] device 2 left promiscuous mode [ 1327.737733][ T7] device 3 left promiscuous mode 15:23:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r3, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1327.792230][ T7] device 4 left promiscuous mode [ 1327.852245][ T7] device 5 left promiscuous mode [ 1327.912338][ T7] device 6 left promiscuous mode [ 1327.973196][ T7] device 7 left promiscuous mode 15:23:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() write$cgroup_pid(r1, &(0x7f00000005c0)=r2, 0x12) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f00000005c0)=r4, 0x12) r5 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x0) r6 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x7, 0x6, 0x5, 0xc1, 0x0, 0x3cda, 0x480, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfff, 0x4, @perf_config_ext={0x6, 0xf6}, 0x2, 0x4798000000, 0x5, 0x5, 0x7, 0x35, 0x3}, r4, 0x3, r5, 0x8) r7 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, r2, 0x0, r6, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r8 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1328.032557][ T7] device 8 left promiscuous mode [ 1328.092314][ T7] device 9 left promiscuous mode 15:23:59 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x7, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup(r4, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f00000003c0)='cpuacct.usage_all\x00', 0x0, 0x0) sendmsg$kcm(r6, &(0x7f0000000340)={&(0x7f0000000440)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x10000}, 0x80, 0x0}, 0x5000040) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r7, &(0x7f0000000040)='threaded\x00', 0xfffffd55) recvmsg$kcm(r7, &(0x7f0000004040)={&(0x7f0000003c00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003fc0)=[{&(0x7f0000003c80)=""/65, 0x41}, {0x0}, {&(0x7f0000003d00)=""/250, 0xfa}, {&(0x7f0000003e00)=""/63, 0x3f}, {&(0x7f0000003e40)=""/84, 0x54}, {&(0x7f0000003ec0)=""/228, 0x1ac}, {&(0x7f0000006440)=""/4096, 0x1000}], 0x100001aa, 0x0, 0x1f2}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000004100)={0x1f, 0x7, &(0x7f0000000780)=ANY=[@ANYBLOB="045874673cef51df93000000cbf9ffffff000000810000d83a69b5f7b19a8b6294070000003715ed5ce62f7b119f3bf609f8000000000001000000210a0000000000001ff0fcdf07000000"], &(0x7f0000000300)='GPL\x00', 0x8, 0x0, &(0x7f0000000480), 0x41f00, 0x4, [], r8, 0xf, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f00000040c0)={0x1, 0xf, 0x8, 0x10001}, 0x10}, 0x70) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x4, [@int={0xc, 0x0, 0x0, 0x1, 0x0, 0x4e, 0x0, 0x31, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4}}, @fwd={0xe}, @union={0xb, 0x4, 0x0, 0x5, 0x1, 0xfffffffe, [{0x6, 0x0, 0x7}, {0xd, 0x5, 0x7}, {0x4, 0x4, 0x101}, {0xd, 0x2, 0x216b7c5b}]}]}, {0x0, [0x1322c0f638942172, 0x366f16ba2f061ae6]}}, &(0x7f0000000280)=""/65, 0x8c, 0x41, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x12, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x1ff}, [@map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f0000000080)='syzkaller\x00', 0x2, 0x1, &(0x7f0000000100)=""/1, 0x40f00, 0x4, [], r8, 0x4, r9, 0x8, &(0x7f00000004c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x8, 0x6, 0x10001}, 0x10}, 0x70) [ 1328.153840][ T7] device 10 left promiscuous mode [ 1328.213043][ T7] device 11 left promiscuous mode [ 1328.283262][ T7] device 12 left promiscuous mode [ 1328.402341][ T7] device 13 left promiscuous mode [ 1328.512287][ T7] device 14 left promiscuous mode [ 1328.583907][ T7] device 15 left promiscuous mode [ 1328.642333][ T7] device 16 left promiscuous mode [ 1328.718843][ T7] device 17 left promiscuous mode [ 1328.788300][ T7] device 18 left promiscuous mode [ 1328.849158][ T7] device 19 left promiscuous mode [ 1328.862267][T21727] IPVS: ftp: loaded support on port[0] = 21 [ 1328.907413][ T7] device 20 left promiscuous mode [ 1328.971576][ T7] device 21 left promiscuous mode [ 1329.046410][ T7] device 22 left promiscuous mode [ 1329.111022][ T7] device 23 left promiscuous mode 15:24:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)=ANY=[@ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00f\x00'/40]) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r4, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r5 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r6 = gettid() write$cgroup_pid(r5, &(0x7f00000005c0)=r6, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r6, 0x12) close(r3) r7 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r8 = gettid() write$cgroup_pid(r7, &(0x7f00000005c0)=r8, 0x12) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x10000000000, 0xfffffffffffffffd, 0x0, 0x3, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x8, 0x2}, 0x0, 0x0, &(0x7f0000000340)={0x3, 0xd, 0x0, 0x1}, &(0x7f0000000380)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0xc49}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, r9, 0x0, 0x14, &(0x7f0000000140)='eth\x02\xbbm\x06\x00\x00\x00\x00\x00\x00\x00-user\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)='security)md5sum\x00', r10}, 0x30) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x7, 0xfc, 0x4, 0x0, 0x8, 0x4, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp, 0x21008, 0x100000001, 0x7, 0x2, 0x3, 0x0, 0x1ff}, r8, 0xa, r11, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r12 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1329.234636][ T7] device 24 left promiscuous mode [ 1329.281309][T21727] chnl_net:caif_netlink_parms(): no params data found [ 1329.325220][ T7] device 25 left promiscuous mode [ 1329.367570][T21727] bridge0: port 1(bridge_slave_0) entered blocking state [ 1329.375949][T21727] bridge0: port 1(bridge_slave_0) entered disabled state [ 1329.390166][T21727] device bridge_slave_0 entered promiscuous mode [ 1329.404651][ T7] device 26 left promiscuous mode 15:24:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r3, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0x9, &(0x7f0000000100)='vboxnet1\x00', 0xffffffffffffffff}, 0x30) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x1f, 0xb3, 0xff, 0x3, 0x0, 0x8000, 0x80, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000001, 0x3, @perf_bp, 0x0, 0x3, 0x7, 0x5, 0x200, 0xad41, 0x2}, r3, 0x6, r4, 0x8) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 1329.417873][T21727] bridge0: port 2(bridge_slave_1) entered blocking state [ 1329.426518][T21727] bridge0: port 2(bridge_slave_1) entered disabled state [ 1329.460998][T21727] device bridge_slave_1 entered promiscuous mode [ 1329.514402][ T7] device 27 left promiscuous mode [ 1329.573244][T21727] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1329.583155][ T7] device 28 left promiscuous mode [ 1329.605631][T21727] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1329.634377][ T7] device 29 left promiscuous mode [ 1329.671227][T21727] team0: Port device team_slave_0 added [ 1329.686850][T21727] team0: Port device team_slave_1 added [ 1329.695700][ T7] device 30 left promiscuous mode [ 1329.773208][ T7] device 31 left promiscuous mode [ 1329.831407][T21727] device hsr_slave_0 entered promiscuous mode [ 1329.875285][T21727] device hsr_slave_1 entered promiscuous mode [ 1329.911895][T21727] debugfs: Directory 'hsr0' with parent '/' already present! [ 1329.919709][ T7] device 32 left promiscuous mode [ 1329.957129][T21727] bridge0: port 2(bridge_slave_1) entered blocking state [ 1329.964492][T21727] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1329.971996][T21727] bridge0: port 1(bridge_slave_0) entered blocking state [ 1329.979066][T21727] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1329.995610][ T7] device 33 left promiscuous mode [ 1330.042900][ T7] device 34 left promiscuous mode [ 1330.075219][T21727] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1330.096175][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1330.117329][ T8767] bridge0: port 1(bridge_slave_0) entered disabled state [ 1330.138055][ T8767] bridge0: port 2(bridge_slave_1) entered disabled state [ 1330.151289][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1330.168571][ T7] device 35 left promiscuous mode [ 1330.187005][T21727] 8021q: adding VLAN 0 to HW filter on device team0 [ 1330.202788][T21671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1330.211238][T21671] bridge0: port 1(bridge_slave_0) entered blocking state [ 1330.218355][T21671] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1330.228178][ T7] device 36 left promiscuous mode [ 1330.248221][T21745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1330.257345][T21745] bridge0: port 2(bridge_slave_1) entered blocking state [ 1330.264475][T21745] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1330.283503][ T7] device 37 left promiscuous mode [ 1330.296960][T21745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1330.314945][T21671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1330.333926][T21745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1330.346234][T21745] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1330.357024][T21745] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1330.367566][ T7] device 38 left promiscuous mode [ 1330.386543][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1330.398802][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1330.417662][T21745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1330.427558][T21745] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1330.438573][ T7] device 39 left promiscuous mode [ 1330.456406][T21671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1330.466208][T21671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1330.480904][T21727] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1330.492056][ T7] device 40 left promiscuous mode [ 1330.521473][T21727] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1330.548232][ T7] device 41 left promiscuous mode [ 1330.592156][ T7] device 42 left promiscuous mode [ 1330.633205][ T7] device 43 left promiscuous mode [ 1330.693376][ T7] device 44 left promiscuous mode [ 1330.742498][ T7] device 45 left promiscuous mode [ 1330.782744][ T7] device 46 left promiscuous mode [ 1330.843451][ T7] device 47 left promiscuous mode [ 1330.903145][ T7] device 48 left promiscuous mode [ 1330.952728][ T7] device 49 left promiscuous mode [ 1331.022386][ T7] device 50 left promiscuous mode [ 1331.102508][ T7] device 51 left promiscuous mode [ 1331.152925][ T7] device 52 left promiscuous mode [ 1331.212290][ T7] device 53 left promiscuous mode [ 1331.262470][ T7] device 54 left promiscuous mode [ 1331.322481][ T7] device 55 left promiscuous mode [ 1331.382719][ T7] device 56 left promiscuous mode [ 1331.452405][ T7] device 57 left promiscuous mode [ 1331.492462][ T7] device 58 left promiscuous mode [ 1331.562300][ T7] device 59 left promiscuous mode [ 1331.633430][ T7] device 60 left promiscuous mode [ 1331.704212][ T7] device 61 left promiscuous mode [ 1331.742389][ T7] device 62 left promiscuous mode [ 1331.792501][ T7] device 63 left promiscuous mode [ 1331.832979][ T7] device 64 left promiscuous mode [ 1331.902187][ T7] device 65 left promiscuous mode [ 1331.962363][ T7] device 66 left promiscuous mode [ 1332.012296][ T7] device 67 left promiscuous mode [ 1332.062477][ T7] device 68 left promiscuous mode [ 1332.122214][ T7] device 69 left promiscuous mode [ 1332.162343][ T7] device 70 left promiscuous mode [ 1332.202466][ T7] device 71 left promiscuous mode [ 1332.242392][ T7] device 72 left promiscuous mode [ 1332.292244][ T7] device 73 left promiscuous mode [ 1332.342647][ T7] device 74 left promiscuous mode [ 1332.412275][ T7] device 75 left promiscuous mode [ 1332.462475][ T7] device 76 left promiscuous mode [ 1332.509902][ T7] device 77 left promiscuous mode [ 1332.572835][ T7] device 78 left promiscuous mode [ 1332.652168][ T7] device 79 left promiscuous mode [ 1332.712249][ T7] device 80 left promiscuous mode [ 1332.772251][ T7] device 81 left promiscuous mode [ 1332.862421][ T7] device 82 left promiscuous mode [ 1332.902529][ T7] device 83 left promiscuous mode [ 1332.942621][ T7] device 84 left promiscuous mode [ 1332.983370][ T7] device 85 left promiscuous mode [ 1333.062356][ T7] device 86 left promiscuous mode [ 1333.122398][ T7] device 87 left promiscuous mode [ 1333.202432][ T7] device 88 left promiscuous mode [ 1333.272235][ T7] device 89 left promiscuous mode [ 1333.352353][ T7] device 90 left promiscuous mode [ 1333.442445][ T7] device 91 left promiscuous mode [ 1333.482523][ T7] device 92 left promiscuous mode [ 1333.552309][ T7] device 93 left promiscuous mode [ 1333.612290][ T7] device 94 left promiscuous mode [ 1333.662557][ T7] device 95 left promiscuous mode [ 1333.712426][ T7] device 96 left promiscuous mode [ 1333.752444][ T7] device 97 left promiscuous mode [ 1333.792492][ T7] device 98 left promiscuous mode [ 1333.862250][ T7] device 99 left promiscuous mode [ 1333.912565][ T7] device 100 left promiscuous mode [ 1333.981984][ T7] device 101 left promiscuous mode [ 1334.042472][ T7] device 102 left promiscuous mode [ 1334.112372][ T7] device 103 left promiscuous mode [ 1334.152375][ T7] device 104 left promiscuous mode [ 1334.212411][ T7] device 105 left promiscuous mode [ 1334.262393][ T7] device 106 left promiscuous mode [ 1334.302396][ T7] device 107 left promiscuous mode [ 1334.372267][ T7] device 108 left promiscuous mode [ 1334.432297][ T7] device 109 left promiscuous mode [ 1334.492305][ T7] device 110 left promiscuous mode [ 1334.562136][ T7] device 111 left promiscuous mode [ 1334.622558][ T7] device 112 left promiscuous mode [ 1334.692477][ T7] device 113 left promiscuous mode [ 1334.753458][ T7] device 114 left promiscuous mode [ 1334.822308][ T7] device 115 left promiscuous mode [ 1334.883057][ T7] device 116 left promiscuous mode [ 1334.972223][ T7] device 117 left promiscuous mode [ 1335.032523][ T7] device 118 left promiscuous mode [ 1335.082564][ T7] device 119 left promiscuous mode [ 1335.152329][ T7] device 120 left promiscuous mode [ 1335.202404][ T7] device 121 left promiscuous mode [ 1335.242493][ T7] device 122 left promiscuous mode [ 1335.282375][ T7] device 123 left promiscuous mode [ 1335.352717][ T7] device 124 left promiscuous mode [ 1335.412260][ T7] device 125 left promiscuous mode [ 1335.502455][ T7] device 126 left promiscuous mode [ 1335.542827][ T7] device 127 left promiscuous mode [ 1335.622279][ T7] device 128 left promiscuous mode [ 1335.672503][ T7] device 129 left promiscuous mode [ 1335.722568][ T7] device 130 left promiscuous mode [ 1335.782650][ T7] device 131 left promiscuous mode [ 1335.842495][ T7] device 132 left promiscuous mode [ 1335.902474][ T7] device 133 left promiscuous mode [ 1335.942642][ T7] device 134 left promiscuous mode [ 1335.982420][ T7] device 135 left promiscuous mode [ 1336.052386][ T7] device 136 left promiscuous mode [ 1336.112286][ T7] device 137 left promiscuous mode [ 1336.192213][ T7] device 138 left promiscuous mode [ 1336.232413][ T7] device 139 left promiscuous mode [ 1336.272536][ T7] device 140 left promiscuous mode [ 1336.342264][ T7] device 141 left promiscuous mode [ 1336.412429][ T7] device 142 left promiscuous mode [ 1336.452565][ T7] device 143 left promiscuous mode [ 1336.512500][ T7] device 144 left promiscuous mode [ 1336.552512][ T7] device 145 left promiscuous mode [ 1336.612405][ T7] device 146 left promiscuous mode [ 1336.652503][ T7] device 147 left promiscuous mode [ 1336.692489][ T7] device 148 left promiscuous mode [ 1336.732466][ T7] device 149 left promiscuous mode [ 1336.782324][ T7] device 150 left promiscuous mode [ 1336.832469][ T7] device 151 left promiscuous mode [ 1336.892417][ T7] device 152 left promiscuous mode [ 1336.952221][ T7] device 153 left promiscuous mode [ 1337.032279][ T7] device 154 left promiscuous mode [ 1337.112437][ T7] device 155 left promiscuous mode [ 1337.192221][ T7] device 156 left promiscuous mode [ 1337.252210][ T7] device 157 left promiscuous mode [ 1337.312321][ T7] device 158 left promiscuous mode [ 1337.372230][ T7] device 159 left promiscuous mode [ 1337.432228][ T7] device 160 left promiscuous mode [ 1337.482387][ T7] device 161 left promiscuous mode [ 1337.552273][ T7] device 162 left promiscuous mode [ 1337.622758][ T7] device 163 left promiscuous mode [ 1337.682067][ T7] device 164 left promiscuous mode [ 1337.762058][ T7] device 165 left promiscuous mode [ 1337.822295][ T7] device 166 left promiscuous mode [ 1337.882328][ T7] device 167 left promiscuous mode [ 1337.932569][ T7] device 168 left promiscuous mode [ 1337.992164][ T7] device 169 left promiscuous mode [ 1338.062367][ T7] device 170 left promiscuous mode [ 1338.122332][ T7] device 171 left promiscuous mode [ 1338.182320][ T7] device 172 left promiscuous mode [ 1338.242291][ T7] device 173 left promiscuous mode [ 1338.292456][ T7] device 174 left promiscuous mode [ 1338.332553][ T7] device 175 left promiscuous mode [ 1338.392091][ T7] device 176 left promiscuous mode [ 1338.462342][ T7] device 177 left promiscuous mode [ 1338.512498][ T7] device 178 left promiscuous mode [ 1338.562536][ T7] device 179 left promiscuous mode [ 1338.632341][ T7] device 180 left promiscuous mode [ 1338.682430][ T7] device 181 left promiscuous mode [ 1338.722366][ T7] device 182 left promiscuous mode [ 1338.792250][ T7] device 183 left promiscuous mode [ 1338.852291][ T7] device 184 left promiscuous mode [ 1338.912290][ T7] device 185 left promiscuous mode [ 1338.972236][ T7] device 186 left promiscuous mode [ 1339.032284][ T7] device 187 left promiscuous mode [ 1339.102251][ T7] device 188 left promiscuous mode [ 1339.152503][ T7] device 189 left promiscuous mode [ 1339.212271][ T7] device 190 left promiscuous mode [ 1339.272229][ T7] device 191 left promiscuous mode [ 1339.332236][ T7] device 192 left promiscuous mode [ 1339.392330][ T7] device 193 left promiscuous mode [ 1339.442405][ T7] device 194 left promiscuous mode [ 1339.512272][ T7] device 195 left promiscuous mode [ 1339.562440][ T7] device 196 left promiscuous mode [ 1339.602562][ T7] device 197 left promiscuous mode [ 1339.672175][ T7] device 198 left promiscuous mode [ 1339.722322][ T7] device 199 left promiscuous mode [ 1339.802373][ T7] device 200 left promiscuous mode [ 1339.852328][ T7] device 201 left promiscuous mode [ 1339.892353][ T7] device 202 left promiscuous mode [ 1339.952369][ T7] device 203 left promiscuous mode [ 1340.022468][ T7] device 204 left promiscuous mode [ 1340.062550][ T7] device 205 left promiscuous mode [ 1340.132450][ T7] device 206 left promiscuous mode [ 1340.192267][ T7] device 207 left promiscuous mode [ 1340.252228][ T7] device 208 left promiscuous mode [ 1340.312255][ T7] device 209 left promiscuous mode [ 1340.392256][ T7] device 210 left promiscuous mode [ 1340.452294][ T7] device 211 left promiscuous mode [ 1340.532378][ T7] device 212 left promiscuous mode [ 1340.583361][ T7] device 213 left promiscuous mode [ 1340.642320][ T7] device 214 left promiscuous mode [ 1340.682456][ T7] device 215 left promiscuous mode [ 1340.722548][ T7] device 216 left promiscuous mode [ 1340.792294][ T7] device 217 left promiscuous mode [ 1340.852310][ T7] device 218 left promiscuous mode [ 1340.912290][ T7] device 219 left promiscuous mode [ 1340.952540][ T7] device 220 left promiscuous mode [ 1341.012301][ T7] device 221 left promiscuous mode [ 1341.072297][ T7] device 222 left promiscuous mode [ 1341.122443][ T7] device 223 left promiscuous mode [ 1341.162408][ T7] device 224 left promiscuous mode [ 1341.222323][ T7] device 225 left promiscuous mode [ 1341.282496][ T7] device 226 left promiscuous mode [ 1341.342180][ T7] device 227 left promiscuous mode [ 1341.382408][ T7] device 228 left promiscuous mode [ 1341.422451][ T7] device 229 left promiscuous mode [ 1341.462596][ T7] device 230 left promiscuous mode [ 1341.532176][ T7] device 231 left promiscuous mode [ 1341.592502][ T7] device 232 left promiscuous mode [ 1341.672158][ T7] device 233 left promiscuous mode [ 1341.742430][ T7] device 234 left promiscuous mode [ 1341.782672][ T7] device 235 left promiscuous mode [ 1341.852379][ T7] device 236 left promiscuous mode [ 1341.902331][ T7] device 237 left promiscuous mode [ 1341.972343][ T7] device 238 left promiscuous mode [ 1342.032313][ T7] device 239 left promiscuous mode [ 1342.112353][ T7] device 240 left promiscuous mode [ 1342.192288][ T7] device 241 left promiscuous mode [ 1342.252422][ T7] device 242 left promiscuous mode [ 1342.302475][ T7] device 243 left promiscuous mode [ 1342.342432][ T7] device 244 left promiscuous mode [ 1342.383435][ T7] device 245 left promiscuous mode [ 1342.442212][ T7] device 246 left promiscuous mode [ 1342.503895][ T7] device 247 left promiscuous mode [ 1342.552611][ T7] device 248 left promiscuous mode [ 1342.612408][ T7] device 249 left promiscuous mode [ 1342.652363][ T7] device 250 left promiscuous mode [ 1342.692450][ T7] device 251 left promiscuous mode [ 1342.752472][ T7] device 252 left promiscuous mode [ 1342.792510][ T7] device 253 left promiscuous mode [ 1342.872182][ T7] device 254 left promiscuous mode [ 1342.932430][ T7] device 255 left promiscuous mode [ 1342.992566][ T7] device 256 left promiscuous mode [ 1343.052995][ T7] device 257 left promiscuous mode [ 1343.112088][ T7] device 258 left promiscuous mode [ 1343.152498][ T7] device 259 left promiscuous mode [ 1343.193445][ T7] device 260 left promiscuous mode [ 1343.262096][ T7] device 261 left promiscuous mode [ 1343.312265][ T7] device 262 left promiscuous mode [ 1343.382895][ T7] device 263 left promiscuous mode [ 1343.462322][ T7] device 264 left promiscuous mode [ 1343.502203][ T7] device 265 left promiscuous mode [ 1343.562331][ T7] device 266 left promiscuous mode [ 1343.622399][ T7] device 267 left promiscuous mode [ 1343.662455][ T7] device 268 left promiscuous mode [ 1343.742107][ T7] device 269 left promiscuous mode [ 1343.792448][ T7] device 270 left promiscuous mode [ 1343.852241][ T7] device 271 left promiscuous mode [ 1343.902427][ T7] device 272 left promiscuous mode [ 1343.942420][ T7] device 273 left promiscuous mode [ 1343.982385][ T7] device 274 left promiscuous mode [ 1344.024134][ T7] device 275 left promiscuous mode [ 1344.072061][ T7] device 276 left promiscuous mode [ 1344.152163][ T7] device 277 left promiscuous mode [ 1344.232215][ T7] device 278 left promiscuous mode [ 1344.312216][ T7] device 279 left promiscuous mode [ 1344.372263][ T7] device 280 left promiscuous mode [ 1344.432291][ T7] device 281 left promiscuous mode [ 1344.512100][ T7] device 282 left promiscuous mode [ 1344.572267][ T7] device 283 left promiscuous mode [ 1344.622402][ T7] device 284 left promiscuous mode [ 1344.662957][ T7] device 285 left promiscuous mode [ 1344.742154][ T7] device 286 left promiscuous mode [ 1344.802276][ T7] device 287 left promiscuous mode [ 1344.862329][ T7] device 288 left promiscuous mode [ 1344.912518][ T7] device 289 left promiscuous mode [ 1344.992016][ T7] device 290 left promiscuous mode [ 1345.062867][ T7] device 291 left promiscuous mode [ 1345.142201][ T7] device 292 left promiscuous mode [ 1345.212340][ T7] device 293 left promiscuous mode [ 1345.262494][ T7] device 294 left promiscuous mode [ 1345.332298][ T7] device 295 left promiscuous mode [ 1345.392305][ T7] device 296 left promiscuous mode [ 1345.452341][ T7] device 297 left promiscuous mode [ 1345.502497][ T7] device 298 left promiscuous mode [ 1345.542684][ T7] device 299 left promiscuous mode [ 1345.612375][ T7] device 300 left promiscuous mode [ 1345.672251][ T7] device 301 left promiscuous mode [ 1345.752250][ T7] device 302 left promiscuous mode [ 1345.832225][ T7] device 303 left promiscuous mode [ 1345.912301][ T7] device 304 left promiscuous mode [ 1345.962497][ T7] device 305 left promiscuous mode [ 1346.002512][ T7] device 306 left promiscuous mode [ 1346.072339][ T7] device 307 left promiscuous mode [ 1346.122516][ T7] device 308 left promiscuous mode [ 1346.182208][ T7] device 309 left promiscuous mode [ 1346.252366][ T7] device 310 left promiscuous mode [ 1346.292325][ T7] device 311 left promiscuous mode [ 1346.372152][ T7] device 312 left promiscuous mode [ 1346.432325][ T7] device 313 left promiscuous mode [ 1346.512388][ T7] device 314 left promiscuous mode [ 1346.583473][ T7] device 315 left promiscuous mode [ 1346.663255][ T7] device 316 left promiscuous mode [ 1346.742115][ T7] device 317 left promiscuous mode [ 1346.842193][ T7] device 318 left promiscuous mode [ 1346.882455][ T7] device 319 left promiscuous mode [ 1346.922438][ T7] device 320 left promiscuous mode [ 1346.962546][ T7] device 321 left promiscuous mode [ 1347.002558][ T7] device 322 left promiscuous mode [ 1347.072484][ T7] device 323 left promiscuous mode [ 1347.132340][ T7] device 324 left promiscuous mode [ 1347.192551][ T7] device 325 left promiscuous mode [ 1347.252114][ T7] device 326 left promiscuous mode [ 1347.292458][ T7] device 327 left promiscuous mode [ 1347.352231][ T7] device 328 left promiscuous mode [ 1347.412527][ T7] device 329 left promiscuous mode [ 1347.462644][ T7] device 330 left promiscuous mode [ 1347.532166][ T7] device 331 left promiscuous mode [ 1347.592426][ T7] device 332 left promiscuous mode [ 1347.632436][ T7] device 333 left promiscuous mode [ 1347.672460][ T7] device 334 left promiscuous mode [ 1347.712323][ T7] device 335 left promiscuous mode [ 1347.772289][ T7] device 336 left promiscuous mode [ 1347.852061][ T7] device 337 left promiscuous mode [ 1347.902467][ T7] device 338 left promiscuous mode [ 1347.942442][ T7] device 339 left promiscuous mode [ 1348.012260][ T7] device 340 left promiscuous mode [ 1348.062471][ T7] device 341 left promiscuous mode [ 1348.102589][ T7] device 342 left promiscuous mode [ 1348.152332][ T7] device 343 left promiscuous mode [ 1348.202547][ T7] device 344 left promiscuous mode [ 1348.242507][ T7] device 345 left promiscuous mode [ 1348.302286][ T7] device 346 left promiscuous mode [ 1348.352602][ T7] device 347 left promiscuous mode [ 1348.432109][ T7] device 348 left promiscuous mode [ 1348.492379][ T7] device 349 left promiscuous mode [ 1348.522591][ T7] device 350 left promiscuous mode [ 1348.562521][ T7] device 351 left promiscuous mode [ 1348.612505][ T7] device 352 left promiscuous mode [ 1348.652636][ T7] device 353 left promiscuous mode [ 1348.702524][ T7] device 354 left promiscuous mode [ 1348.782265][ T7] device 355 left promiscuous mode [ 1348.852524][ T7] device 356 left promiscuous mode [ 1348.912296][ T7] device 357 left promiscuous mode [ 1348.952332][ T7] device 358 left promiscuous mode [ 1349.012306][ T7] device 359 left promiscuous mode [ 1349.092115][ T7] device 360 left promiscuous mode [ 1349.152338][ T7] device 361 left promiscuous mode [ 1349.212295][ T7] device 362 left promiscuous mode [ 1349.272306][ T7] device 363 left promiscuous mode [ 1349.332323][ T7] device 364 left promiscuous mode [ 1349.382704][ T7] device 365 left promiscuous mode [ 1349.452436][ T7] device 366 left promiscuous mode [ 1349.532314][ T7] device 367 left promiscuous mode [ 1349.582506][ T7] device 368 left promiscuous mode [ 1349.652342][ T7] device 369 left promiscuous mode [ 1349.702529][ T7] device 370 left promiscuous mode [ 1349.762379][ T7] device 371 left promiscuous mode [ 1349.802568][ T7] device 372 left promiscuous mode [ 1349.842573][ T7] device 373 left promiscuous mode [ 1349.912291][ T7] device 374 left promiscuous mode [ 1349.972318][ T7] device 375 left promiscuous mode [ 1350.032328][ T7] device 376 left promiscuous mode [ 1350.092358][ T7] device 377 left promiscuous mode [ 1350.162218][ T7] device 378 left promiscuous mode [ 1350.252580][ T7] device 379 left promiscuous mode [ 1350.312543][ T7] device 380 left promiscuous mode [ 1350.372127][ T7] device 381 left promiscuous mode [ 1350.442364][ T7] device 382 left promiscuous mode [ 1350.492487][ T7] device 383 left promiscuous mode [ 1350.542373][ T7] device 384 left promiscuous mode [ 1350.592480][ T7] device 385 left promiscuous mode [ 1350.632536][ T7] device 386 left promiscuous mode [ 1350.672831][ T7] device 387 left promiscuous mode [ 1350.732281][ T7] device 388 left promiscuous mode [ 1350.793013][ T7] device 389 left promiscuous mode [ 1350.872256][ T7] device 390 left promiscuous mode [ 1350.912479][ T7] device 391 left promiscuous mode [ 1350.972318][ T7] device 392 left promiscuous mode [ 1351.002306][ T7] device 393 left promiscuous mode [ 1351.052501][ T7] device 394 left promiscuous mode [ 1351.092464][ T7] device 395 left promiscuous mode [ 1351.162470][ T7] device 396 left promiscuous mode [ 1351.202522][ T7] device 397 left promiscuous mode [ 1351.252263][ T7] device 398 left promiscuous mode [ 1351.302567][ T7] device 399 left promiscuous mode [ 1351.362374][ T7] device 400 left promiscuous mode [ 1351.412520][ T7] device 401 left promiscuous mode [ 1351.482426][ T7] device 402 left promiscuous mode [ 1351.532468][ T7] device 403 left promiscuous mode [ 1351.602387][ T7] device 404 left promiscuous mode [ 1351.642355][ T7] device 405 left promiscuous mode [ 1351.712321][ T7] device 406 left promiscuous mode [ 1351.762527][ T7] device 407 left promiscuous mode [ 1351.802510][ T7] device 408 left promiscuous mode [ 1351.842429][ T7] device 409 left promiscuous mode [ 1351.882581][ T7] device 410 left promiscuous mode [ 1351.922506][ T7] device 411 left promiscuous mode [ 1351.962506][ T7] device 412 left promiscuous mode [ 1352.022467][ T7] device 413 left promiscuous mode [ 1352.082097][ T7] device 414 left promiscuous mode [ 1352.122377][ T7] device 415 left promiscuous mode [ 1352.182278][ T7] device 416 left promiscuous mode [ 1352.222273][ T7] device 417 left promiscuous mode [ 1352.272542][ T7] device 418 left promiscuous mode [ 1352.322470][ T7] device 419 left promiscuous mode [ 1352.392614][ T7] device 420 left promiscuous mode [ 1352.462529][ T7] device 421 left promiscuous mode [ 1352.532221][ T7] device 422 left promiscuous mode [ 1352.622461][ T7] device 423 left promiscuous mode [ 1352.662497][ T7] device 424 left promiscuous mode [ 1352.732289][ T7] device 425 left promiscuous mode [ 1352.792285][ T7] device 426 left promiscuous mode [ 1352.852479][ T7] device 427 left promiscuous mode [ 1352.913465][ T7] device 428 left promiscuous mode [ 1352.972526][ T7] device 429 left promiscuous mode [ 1353.043187][ T7] device 430 left promiscuous mode [ 1353.112299][ T7] device 431 left promiscuous mode [ 1353.172904][ T7] device 432 left promiscuous mode [ 1353.272165][ T7] device 433 left promiscuous mode [ 1353.332316][ T7] device 434 left promiscuous mode [ 1353.382592][ T7] device 435 left promiscuous mode [ 1353.442244][ T7] device 436 left promiscuous mode [ 1353.522059][ T7] device 437 left promiscuous mode [ 1353.582294][ T7] device 438 left promiscuous mode [ 1353.632268][ T7] device 439 left promiscuous mode [ 1353.702399][ T7] device 440 left promiscuous mode [ 1353.742537][ T7] device 441 left promiscuous mode [ 1353.782468][ T7] device 442 left promiscuous mode [ 1353.822512][ T7] device 443 left promiscuous mode [ 1353.862507][ T7] device 444 left promiscuous mode [ 1353.902512][ T7] device 445 left promiscuous mode [ 1353.972290][ T7] device 446 left promiscuous mode [ 1354.032260][ T7] device 447 left promiscuous mode [ 1354.092314][ T7] device 448 left promiscuous mode [ 1354.142430][ T7] device 449 left promiscuous mode [ 1354.202525][ T7] device 450 left promiscuous mode [ 1354.253458][ T7] device 451 left promiscuous mode [ 1354.312292][ T7] device 452 left promiscuous mode [ 1354.372289][ T7] device 453 left promiscuous mode [ 1354.412403][ T7] device 454 left promiscuous mode [ 1354.472416][ T7] device 455 left promiscuous mode [ 1354.522920][ T7] device 456 left promiscuous mode [ 1354.592158][ T7] device 457 left promiscuous mode [ 1354.642427][ T7] device 458 left promiscuous mode [ 1354.712197][ T7] device 459 left promiscuous mode [ 1354.772298][ T7] device 460 left promiscuous mode [ 1354.832289][ T7] device 461 left promiscuous mode [ 1354.892240][ T7] device 462 left promiscuous mode [ 1354.942372][ T7] device 463 left promiscuous mode [ 1354.982601][ T7] device 464 left promiscuous mode [ 1355.022490][ T7] device 465 left promiscuous mode [ 1355.062471][ T7] device 466 left promiscuous mode [ 1355.102498][ T7] device 467 left promiscuous mode [ 1355.142473][ T7] device 468 left promiscuous mode [ 1355.182526][ T7] device 469 left promiscuous mode [ 1355.223458][ T7] device 470 left promiscuous mode [ 1355.282260][ T7] device 471 left promiscuous mode [ 1355.352222][ T7] device 472 left promiscuous mode [ 1355.422355][ T7] device 473 left promiscuous mode [ 1355.462538][ T7] device 474 left promiscuous mode [ 1355.502475][ T7] device 475 left promiscuous mode [ 1355.542539][ T7] device 476 left promiscuous mode [ 1355.602320][ T7] device 477 left promiscuous mode [ 1355.670315][ T7] device 478 left promiscuous mode [ 1355.742131][ T7] device 479 left promiscuous mode [ 1355.802225][ T7] device 480 left promiscuous mode [ 1355.852393][ T7] device 481 left promiscuous mode [ 1355.892545][ T7] device 482 left promiscuous mode [ 1355.962323][ T7] device 483 left promiscuous mode [ 1356.022270][ T7] device 484 left promiscuous mode [ 1356.082322][ T7] device 485 left promiscuous mode [ 1356.142407][ T7] device 486 left promiscuous mode [ 1356.192541][ T7] device 487 left promiscuous mode [ 1356.252076][ T7] device 488 left promiscuous mode [ 1356.332398][ T7] device 489 left promiscuous mode [ 1356.372547][ T7] device 490 left promiscuous mode [ 1356.422509][ T7] device 491 left promiscuous mode [ 1356.492308][ T7] device 492 left promiscuous mode [ 1356.542526][ T7] device 493 left promiscuous mode [ 1356.583600][ T7] device 494 left promiscuous mode [ 1356.652262][ T7] device 495 left promiscuous mode [ 1356.732021][ T7] device 496 left promiscuous mode [ 1356.792838][ T7] device 497 left promiscuous mode [ 1356.842405][ T7] device 498 left promiscuous mode [ 1356.882409][ T7] device 499 left promiscuous mode [ 1356.952195][ T7] device 500 left promiscuous mode [ 1357.012250][ T7] device 501 left promiscuous mode [ 1357.072194][ T7] device 502 left promiscuous mode [ 1357.122471][ T7] device 503 left promiscuous mode [ 1357.162549][ T7] device 504 left promiscuous mode [ 1357.213365][ T7] device 505 left promiscuous mode [ 1357.272238][ T7] device 506 left promiscuous mode [ 1357.332307][ T7] device 507 left promiscuous mode [ 1357.392571][ T7] device 508 left promiscuous mode [ 1357.432553][ T7] device 509 left promiscuous mode [ 1357.492491][ T7] device 510 left promiscuous mode [ 1357.532472][ T7] device 511 left promiscuous mode [ 1357.592340][ T7] device 512 left promiscuous mode [ 1357.652315][ T7] device 513 left promiscuous mode [ 1357.712348][ T7] device 514 left promiscuous mode [ 1357.792045][ T7] device 515 left promiscuous mode [ 1357.852300][ T7] device 516 left promiscuous mode [ 1357.912317][ T7] device 517 left promiscuous mode [ 1357.972248][ T7] device 518 left promiscuous mode [ 1358.032330][ T7] device 519 left promiscuous mode [ 1358.092325][ T7] device 520 left promiscuous mode [ 1358.142606][ T7] device 521 left promiscuous mode [ 1358.182513][ T7] device 522 left promiscuous mode [ 1358.252407][ T7] device 523 left promiscuous mode [ 1358.302415][ T7] device 524 left promiscuous mode [ 1358.372283][ T7] device 525 left promiscuous mode [ 1358.452329][ T7] device 526 left promiscuous mode [ 1358.522208][ T7] device 527 left promiscuous mode [ 1358.582503][ T7] device 528 left promiscuous mode [ 1358.622433][ T7] device 529 left promiscuous mode [ 1358.682399][ T7] device 530 left promiscuous mode [ 1358.722475][ T7] device 531 left promiscuous mode [ 1358.772571][ T7] device 532 left promiscuous mode [ 1358.832325][ T7] device 533 left promiscuous mode [ 1358.872454][ T7] device 534 left promiscuous mode [ 1358.912415][ T7] device 535 left promiscuous mode [ 1358.952435][ T7] device 536 left promiscuous mode [ 1359.002250][ T7] device 537 left promiscuous mode [ 1359.072180][ T7] device 538 left promiscuous mode [ 1359.142325][ T7] device 539 left promiscuous mode [ 1359.192331][ T7] device 540 left promiscuous mode [ 1359.242512][ T7] device 541 left promiscuous mode [ 1359.302555][ T7] device 542 left promiscuous mode [ 1359.372345][ T7] device 543 left promiscuous mode [ 1359.422515][ T7] device 544 left promiscuous mode [ 1359.492194][ T7] device 545 left promiscuous mode [ 1359.532585][ T7] device 546 left promiscuous mode [ 1359.572429][ T7] device 547 left promiscuous mode [ 1359.612431][ T7] device 548 left promiscuous mode [ 1359.652435][ T7] device 549 left promiscuous mode [ 1359.692411][ T7] device 550 left promiscuous mode [ 1359.762234][ T7] device 551 left promiscuous mode [ 1359.822251][ T7] device 552 left promiscuous mode [ 1359.882258][ T7] device 553 left promiscuous mode [ 1359.962294][ T7] device 554 left promiscuous mode [ 1360.032474][ T7] device 555 left promiscuous mode [ 1360.102238][ T7] device 556 left promiscuous mode [ 1360.172244][ T7] device 557 left promiscuous mode [ 1360.232298][ T7] device 558 left promiscuous mode [ 1360.292240][ T7] device 559 left promiscuous mode [ 1360.352281][ T7] device 560 left promiscuous mode [ 1360.412253][ T7] device 561 left promiscuous mode [ 1360.462475][ T7] device 562 left promiscuous mode [ 1360.502475][ T7] device 563 left promiscuous mode [ 1360.542287][ T7] device 564 left promiscuous mode [ 1360.602414][ T7] device 565 left promiscuous mode [ 1360.652386][ T7] device 566 left promiscuous mode [ 1360.702452][ T7] device 567 left promiscuous mode [ 1360.772283][ T7] device 568 left promiscuous mode [ 1360.842393][ T7] device 569 left promiscuous mode [ 1360.892394][ T7] device 570 left promiscuous mode [ 1360.962289][ T7] device 571 left promiscuous mode [ 1361.022493][ T7] device 572 left promiscuous mode [ 1361.082973][ T7] device 573 left promiscuous mode [ 1361.142343][ T7] device 574 left promiscuous mode [ 1361.182505][ T7] device 575 left promiscuous mode [ 1361.222440][ T7] device 576 left promiscuous mode [ 1361.262476][ T7] device 577 left promiscuous mode [ 1361.302599][ T7] device 578 left promiscuous mode [ 1361.352990][ T7] device 579 left promiscuous mode [ 1361.392474][ T7] device 580 left promiscuous mode [ 1361.432554][ T7] device 581 left promiscuous mode [ 1361.492481][ T7] device 582 left promiscuous mode [ 1361.552531][ T7] device 583 left promiscuous mode [ 1361.592409][ T7] device 584 left promiscuous mode [ 1361.632445][ T7] device 585 left promiscuous mode [ 1361.672388][ T7] device 586 left promiscuous mode [ 1361.712440][ T7] device 587 left promiscuous mode [ 1361.782230][ T7] device 588 left promiscuous mode [ 1361.842209][ T7] device 589 left promiscuous mode [ 1361.902238][ T7] device 590 left promiscuous mode [ 1361.952390][ T7] device 591 left promiscuous mode [ 1361.992573][ T7] device 592 left promiscuous mode [ 1362.032548][ T7] device 593 left promiscuous mode [ 1362.102377][ T7] device 594 left promiscuous mode [ 1362.182294][ T7] device 595 left promiscuous mode [ 1362.252145][ T7] device 596 left promiscuous mode [ 1362.303393][ T7] device 597 left promiscuous mode [ 1362.352024][ T7] device 598 left promiscuous mode [ 1362.412387][ T7] device 599 left promiscuous mode [ 1362.472283][ T7] device 600 left promiscuous mode [ 1362.522396][ T7] device 601 left promiscuous mode [ 1362.592220][ T7] device 602 left promiscuous mode [ 1362.672216][ T7] device 603 left promiscuous mode [ 1362.722458][ T7] device 604 left promiscuous mode [ 1362.762448][ T7] device 605 left promiscuous mode [ 1362.802490][ T7] device 606 left promiscuous mode [ 1362.872342][ T7] device 607 left promiscuous mode [ 1362.932296][ T7] device 608 left promiscuous mode [ 1362.992225][ T7] device 609 left promiscuous mode [ 1363.042485][ T7] device 610 left promiscuous mode [ 1363.082567][ T7] device 611 left promiscuous mode [ 1363.152322][ T7] device 612 left promiscuous mode [ 1363.212381][ T7] device 613 left promiscuous mode [ 1363.282274][ T7] device 614 left promiscuous mode [ 1363.322504][ T7] device 615 left promiscuous mode [ 1363.392383][ T7] device 616 left promiscuous mode [ 1363.432254][ T7] device 617 left promiscuous mode [ 1363.512237][ T7] device 618 left promiscuous mode [ 1363.592352][ T7] device 619 left promiscuous mode [ 1363.652356][ T7] device 620 left promiscuous mode [ 1363.702363][ T7] device 621 left promiscuous mode [ 1363.762945][ T7] device 622 left promiscuous mode [ 1363.812054][ T7] device 623 left promiscuous mode [ 1363.872421][ T7] device 624 left promiscuous mode [ 1363.922466][ T7] device 625 left promiscuous mode [ 1363.982496][ T7] device 626 left promiscuous mode [ 1364.042257][ T7] device 627 left promiscuous mode [ 1364.102261][ T7] device 628 left promiscuous mode [ 1364.162278][ T7] device 629 left promiscuous mode [ 1364.242232][ T7] device 630 left promiscuous mode [ 1364.322243][ T7] device 631 left promiscuous mode [ 1364.382311][ T7] device 632 left promiscuous mode [ 1364.432449][ T7] device 633 left promiscuous mode [ 1364.472527][ T7] device 634 left promiscuous mode [ 1364.522214][ T7] device 635 left promiscuous mode [ 1364.592302][ T7] device 636 left promiscuous mode [ 1364.662107][ T7] device 637 left promiscuous mode [ 1364.732252][ T7] device 638 left promiscuous mode [ 1364.792239][ T7] device 639 left promiscuous mode [ 1364.852222][ T7] device 640 left promiscuous mode [ 1364.922163][ T7] device 641 left promiscuous mode [ 1364.962469][ T7] device 642 left promiscuous mode [ 1365.042225][ T7] device 643 left promiscuous mode [ 1365.112217][ T7] device 644 left promiscuous mode [ 1365.172210][ T7] device 645 left promiscuous mode [ 1365.232242][ T7] device 646 left promiscuous mode [ 1365.282416][ T7] device 647 left promiscuous mode [ 1365.342488][ T7] device 648 left promiscuous mode [ 1365.402304][ T7] device 649 left promiscuous mode [ 1365.452478][ T7] device 650 left promiscuous mode [ 1365.522388][ T7] device 651 left promiscuous mode [ 1365.572410][ T7] device 652 left promiscuous mode [ 1365.612400][ T7] device 653 left promiscuous mode [ 1365.652436][ T7] device 654 left promiscuous mode [ 1365.692538][ T7] device 655 left promiscuous mode [ 1365.752466][ T7] device 656 left promiscuous mode [ 1365.792570][ T7] device 657 left promiscuous mode [ 1365.852117][ T7] device 658 left promiscuous mode [ 1365.892571][ T7] device 659 left promiscuous mode [ 1365.932510][ T7] device 660 left promiscuous mode [ 1365.972484][ T7] device 661 left promiscuous mode [ 1366.012551][ T7] device 662 left promiscuous mode [ 1366.072341][ T7] device 663 left promiscuous mode [ 1366.132472][ T7] device 664 left promiscuous mode [ 1366.202273][ T7] device 665 left promiscuous mode [ 1366.272519][ T7] device 666 left promiscuous mode [ 1366.332276][ T7] device 667 left promiscuous mode [ 1366.412052][ T7] device 668 left promiscuous mode [ 1366.462474][ T7] device 669 left promiscuous mode [ 1366.503726][ T7] device 670 left promiscuous mode [ 1366.552394][ T7] device 671 left promiscuous mode [ 1366.592491][ T7] device 672 left promiscuous mode [ 1366.632529][ T7] device 673 left promiscuous mode [ 1366.672508][ T7] device 674 left promiscuous mode [ 1366.712444][ T7] device 675 left promiscuous mode [ 1366.762280][ T7] device 676 left promiscuous mode [ 1366.842266][ T7] device 677 left promiscuous mode [ 1366.902292][ T7] device 678 left promiscuous mode [ 1366.972462][ T7] device 679 left promiscuous mode [ 1367.012465][ T7] device 680 left promiscuous mode [ 1367.052525][ T7] device 681 left promiscuous mode [ 1367.092484][ T7] device 682 left promiscuous mode [ 1367.132526][ T7] device 683 left promiscuous mode [ 1367.172551][ T7] device 684 left promiscuous mode [ 1367.212488][ T7] device 685 left promiscuous mode [ 1367.252667][ T7] device 686 left promiscuous mode [ 1367.332028][ T7] device 687 left promiscuous mode [ 1367.402432][ T7] device 688 left promiscuous mode [ 1367.462033][ T7] device 689 left promiscuous mode [ 1367.532310][ T7] device 690 left promiscuous mode [ 1367.592277][ T7] device 691 left promiscuous mode [ 1367.652349][ T7] device 692 left promiscuous mode [ 1367.702450][ T7] device 693 left promiscuous mode [ 1367.782230][ T7] device 694 left promiscuous mode [ 1367.842466][ T7] device 695 left promiscuous mode [ 1367.882504][ T7] device 696 left promiscuous mode [ 1367.922324][ T7] device 697 left promiscuous mode [ 1367.962278][ T7] device 698 left promiscuous mode [ 1368.022302][ T7] device 699 left promiscuous mode [ 1368.082370][ T7] device 700 left promiscuous mode [ 1368.152426][ T7] device 701 left promiscuous mode [ 1368.212473][ T7] device 702 left promiscuous mode [ 1368.272334][ T7] device 703 left promiscuous mode [ 1368.332331][ T7] device 704 left promiscuous mode [ 1368.382510][ T7] device 705 left promiscuous mode [ 1368.423416][ T7] device 706 left promiscuous mode [ 1368.492370][ T7] device 707 left promiscuous mode [ 1368.552210][ T7] device 708 left promiscuous mode [ 1368.602407][ T7] device 709 left promiscuous mode [ 1368.642488][ T7] device 710 left promiscuous mode [ 1368.712338][ T7] device 711 left promiscuous mode [ 1368.762032][ T7] device 712 left promiscuous mode [ 1368.812381][ T7] device 713 left promiscuous mode [ 1368.852505][ T7] device 714 left promiscuous mode [ 1368.912485][ T7] device 715 left promiscuous mode [ 1368.972465][ T7] device 716 left promiscuous mode [ 1369.032255][ T7] device 717 left promiscuous mode [ 1369.102265][ T7] device 718 left promiscuous mode [ 1369.162225][ T7] device 719 left promiscuous mode [ 1369.242245][ T7] device 720 left promiscuous mode [ 1369.312426][ T7] device 721 left promiscuous mode [ 1369.352538][ T7] device 722 left promiscuous mode [ 1369.392471][ T7] device 723 left promiscuous mode [ 1369.432524][ T7] device 724 left promiscuous mode [ 1369.472815][ T7] device 725 left promiscuous mode [ 1369.532286][ T7] device 726 left promiscuous mode [ 1369.572518][ T7] device 727 left promiscuous mode [ 1369.612514][ T7] device 728 left promiscuous mode [ 1369.652469][ T7] device 729 left promiscuous mode [ 1369.702443][ T7] device 730 left promiscuous mode [ 1369.782566][ T7] device 731 left promiscuous mode [ 1369.852427][ T7] device 732 left promiscuous mode [ 1369.892448][ T7] device 733 left promiscuous mode [ 1369.952388][ T7] device 734 left promiscuous mode [ 1370.022299][ T7] device 735 left promiscuous mode [ 1370.082543][ T7] device 736 left promiscuous mode [ 1370.142503][ T7] device 737 left promiscuous mode [ 1370.192094][ T7] device 738 left promiscuous mode [ 1370.262240][ T7] device 739 left promiscuous mode [ 1370.332172][ T7] device 740 left promiscuous mode [ 1370.392220][ T7] device 741 left promiscuous mode [ 1370.452238][ T7] device 742 left promiscuous mode [ 1370.522429][ T7] device 743 left promiscuous mode [ 1370.562510][ T7] device 744 left promiscuous mode [ 1370.612326][ T7] device 745 left promiscuous mode [ 1370.662511][ T7] device 746 left promiscuous mode [ 1370.722381][ T7] device 747 left promiscuous mode [ 1370.782281][ T7] device 748 left promiscuous mode [ 1370.832907][ T7] device 749 left promiscuous mode [ 1370.882053][ T7] device 750 left promiscuous mode [ 1370.922281][ T7] device 751 left promiscuous mode [ 1370.982390][ T7] device 752 left promiscuous mode [ 1371.042286][ T7] device 753 left promiscuous mode [ 1371.082267][ T7] device 754 left promiscuous mode [ 1371.152195][ T7] device 755 left promiscuous mode [ 1371.212224][ T7] device 756 left promiscuous mode [ 1371.252574][ T7] device 757 left promiscuous mode [ 1371.302561][ T7] device 758 left promiscuous mode [ 1371.392169][ T7] device 759 left promiscuous mode [ 1371.462456][ T7] device 760 left promiscuous mode [ 1371.512417][ T7] device 761 left promiscuous mode [ 1371.562288][ T7] device 762 left promiscuous mode [ 1371.612734][ T7] device 763 left promiscuous mode [ 1371.672220][ T7] device 764 left promiscuous mode [ 1371.712440][ T7] device 765 left promiscuous mode [ 1371.752414][ T7] device 766 left promiscuous mode [ 1371.812229][ T7] device 767 left promiscuous mode [ 1371.882424][ T7] device 768 left promiscuous mode [ 1371.952505][ T7] device 769 left promiscuous mode [ 1372.012478][ T7] device 770 left promiscuous mode [ 1372.072234][ T7] device 771 left promiscuous mode [ 1372.142504][ T7] device 772 left promiscuous mode [ 1372.202525][ T7] device 773 left promiscuous mode [ 1372.272344][ T7] device 774 left promiscuous mode [ 1372.342469][ T7] device 775 left promiscuous mode [ 1372.402336][ T7] device 776 left promiscuous mode [ 1372.462486][ T7] device 777 left promiscuous mode [ 1372.503471][ T7] device 778 left promiscuous mode [ 1372.562218][ T7] device 779 left promiscuous mode [ 1372.602401][ T7] device 780 left promiscuous mode [ 1372.642407][ T7] device 781 left promiscuous mode [ 1372.682405][ T7] device 782 left promiscuous mode [ 1372.752236][ T7] device 783 left promiscuous mode [ 1372.812309][ T7] device 784 left promiscuous mode [ 1372.862517][ T7] device 785 left promiscuous mode [ 1372.902445][ T7] device 786 left promiscuous mode [ 1372.962280][ T7] device 787 left promiscuous mode [ 1373.022437][ T7] device 788 left promiscuous mode [ 1373.062304][ T7] device 789 left promiscuous mode [ 1373.102261][ T7] device 790 left promiscuous mode [ 1373.182274][ T7] device 791 left promiscuous mode [ 1373.232276][ T7] device 792 left promiscuous mode [ 1373.282500][ T7] device 793 left promiscuous mode [ 1373.352309][ T7] device 794 left promiscuous mode [ 1373.402451][ T7] device 795 left promiscuous mode [ 1373.442623][ T7] device 796 left promiscuous mode [ 1373.512334][ T7] device 797 left promiscuous mode [ 1373.572191][ T7] device 798 left promiscuous mode [ 1373.622565][ T7] device 799 left promiscuous mode [ 1373.662527][ T7] device 800 left promiscuous mode [ 1373.732825][ T7] device 801 left promiscuous mode [ 1373.822165][ T7] device 802 left promiscuous mode [ 1373.873415][ T7] device 803 left promiscuous mode [ 1373.942221][ T7] device 804 left promiscuous mode [ 1373.992308][ T7] device 805 left promiscuous mode [ 1374.072287][ T7] device 806 left promiscuous mode [ 1374.132240][ T7] device 807 left promiscuous mode [ 1374.192245][ T7] device 808 left promiscuous mode [ 1374.252219][ T7] device 809 left promiscuous mode [ 1374.332277][ T7] device 810 left promiscuous mode [ 1374.382432][ T7] device 811 left promiscuous mode [ 1374.452265][ T7] device 812 left promiscuous mode [ 1374.522441][ T7] device 813 left promiscuous mode [ 1374.582582][ T7] device 814 left promiscuous mode [ 1374.632380][ T7] device 815 left promiscuous mode [ 1374.692250][ T7] device 816 left promiscuous mode [ 1374.752245][ T7] device 817 left promiscuous mode [ 1374.812217][ T7] device 818 left promiscuous mode [ 1374.862309][ T7] device 819 left promiscuous mode [ 1374.912594][ T7] device 820 left promiscuous mode [ 1374.982541][ T7] device 821 left promiscuous mode [ 1375.052455][ T7] device 822 left promiscuous mode [ 1375.112260][ T7] device 823 left promiscuous mode [ 1375.152381][ T7] device 824 left promiscuous mode [ 1375.192416][ T7] device 825 left promiscuous mode [ 1375.262291][ T7] device 826 left promiscuous mode [ 1375.322282][ T7] device 827 left promiscuous mode [ 1375.382392][ T7] device 828 left promiscuous mode [ 1375.432713][ T7] device 829 left promiscuous mode [ 1375.492065][ T7] device 830 left promiscuous mode [ 1375.532473][ T7] device 831 left promiscuous mode [ 1375.572611][ T7] device 832 left promiscuous mode [ 1375.612479][ T7] device 833 left promiscuous mode [ 1375.652522][ T7] device 834 left promiscuous mode [ 1375.692542][ T7] device 835 left promiscuous mode [ 1375.732526][ T7] device 836 left promiscuous mode [ 1375.773400][ T7] device 837 left promiscuous mode [ 1375.852205][ T7] device 838 left promiscuous mode [ 1375.912379][ T7] device 839 left promiscuous mode [ 1375.982294][ T7] device 840 left promiscuous mode [ 1376.032586][ T7] device 841 left promiscuous mode [ 1376.092078][ T7] device 842 left promiscuous mode [ 1376.132476][ T7] device 843 left promiscuous mode [ 1376.192493][ T7] device 844 left promiscuous mode [ 1376.232376][ T7] device 845 left promiscuous mode [ 1376.302227][ T7] device 846 left promiscuous mode [ 1376.382114][ T7] device 847 left promiscuous mode [ 1376.442435][ T7] device 848 left promiscuous mode [ 1376.492536][ T7] device 849 left promiscuous mode [ 1376.532537][ T7] device 850 left promiscuous mode [ 1376.572476][ T7] device 851 left promiscuous mode [ 1376.612501][ T7] device 852 left promiscuous mode [ 1376.652483][ T7] device 853 left promiscuous mode [ 1376.692426][ T7] device 854 left promiscuous mode [ 1376.732532][ T7] device 855 left promiscuous mode [ 1376.772441][ T7] device 856 left promiscuous mode [ 1376.812523][ T7] device 857 left promiscuous mode [ 1376.852972][ T7] device 858 left promiscuous mode [ 1376.922402][ T7] device 859 left promiscuous mode [ 1376.972376][ T7] device 860 left promiscuous mode [ 1377.012431][ T7] device 861 left promiscuous mode [ 1377.062382][ T7] device 862 left promiscuous mode [ 1377.112439][ T7] device 863 left promiscuous mode [ 1377.172514][ T7] device 864 left promiscuous mode [ 1377.232245][ T7] device 865 left promiscuous mode [ 1377.302438][ T7] device 866 left promiscuous mode [ 1377.362230][ T7] device 867 left promiscuous mode [ 1377.422257][ T7] device 868 left promiscuous mode [ 1377.472392][ T7] device 869 left promiscuous mode [ 1377.542378][ T7] device 870 left promiscuous mode [ 1377.592588][ T7] device 871 left promiscuous mode [ 1377.652364][ T7] device 872 left promiscuous mode [ 1377.712407][ T7] device 873 left promiscuous mode [ 1377.772485][ T7] device 874 left promiscuous mode [ 1377.812499][ T7] device 875 left promiscuous mode [ 1377.872496][ T7] device 876 left promiscuous mode [ 1377.942258][ T7] device 877 left promiscuous mode [ 1377.992402][ T7] device 878 left promiscuous mode [ 1378.062215][ T7] device 879 left promiscuous mode [ 1378.112375][ T7] device 880 left promiscuous mode [ 1378.162361][ T7] device 881 left promiscuous mode [ 1378.232185][ T7] device 882 left promiscuous mode [ 1378.292187][ T7] device 883 left promiscuous mode [ 1378.372010][ T7] device 884 left promiscuous mode [ 1378.432223][ T7] device 885 left promiscuous mode [ 1378.492209][ T7] device 886 left promiscuous mode [ 1378.552227][ T7] device 887 left promiscuous mode [ 1378.612225][ T7] device 888 left promiscuous mode [ 1378.682373][ T7] device 889 left promiscuous mode [ 1378.732851][ T7] device 890 left promiscuous mode [ 1378.792212][ T7] device 891 left promiscuous mode [ 1378.842449][ T7] device 892 left promiscuous mode [ 1378.882358][ T7] device 893 left promiscuous mode [ 1378.952375][ T7] device 894 left promiscuous mode [ 1379.003387][ T7] device 895 left promiscuous mode [ 1379.052020][ T7] device 896 left promiscuous mode [ 1379.112444][ T7] device 897 left promiscuous mode [ 1379.162382][ T7] device 898 left promiscuous mode [ 1379.232233][ T7] device 899 left promiscuous mode [ 1379.292324][ T7] device 900 left promiscuous mode [ 1379.352288][ T7] device 901 left promiscuous mode [ 1379.412288][ T7] device 902 left promiscuous mode [ 1379.482473][ T7] device 903 left promiscuous mode [ 1379.542419][ T7] device 904 left promiscuous mode [ 1379.642109][ T7] device 905 left promiscuous mode [ 1379.712442][ T7] device 906 left promiscuous mode [ 1379.772230][ T7] device 907 left promiscuous mode [ 1379.812385][ T7] device 908 left promiscuous mode [ 1379.852402][ T7] device 909 left promiscuous mode [ 1379.892373][ T7] device 910 left promiscuous mode [ 1379.932361][ T7] device 911 left promiscuous mode [ 1379.992424][ T7] device 912 left promiscuous mode [ 1380.032417][ T7] device 913 left promiscuous mode [ 1380.072399][ T7] device 914 left promiscuous mode [ 1380.112496][ T7] device 915 left promiscuous mode [ 1380.152549][ T7] device 916 left promiscuous mode [ 1380.192476][ T7] device 917 left promiscuous mode [ 1380.233387][ T7] device 918 left promiscuous mode [ 1380.292001][ T7] device 919 left promiscuous mode [ 1380.342402][ T7] device 920 left promiscuous mode [ 1380.382520][ T7] device 921 left promiscuous mode [ 1380.452312][ T7] device 922 left promiscuous mode [ 1380.502487][ T7] device 923 left promiscuous mode [ 1380.571983][ T7] device 924 left promiscuous mode [ 1380.632357][ T7] device 925 left promiscuous mode [ 1380.692310][ T7] device 926 left promiscuous mode [ 1380.762467][ T7] device 927 left promiscuous mode [ 1380.802511][ T7] device 928 left promiscuous mode [ 1380.872268][ T7] device 929 left promiscuous mode [ 1380.932318][ T7] device 930 left promiscuous mode [ 1380.992282][ T7] device 931 left promiscuous mode [ 1381.052259][ T7] device 932 left promiscuous mode [ 1381.112276][ T7] device 933 left promiscuous mode [ 1381.162473][ T7] device 934 left promiscuous mode [ 1381.222350][ T7] device 935 left promiscuous mode [ 1381.282255][ T7] device 936 left promiscuous mode [ 1381.352269][ T7] device 937 left promiscuous mode [ 1381.402407][ T7] device 938 left promiscuous mode [ 1381.462151][ T7] device 939 left promiscuous mode [ 1381.512164][ T7] device 940 left promiscuous mode [ 1381.552407][ T7] device 941 left promiscuous mode [ 1381.622301][ T7] device 942 left promiscuous mode [ 1381.682257][ T7] device 943 left promiscuous mode [ 1381.752249][ T7] device 944 left promiscuous mode [ 1381.812236][ T7] device 945 left promiscuous mode [ 1381.872272][ T7] device 946 left promiscuous mode [ 1381.952262][ T7] device 947 left promiscuous mode [ 1382.002389][ T7] device 948 left promiscuous mode [ 1382.042237][ T7] device 949 left promiscuous mode [ 1382.092429][ T7] device 950 left promiscuous mode [ 1382.162279][ T7] device 951 left promiscuous mode [ 1382.212412][ T7] device 952 left promiscuous mode [ 1382.272459][ T7] device 953 left promiscuous mode [ 1382.342506][ T7] device 954 left promiscuous mode [ 1382.412277][ T7] device 955 left promiscuous mode [ 1382.462453][ T7] device 956 left promiscuous mode [ 1382.502470][ T7] device 957 left promiscuous mode [ 1382.562145][ T7] device 958 left promiscuous mode [ 1382.642311][ T7] device 959 left promiscuous mode [ 1382.702442][ T7] device 960 left promiscuous mode [ 1382.772327][ T7] device 961 left promiscuous mode [ 1382.842233][ T7] device 962 left promiscuous mode [ 1382.902638][ T7] device 963 left promiscuous mode [ 1382.972300][ T7] device 964 left promiscuous mode [ 1383.032272][ T7] device 965 left promiscuous mode [ 1383.082363][ T7] device 966 left promiscuous mode [ 1383.122638][ T7] device 967 left promiscuous mode [ 1383.163368][ T7] device 968 left promiscuous mode [ 1383.222298][ T7] device 969 left promiscuous mode [ 1383.282398][ T7] device 970 left promiscuous mode [ 1383.352245][ T7] device 971 left promiscuous mode [ 1383.432148][ T7] device 972 left promiscuous mode [ 1383.492332][ T7] device 973 left promiscuous mode [ 1383.572234][ T7] device 974 left promiscuous mode [ 1383.622412][ T7] device 975 left promiscuous mode [ 1383.682234][ T7] device 976 left promiscuous mode [ 1383.742279][ T7] device 977 left promiscuous mode [ 1383.802249][ T7] device 978 left promiscuous mode [ 1383.862267][ T7] device 979 left promiscuous mode [ 1383.912440][ T7] device 980 left promiscuous mode [ 1383.972506][ T7] device 981 left promiscuous mode [ 1384.012378][ T7] device 982 left promiscuous mode [ 1384.072200][ T7] device 983 left promiscuous mode [ 1384.142476][ T7] device 984 left promiscuous mode [ 1384.202454][ T7] device 985 left promiscuous mode [ 1384.242505][ T7] device 986 left promiscuous mode [ 1384.283386][ T7] device 987 left promiscuous mode [ 1384.332021][ T7] device 988 left promiscuous mode [ 1384.382469][ T7] device 989 left promiscuous mode [ 1384.432078][ T7] device 990 left promiscuous mode [ 1384.482583][ T7] device 991 left promiscuous mode [ 1384.522452][ T7] device 992 left promiscuous mode [ 1384.562444][ T7] device 993 left promiscuous mode [ 1384.602439][ T7] device 994 left promiscuous mode [ 1384.642436][ T7] device 995 left promiscuous mode [ 1384.712331][ T7] device 996 left promiscuous mode [ 1384.772295][ T7] device 997 left promiscuous mode [ 1384.842489][ T7] device 998 left promiscuous mode [ 1384.882337][ T7] device 999 left promiscuous mode [ 1384.932537][ T7] device 1000 left promiscuous mode [ 1384.992464][ T7] device 1001 left promiscuous mode [ 1385.032482][ T7] device 1002 left promiscuous mode [ 1385.082467][ T7] device 1003 left promiscuous mode [ 1385.152282][ T7] device 1004 left promiscuous mode [ 1385.232109][ T7] device 1005 left promiscuous mode [ 1385.302453][ T7] device 1006 left promiscuous mode [ 1385.362070][ T7] device 1007 left promiscuous mode [ 1385.432304][ T7] device 1008 left promiscuous mode [ 1385.492277][ T7] device 1009 left promiscuous mode [ 1385.552257][ T7] device 1010 left promiscuous mode [ 1385.612827][ T7] device 1011 left promiscuous mode [ 1385.672428][ T7] device 1012 left promiscuous mode [ 1385.722552][ T7] device 1013 left promiscuous mode [ 1385.782281][ T7] device 1014 left promiscuous mode [ 1385.832636][ T7] device 1015 left promiscuous mode [ 1385.902315][ T7] device 1016 left promiscuous mode [ 1385.957734][ T7] device 1017 left promiscuous mode [ 1386.012297][ T7] device 1018 left promiscuous mode [ 1386.052442][ T7] device 1019 left promiscuous mode [ 1386.092358][ T7] device 1020 left promiscuous mode [ 1386.142231][ T7] device 1021 left promiscuous mode [ 1386.202249][ T7] device 1022 left promiscuous mode [ 1386.282290][ T7] device 1023 left promiscuous mode [ 1386.332432][ T7] device 1024 left promiscuous mode [ 1386.372393][ T7] device 1025 left promiscuous mode [ 1386.432398][ T7] device 1026 left promiscuous mode [ 1386.472507][ T7] device 1027 left promiscuous mode [ 1386.522220][ T7] device 1028 left promiscuous mode [ 1386.572494][ T7] device 1029 left promiscuous mode [ 1386.622324][ T7] device 1030 left promiscuous mode [ 1386.662632][ T7] device 1031 left promiscuous mode [ 1386.722278][ T7] device 1032 left promiscuous mode [ 1386.792472][ T7] device 1033 left promiscuous mode [ 1386.832463][ T7] device 1034 left promiscuous mode [ 1386.899510][ T7] device 1035 left promiscuous mode [ 1386.952249][ T7] device 1036 left promiscuous mode [ 1386.992307][ T7] device 1037 left promiscuous mode [ 1387.052293][ T7] device 1038 left promiscuous mode [ 1387.092281][ T7] device 1039 left promiscuous mode [ 1387.172084][ T7] device 1040 left promiscuous mode [ 1387.222533][ T7] device 1041 left promiscuous mode [ 1387.262572][ T7] device 1042 left promiscuous mode [ 1387.322253][ T7] device 1043 left promiscuous mode [ 1387.392226][ T7] device 1044 left promiscuous mode [ 1387.452271][ T7] device 1045 left promiscuous mode [ 1387.532212][ T7] device 1046 left promiscuous mode [ 1387.582436][ T7] device 1047 left promiscuous mode [ 1387.632147][ T7] device 1048 left promiscuous mode [ 1387.682406][ T7] device 1049 left promiscuous mode [ 1387.752377][ T7] device 1050 left promiscuous mode [ 1387.812358][ T7] device 1051 left promiscuous mode [ 1387.872480][ T7] device 1052 left promiscuous mode [ 1387.942245][ T7] device 1053 left promiscuous mode [ 1388.012446][ T7] device 1054 left promiscuous mode [ 1388.052450][ T7] device 1055 left promiscuous mode [ 1388.092503][ T7] device 1056 left promiscuous mode [ 1388.132468][ T7] device 1057 left promiscuous mode [ 1388.172520][ T7] device 1058 left promiscuous mode [ 1388.212499][ T7] device 1059 left promiscuous mode [ 1388.252515][ T7] device 1060 left promiscuous mode [ 1388.293417][ T7] device 1061 left promiscuous mode [ 1388.352350][ T7] device 1062 left promiscuous mode [ 1388.412474][ T7] device 1063 left promiscuous mode [ 1388.472229][ T7] device 1064 left promiscuous mode [ 1388.552253][ T7] device 1065 left promiscuous mode [ 1388.622408][ T7] device 1066 left promiscuous mode [ 1388.662225][ T7] device 1067 left promiscuous mode [ 1388.732321][ T7] device 1068 left promiscuous mode [ 1388.772291][ T7] device 1069 left promiscuous mode [ 1388.832332][ T7] device 1070 left promiscuous mode [ 1388.872338][ T7] device 1071 left promiscuous mode [ 1388.932346][ T7] device 1072 left promiscuous mode [ 1388.992332][ T7] device 1073 left promiscuous mode [ 1389.052269][ T7] device 1074 left promiscuous mode [ 1389.112327][ T7] device 1075 left promiscuous mode [ 1389.172290][ T7] device 1076 left promiscuous mode [ 1389.222481][ T7] device 1077 left promiscuous mode [ 1389.272357][ T7] device 1078 left promiscuous mode [ 1389.352325][ T7] device 1079 left promiscuous mode [ 1389.422197][ T7] device 1080 left promiscuous mode [ 1389.492342][ T7] device 1081 left promiscuous mode [ 1389.552334][ T7] device 1082 left promiscuous mode [ 1389.592344][ T7] device 1083 left promiscuous mode [ 1389.642545][ T7] device 1084 left promiscuous mode [ 1389.702510][ T7] device 1085 left promiscuous mode [ 1389.762473][ T7] device 1086 left promiscuous mode [ 1389.802302][ T7] device 1087 left promiscuous mode [ 1389.882337][ T7] device 1088 left promiscuous mode [ 1389.942395][ T7] device 1089 left promiscuous mode [ 1390.002267][ T7] device 1090 left promiscuous mode [ 1390.042258][ T7] device 1091 left promiscuous mode [ 1390.112462][ T7] device 1092 left promiscuous mode [ 1390.192363][ T7] device 1093 left promiscuous mode [ 1390.242458][ T7] device 1094 left promiscuous mode [ 1390.292485][ T7] device 1095 left promiscuous mode [ 1390.342443][ T7] device 1096 left promiscuous mode [ 1390.382468][ T7] device 1097 left promiscuous mode [ 1390.432417][ T7] device 1098 left promiscuous mode [ 1390.482068][ T7] device 1099 left promiscuous mode [ 1390.522239][ T7] device 1100 left promiscuous mode [ 1390.582437][ T7] device 1101 left promiscuous mode [ 1390.632466][ T7] device 1102 left promiscuous mode [ 1390.682274][ T7] device 1103 left promiscuous mode [ 1390.732543][ T7] device 1104 left promiscuous mode [ 1390.802485][ T7] device 1105 left promiscuous mode [ 1390.842306][ T7] device 1106 left promiscuous mode [ 1390.902335][ T7] device 1107 left promiscuous mode [ 1390.962302][ T7] device 1108 left promiscuous mode [ 1391.012450][ T7] device 1109 left promiscuous mode [ 1391.053409][ T7] device 1110 left promiscuous mode [ 1391.131998][ T7] device 1111 left promiscuous mode [ 1391.192310][ T7] device 1112 left promiscuous mode [ 1391.262431][ T7] device 1113 left promiscuous mode [ 1391.312392][ T7] device 1114 left promiscuous mode [ 1391.392039][ T7] device 1115 left promiscuous mode [ 1391.442506][ T7] device 1116 left promiscuous mode [ 1391.482421][ T7] device 1117 left promiscuous mode [ 1391.542482][ T7] device 1118 left promiscuous mode [ 1391.612285][ T7] device 1119 left promiscuous mode [ 1391.662462][ T7] device 1120 left promiscuous mode [ 1391.702614][ T7] device 1121 left promiscuous mode [ 1391.772325][ T7] device 1122 left promiscuous mode [ 1391.832429][ T7] device 1123 left promiscuous mode [ 1391.882455][ T7] device 1124 left promiscuous mode [ 1391.922557][ T7] device 1125 left promiscuous mode [ 1391.982232][ T7] device 1126 left promiscuous mode [ 1392.052280][ T7] device 1127 left promiscuous mode [ 1392.112274][ T7] device 1128 left promiscuous mode [ 1392.172221][ T7] device 1129 left promiscuous mode [ 1392.232238][ T7] device 1130 left promiscuous mode [ 1392.292298][ T7] device 1131 left promiscuous mode [ 1392.342484][ T7] device 1132 left promiscuous mode [ 1392.382543][ T7] device 1133 left promiscuous mode [ 1392.422444][ T7] device 1134 left promiscuous mode [ 1392.462319][ T7] device 1135 left promiscuous mode [ 1392.512396][ T7] device 1136 left promiscuous mode [ 1392.552382][ T7] device 1137 left promiscuous mode [ 1392.602262][ T7] device 1138 left promiscuous mode [ 1392.672134][ T7] device 1139 left promiscuous mode [ 1392.712493][ T7] device 1140 left promiscuous mode [ 1392.762237][ T7] device 1141 left promiscuous mode [ 1392.832488][ T7] device 1142 left promiscuous mode [ 1392.892496][ T7] device 1143 left promiscuous mode [ 1392.962293][ T7] device 1144 left promiscuous mode [ 1393.042297][ T7] device 1145 left promiscuous mode [ 1393.122079][ T7] device 1146 left promiscuous mode [ 1393.192521][ T7] device 1147 left promiscuous mode [ 1393.232529][ T7] device 1148 left promiscuous mode [ 1393.292532][ T7] device 1149 left promiscuous mode [ 1393.332491][ T7] device 1150 left promiscuous mode [ 1393.372495][ T7] device 1151 left promiscuous mode [ 1393.432420][ T7] device 1152 left promiscuous mode [ 1393.482253][ T7] device 1153 left promiscuous mode [ 1393.552442][ T7] device 1154 left promiscuous mode [ 1393.592544][ T7] device 1155 left promiscuous mode [ 1393.652243][ T7] device 1156 left promiscuous mode [ 1393.712349][ T7] device 1157 left promiscuous mode [ 1393.782474][ T7] device 1158 left promiscuous mode [ 1393.822239][ T7] device 1159 left promiscuous mode [ 1393.882245][ T7] device 1160 left promiscuous mode [ 1393.946476][ T7] device 1161 left promiscuous mode [ 1393.982185][ T7] device 1162 left promiscuous mode [ 1394.032479][ T7] device 1163 left promiscuous mode [ 1394.092549][ T7] device 1164 left promiscuous mode [ 1394.162193][ T7] device 1165 left promiscuous mode [ 1394.222099][ T7] device 1166 left promiscuous mode [ 1394.282310][ T7] device 1167 left promiscuous mode [ 1394.332575][ T7] device 1168 left promiscuous mode [ 1394.372419][ T7] device 1169 left promiscuous mode [ 1394.412401][ T7] device 1170 left promiscuous mode [ 1394.452378][ T7] device 1171 left promiscuous mode [ 1394.492388][ T7] device 1172 left promiscuous mode [ 1394.532364][ T7] device 1173 left promiscuous mode [ 1394.572376][ T7] device 1174 left promiscuous mode [ 1394.612741][ T7] device 1175 left promiscuous mode [ 1394.652404][ T7] device 1176 left promiscuous mode [ 1394.692380][ T7] device 1177 left promiscuous mode [ 1394.752463][ T7] device 1178 left promiscuous mode [ 1394.812458][ T7] device 1179 left promiscuous mode [ 1394.872494][ T7] device 1180 left promiscuous mode [ 1394.932457][ T7] device 1181 left promiscuous mode [ 1394.992516][ T7] device 1182 left promiscuous mode [ 1395.052900][ T7] device 1183 left promiscuous mode [ 1395.092550][ T7] device 1184 left promiscuous mode [ 1395.162296][ T7] device 1185 left promiscuous mode [ 1395.232119][ T7] device 1186 left promiscuous mode [ 1395.312608][ T7] device 1187 left promiscuous mode [ 1395.352184][ T7] device 1188 left promiscuous mode [ 1395.432220][ T7] device 1189 left promiscuous mode [ 1395.482431][ T7] device 1190 left promiscuous mode [ 1395.542621][ T7] device 1191 left promiscuous mode [ 1395.582423][ T7] device 1192 left promiscuous mode [ 1395.652245][ T7] device 1193 left promiscuous mode [ 1395.712246][ T7] device 1194 left promiscuous mode [ 1395.772240][ T7] device 1195 left promiscuous mode [ 1395.852251][ T7] device 1196 left promiscuous mode [ 1395.902535][ T7] device 1197 left promiscuous mode [ 1395.982452][ T7] device 1198 left promiscuous mode [ 1396.032393][ T7] device 1199 left promiscuous mode [ 1396.072528][ T7] device 1200 left promiscuous mode [ 1396.122395][ T7] device 1201 left promiscuous mode [ 1396.202088][ T7] device 1202 left promiscuous mode [ 1396.262244][ T7] device 1203 left promiscuous mode [ 1396.312262][ T7] device 1204 left promiscuous mode [ 1396.362384][ T7] device 1205 left promiscuous mode [ 1396.422401][ T7] device 1206 left promiscuous mode [ 1396.472571][ T7] device 1207 left promiscuous mode [ 1396.512395][ T7] device 1208 left promiscuous mode [ 1396.582424][ T7] device 1209 left promiscuous mode [ 1396.622331][ T7] device 1210 left promiscuous mode [ 1396.673364][ T7] device 1211 left promiscuous mode [ 1396.732199][ T7] device 1212 left promiscuous mode [ 1396.792390][ T7] device 1213 left promiscuous mode [ 1396.862340][ T7] device 1214 left promiscuous mode [ 1396.922418][ T7] device 1215 left promiscuous mode [ 1396.992245][ T7] device 1216 left promiscuous mode [ 1397.042344][ T7] device 1217 left promiscuous mode [ 1397.122087][ T7] device 1218 left promiscuous mode [ 1397.182263][ T7] device 1219 left promiscuous mode [ 1397.242248][ T7] device 1220 left promiscuous mode [ 1397.302324][ T7] device 1221 left promiscuous mode [ 1397.352400][ T7] device 1222 left promiscuous mode [ 1397.392463][ T7] device 1223 left promiscuous mode [ 1397.432502][ T7] device 1224 left promiscuous mode [ 1397.472448][ T7] device 1225 left promiscuous mode [ 1397.532542][ T7] device 1226 left promiscuous mode [ 1397.602394][ T7] device 1227 left promiscuous mode [ 1397.642487][ T7] device 1228 left promiscuous mode [ 1397.712334][ T7] device 1229 left promiscuous mode [ 1397.772335][ T7] device 1230 left promiscuous mode [ 1397.822462][ T7] device 1231 left promiscuous mode [ 1397.862465][ T7] device 1232 left promiscuous mode [ 1397.922456][ T7] device 1233 left promiscuous mode [ 1397.992433][ T7] device 1234 left promiscuous mode [ 1398.042106][ T7] device 1235 left promiscuous mode [ 1398.092424][ T7] device 1236 left promiscuous mode [ 1398.152408][ T7] device 1237 left promiscuous mode [ 1398.222263][ T7] device 1238 left promiscuous mode [ 1398.292433][ T7] device 1239 left promiscuous mode [ 1398.332521][ T7] device 1240 left promiscuous mode [ 1398.372482][ T7] device 1241 left promiscuous mode [ 1398.412538][ T7] device 1242 left promiscuous mode [ 1398.492215][ T7] device 1243 left promiscuous mode [ 1398.532512][ T7] device 1244 left promiscuous mode [ 1398.602021][ T7] device 1245 left promiscuous mode [ 1398.662475][ T7] device 1246 left promiscuous mode [ 1398.712501][ T7] device 1247 left promiscuous mode [ 1398.772441][ T7] device 1248 left promiscuous mode [ 1398.812497][ T7] device 1249 left promiscuous mode [ 1398.852355][ T7] device 1250 left promiscuous mode [ 1398.922285][ T7] device 1251 left promiscuous mode [ 1398.982520][ T7] device 1252 left promiscuous mode [ 1399.032495][ T7] device 1253 left promiscuous mode [ 1399.072474][ T7] device 1254 left promiscuous mode [ 1399.112477][ T7] device 1255 left promiscuous mode [ 1399.152842][ T7] device 1256 left promiscuous mode [ 1399.192475][ T7] device 1257 left promiscuous mode [ 1399.232473][ T7] device 1258 left promiscuous mode [ 1399.273667][ T7] device 1259 left promiscuous mode [ 1399.332276][ T7] device 1260 left promiscuous mode [ 1399.392347][ T7] device 1261 left promiscuous mode [ 1399.462296][ T7] device 1262 left promiscuous mode [ 1399.512372][ T7] device 1263 left promiscuous mode [ 1399.572379][ T7] device 1264 left promiscuous mode [ 1399.612512][ T7] device 1265 left promiscuous mode [ 1399.692254][ T7] device 1266 left promiscuous mode [ 1399.752474][ T7] device 1267 left promiscuous mode [ 1399.822221][ T7] device 1268 left promiscuous mode [ 1399.882415][ T7] device 1269 left promiscuous mode [ 1399.952291][ T7] device 1270 left promiscuous mode [ 1400.022235][ T7] device 1271 left promiscuous mode [ 1400.062516][ T7] device 1272 left promiscuous mode [ 1400.102503][ T7] device 1273 left promiscuous mode [ 1400.142564][ T7] device 1274 left promiscuous mode [ 1400.182501][ T7] device 1275 left promiscuous mode [ 1400.223411][ T7] device 1276 left promiscuous mode [ 1400.302217][ T7] device 1277 left promiscuous mode [ 1400.362365][ T7] device 1278 left promiscuous mode [ 1400.432263][ T7] device 1279 left promiscuous mode [ 1400.512390][ T7] device 1280 left promiscuous mode [ 1400.562371][ T7] device 1281 left promiscuous mode [ 1400.602369][ T7] device 1282 left promiscuous mode [ 1400.662513][ T7] device 1283 left promiscuous mode [ 1400.702252][ T7] device 1284 left promiscuous mode [ 1400.752412][ T7] device 1285 left promiscuous mode [ 1400.792478][ T7] device 1286 left promiscuous mode [ 1400.832534][ T7] device 1287 left promiscuous mode [ 1400.903462][ T7] device 1288 left promiscuous mode [ 1400.992132][ T7] device 1289 left promiscuous mode [ 1401.062684][ T7] device 1290 left promiscuous mode [ 1401.132500][ T7] device 1291 left promiscuous mode [ 1401.192259][ T7] device 1292 left promiscuous mode [ 1401.242238][ T7] device 1293 left promiscuous mode [ 1401.302260][ T7] device 1294 left promiscuous mode [ 1401.362251][ T7] device 1295 left promiscuous mode [ 1401.432428][ T7] device 1296 left promiscuous mode [ 1401.472475][ T7] device 1297 left promiscuous mode [ 1401.532316][ T7] device 1298 left promiscuous mode [ 1401.592430][ T7] device 1299 left promiscuous mode [ 1401.642275][ T7] device 1300 left promiscuous mode [ 1401.692492][ T7] device 1301 left promiscuous mode [ 1401.752540][ T7] device 1302 left promiscuous mode [ 1401.802332][ T7] device 1303 left promiscuous mode [ 1401.872344][ T7] device 1304 left promiscuous mode [ 1401.942472][ T7] device 1305 left promiscuous mode [ 1401.982638][ T7] device 1306 left promiscuous mode [ 1402.022563][ T7] device 1307 left promiscuous mode [ 1402.102204][ T7] device 1308 left promiscuous mode [ 1402.162284][ T7] device 1309 left promiscuous mode [ 1402.212588][ T7] device 1310 left promiscuous mode [ 1402.282172][ T7] device 1311 left promiscuous mode [ 1402.322446][ T7] device 1312 left promiscuous mode [ 1402.392283][ T7] device 1313 left promiscuous mode [ 1402.452256][ T7] device 1314 left promiscuous mode [ 1402.504949][ T7] device 1315 left promiscuous mode [ 1402.602263][ T7] device 1316 left promiscuous mode [ 1402.672297][ T7] device 1317 left promiscuous mode [ 1402.752261][ T7] device 1318 left promiscuous mode [ 1402.812254][ T7] device 1319 left promiscuous mode [ 1402.882470][ T7] device 1320 left promiscuous mode [ 1402.942448][ T7] device 1321 left promiscuous mode [ 1402.982328][ T7] device 1322 left promiscuous mode [ 1403.032481][ T7] device 1323 left promiscuous mode [ 1403.102307][ T7] device 1324 left promiscuous mode [ 1403.152465][ T7] device 1325 left promiscuous mode [ 1403.222336][ T7] device 1326 left promiscuous mode [ 1403.272301][ T7] device 1327 left promiscuous mode [ 1403.323414][ T7] device 1328 left promiscuous mode [ 1403.372022][ T7] device 1329 left promiscuous mode [ 1403.422512][ T7] device 1330 left promiscuous mode [ 1403.462522][ T7] device 1331 left promiscuous mode [ 1403.532316][ T7] device 1332 left promiscuous mode [ 1403.583060][ T7] device 1333 left promiscuous mode [ 1403.632045][ T7] device 1334 left promiscuous mode [ 1403.682521][ T7] device 1335 left promiscuous mode [ 1403.722549][ T7] device 1336 left promiscuous mode [ 1403.762466][ T7] device 1337 left promiscuous mode [ 1403.832208][ T7] device 1338 left promiscuous mode [ 1403.902246][ T7] device 1339 left promiscuous mode [ 1403.952410][ T7] device 1340 left promiscuous mode [ 1404.022490][ T7] device 1341 left promiscuous mode [ 1404.072343][ T7] device 1342 left promiscuous mode [ 1404.112520][ T7] device 1343 left promiscuous mode [ 1404.152521][ T7] device 1344 left promiscuous mode [ 1404.192379][ T7] device 1345 left promiscuous mode [ 1404.242373][ T7] device 1346 left promiscuous mode [ 1404.312224][ T7] device 1347 left promiscuous mode [ 1404.362422][ T7] device 1348 left promiscuous mode [ 1404.422294][ T7] device 1349 left promiscuous mode [ 1404.482232][ T7] device 1350 left promiscuous mode [ 1404.552441][ T7] device 1351 left promiscuous mode [ 1404.593786][ T7] device 1352 left promiscuous mode [ 1404.652234][ T7] device 1353 left promiscuous mode [ 1404.722241][ T7] device 1354 left promiscuous mode [ 1404.762256][ T7] device 1355 left promiscuous mode [ 1404.832471][ T7] device 1356 left promiscuous mode [ 1404.872474][ T7] device 1357 left promiscuous mode [ 1404.912381][ T7] device 1358 left promiscuous mode [ 1404.962481][ T7] device 1359 left promiscuous mode [ 1405.022450][ T7] device 1360 left promiscuous mode [ 1405.062545][ T7] device 1361 left promiscuous mode [ 1405.132012][ T7] device 1362 left promiscuous mode [ 1405.182458][ T7] device 1363 left promiscuous mode [ 1405.252248][ T7] device 1364 left promiscuous mode [ 1405.302410][ T7] device 1365 left promiscuous mode [ 1405.372206][ T7] device 1366 left promiscuous mode [ 1405.432235][ T7] device 1367 left promiscuous mode [ 1405.532107][ T7] device 1368 left promiscuous mode [ 1405.592227][ T7] device 1369 left promiscuous mode [ 1405.652267][ T7] device 1370 left promiscuous mode [ 1405.712267][ T7] device 1371 left promiscuous mode [ 1405.772269][ T7] device 1372 left promiscuous mode [ 1405.822391][ T7] device 1373 left promiscuous mode [ 1405.862568][ T7] device 1374 left promiscuous mode [ 1405.902519][ T7] device 1375 left promiscuous mode [ 1405.942314][ T7] device 1376 left promiscuous mode [ 1406.002415][ T7] device 1377 left promiscuous mode [ 1406.082192][ T7] device 1378 left promiscuous mode [ 1406.122510][ T7] device 1379 left promiscuous mode [ 1406.162709][ T7] device 1380 left promiscuous mode [ 1406.202466][ T7] device 1381 left promiscuous mode [ 1406.262247][ T7] device 1382 left promiscuous mode [ 1406.302566][ T7] device 1383 left promiscuous mode [ 1406.372249][ T7] device 1384 left promiscuous mode [ 1406.442383][ T7] device 1385 left promiscuous mode [ 1406.502418][ T7] device 1386 left promiscuous mode [ 1406.552534][ T7] device 1387 left promiscuous mode [ 1406.632029][ T7] device 1388 left promiscuous mode [ 1406.692272][ T7] device 1389 left promiscuous mode [ 1406.752195][ T7] device 1390 left promiscuous mode [ 1406.832141][ T7] device 1391 left promiscuous mode [ 1406.902418][ T7] device 1392 left promiscuous mode [ 1406.962315][ T7] device 1393 left promiscuous mode [ 1407.012513][ T7] device 1394 left promiscuous mode [ 1407.052561][ T7] device 1395 left promiscuous mode [ 1407.112272][ T7] device 1396 left promiscuous mode [ 1407.162411][ T7] device 1397 left promiscuous mode [ 1407.202305][ T7] device 1398 left promiscuous mode [ 1407.252477][ T7] device 1399 left promiscuous mode [ 1407.292445][ T7] device 1400 left promiscuous mode [ 1407.332415][ T7] device 1401 left promiscuous mode [ 1407.392520][ T7] device 1402 left promiscuous mode [ 1407.443433][ T7] device 1403 left promiscuous mode [ 1407.512265][ T7] device 1404 left promiscuous mode [ 1407.572389][ T7] device 1405 left promiscuous mode [ 1407.622462][ T7] device 1406 left promiscuous mode [ 1407.682491][ T7] device 1407 left promiscuous mode [ 1407.742448][ T7] device 1408 left promiscuous mode [ 1407.782530][ T7] device 1409 left promiscuous mode [ 1407.822497][ T7] device 1410 left promiscuous mode [ 1407.892324][ T7] device 1411 left promiscuous mode [ 1407.942585][ T7] device 1412 left promiscuous mode [ 1408.022461][ T7] device 1413 left promiscuous mode [ 1408.092311][ T7] device 1414 left promiscuous mode [ 1408.162647][ T7] device 1415 left promiscuous mode [ 1408.222354][ T7] device 1416 left promiscuous mode [ 1408.262447][ T7] device 1417 left promiscuous mode [ 1408.322211][ T7] device 1418 left promiscuous mode [ 1408.382495][ T7] device 1419 left promiscuous mode [ 1408.442516][ T7] device 1420 left promiscuous mode [ 1408.502571][ T7] device 1421 left promiscuous mode [ 1408.572546][ T7] device 1422 left promiscuous mode [ 1408.612503][ T7] device 1423 left promiscuous mode [ 1408.672513][ T7] device 1424 left promiscuous mode [ 1408.742557][ T7] device 1425 left promiscuous mode [ 1408.792051][ T7] device 1426 left promiscuous mode [ 1408.872277][ T7] device 1427 left promiscuous mode [ 1408.922475][ T7] device 1428 left promiscuous mode [ 1408.992263][ T7] device 1429 left promiscuous mode [ 1409.052317][ T7] device 1430 left promiscuous mode [ 1409.122562][ T7] device 1431 left promiscuous mode [ 1409.162647][ T7] device 1432 left promiscuous mode [ 1409.212539][ T7] device 1433 left promiscuous mode [ 1409.282312][ T7] device 1434 left promiscuous mode [ 1409.322284][ T7] device 1435 left promiscuous mode [ 1409.382532][ T7] device 1436 left promiscuous mode [ 1409.422303][ T7] device 1437 left promiscuous mode [ 1409.482348][ T7] device 1438 left promiscuous mode [ 1409.542625][ T7] device 1439 left promiscuous mode [ 1409.602236][ T7] device 1440 left promiscuous mode [ 1409.662305][ T7] device 1441 left promiscuous mode [ 1409.712422][ T7] device 1442 left promiscuous mode [ 1409.782243][ T7] device 1443 left promiscuous mode [ 1409.862261][ T7] device 1444 left promiscuous mode [ 1409.912444][ T7] device 1445 left promiscuous mode [ 1409.972313][ T7] device 1446 left promiscuous mode [ 1410.042305][ T7] device 1447 left promiscuous mode [ 1410.112278][ T7] device 1448 left promiscuous mode [ 1410.152403][ T7] device 1449 left promiscuous mode [ 1410.212189][ T7] device 1450 left promiscuous mode [ 1410.282656][ T7] device 1451 left promiscuous mode [ 1410.332427][ T7] device 1452 left promiscuous mode [ 1410.392481][ T7] device 1453 left promiscuous mode [ 1410.462278][ T7] device 1454 left promiscuous mode [ 1410.512404][ T7] device 1455 left promiscuous mode [ 1410.552432][ T7] device 1456 left promiscuous mode [ 1410.602168][ T7] device 1457 left promiscuous mode [ 1410.672503][ T7] device 1458 left promiscuous mode [ 1410.732307][ T7] device 1459 left promiscuous mode [ 1410.772524][ T7] device 1460 left promiscuous mode [ 1410.842314][ T7] device 1461 left promiscuous mode [ 1410.902300][ T7] device 1462 left promiscuous mode [ 1410.972399][ T7] device 1463 left promiscuous mode [ 1411.032304][ T7] device 1464 left promiscuous mode [ 1411.082419][ T7] device 1465 left promiscuous mode [ 1411.132143][ T7] device 1466 left promiscuous mode [ 1411.182238][ T7] device 1467 left promiscuous mode [ 1411.242379][ T7] device 1468 left promiscuous mode [ 1411.282249][ T7] device 1469 left promiscuous mode [ 1411.342281][ T7] device 1470 left promiscuous mode [ 1411.402247][ T7] device 1471 left promiscuous mode [ 1411.452606][ T7] device 1472 left promiscuous mode [ 1411.512280][ T7] device 1473 left promiscuous mode [ 1411.562549][ T7] device 1474 left promiscuous mode [ 1411.622677][ T7] device 1475 left promiscuous mode [ 1411.702190][ T7] device 1476 left promiscuous mode [ 1411.772226][ T7] device 1477 left promiscuous mode [ 1411.832278][ T7] device 1478 left promiscuous mode [ 1411.892242][ T7] device 1479 left promiscuous mode [ 1411.952281][ T7] device 1480 left promiscuous mode [ 1412.012260][ T7] device 1481 left promiscuous mode [ 1412.072221][ T7] device 1482 left promiscuous mode [ 1412.142208][ T7] device 1483 left promiscuous mode [ 1412.212848][ T7] device 1484 left promiscuous mode [ 1412.272245][ T7] device 1485 left promiscuous mode [ 1412.332304][ T7] device 1486 left promiscuous mode [ 1412.382478][ T7] device 1487 left promiscuous mode [ 1412.442212][ T7] device 1488 left promiscuous mode [ 1412.512309][ T7] device 1489 left promiscuous mode [ 1412.572312][ T7] device 1490 left promiscuous mode [ 1412.622527][ T7] device 1491 left promiscuous mode [ 1412.662535][ T7] device 1492 left promiscuous mode [ 1412.732365][ T7] device 1493 left promiscuous mode [ 1412.792296][ T7] device 1494 left promiscuous mode [ 1412.852228][ T7] device 1495 left promiscuous mode [ 1412.932236][ T7] device 1496 left promiscuous mode [ 1413.012353][ T7] device 1497 left promiscuous mode [ 1413.072292][ T7] device 1498 left promiscuous mode [ 1413.132881][ T7] device 1499 left promiscuous mode [ 1413.192295][ T7] device 1500 left promiscuous mode [ 1413.252237][ T7] device 1501 left promiscuous mode [ 1413.312221][ T7] device 1502 left promiscuous mode [ 1413.372252][ T7] device 1503 left promiscuous mode [ 1413.452141][ T7] device 1504 left promiscuous mode [ 1413.522428][ T7] device 1505 left promiscuous mode [ 1413.562477][ T7] device 1506 left promiscuous mode [ 1413.612506][ T7] device 1507 left promiscuous mode [ 1413.682267][ T7] device 1508 left promiscuous mode [ 1413.722295][ T7] device 1509 left promiscuous mode [ 1413.782561][ T7] device 1510 left promiscuous mode [ 1413.852441][ T7] device 1511 left promiscuous mode [ 1413.892468][ T7] device 1512 left promiscuous mode [ 1413.962265][ T7] device 1513 left promiscuous mode [ 1414.022283][ T7] device 1514 left promiscuous mode [ 1414.082379][ T7] device 1515 left promiscuous mode [ 1414.132450][ T7] device 1516 left promiscuous mode [ 1414.172543][ T7] device 1517 left promiscuous mode [ 1414.242266][ T7] device 1518 left promiscuous mode [ 1414.312173][ T7] device 1519 left promiscuous mode [ 1414.372222][ T7] device 1520 left promiscuous mode [ 1414.432356][ T7] device 1521 left promiscuous mode [ 1414.472255][ T7] device 1522 left promiscuous mode [ 1414.522411][ T7] device 1523 left promiscuous mode [ 1414.562326][ T7] device 1524 left promiscuous mode [ 1414.622406][ T7] device 1525 left promiscuous mode [ 1414.682223][ T7] device 1526 left promiscuous mode [ 1414.752448][ T7] device 1527 left promiscuous mode [ 1414.822324][ T7] device 1528 left promiscuous mode [ 1414.892447][ T7] device 1529 left promiscuous mode [ 1414.972069][ T7] device 1530 left promiscuous mode [ 1415.032317][ T7] device 1531 left promiscuous mode [ 1415.112263][ T7] device 1532 left promiscuous mode [ 1415.162553][ T7] device 1533 left promiscuous mode [ 1415.202509][ T7] device 1534 left promiscuous mode [ 1415.272360][ T7] device 1535 left promiscuous mode [ 1415.332232][ T7] device 1536 left promiscuous mode [ 1415.412285][ T7] device 1537 left promiscuous mode [ 1415.492235][ T7] device 1538 left promiscuous mode [ 1415.572265][ T7] device 1539 left promiscuous mode [ 1415.632261][ T7] device 1540 left promiscuous mode [ 1415.692217][ T7] device 1541 left promiscuous mode [ 1415.742468][ T7] device 1542 left promiscuous mode [ 1415.802442][ T7] device 1543 left promiscuous mode [ 1415.852484][ T7] device 1544 left promiscuous mode [ 1415.922321][ T7] device 1545 left promiscuous mode [ 1415.982303][ T7] device 1546 left promiscuous mode [ 1416.042301][ T7] device 1547 left promiscuous mode [ 1416.092482][ T7] device 1548 left promiscuous mode [ 1416.142082][ T7] device 1549 left promiscuous mode [ 1416.192452][ T7] device 1550 left promiscuous mode [ 1416.252511][ T7] device 1551 left promiscuous mode [ 1416.292509][ T7] device 1552 left promiscuous mode [ 1416.352348][ T7] device 1553 left promiscuous mode [ 1416.402492][ T7] device 1554 left promiscuous mode [ 1416.463413][ T7] device 1555 left promiscuous mode [ 1416.522209][ T7] device 1556 left promiscuous mode [ 1416.572398][ T7] device 1557 left promiscuous mode [ 1416.622439][ T7] device 1558 left promiscuous mode [ 1416.662493][ T7] device 1559 left promiscuous mode [ 1416.722269][ T7] device 1560 left promiscuous mode [ 1416.782415][ T7] device 1561 left promiscuous mode [ 1416.842425][ T7] device 1562 left promiscuous mode [ 1416.882500][ T7] device 1563 left promiscuous mode [ 1416.922473][ T7] device 1564 left promiscuous mode [ 1416.962521][ T7] device 1565 left promiscuous mode [ 1417.012059][ T7] device 1566 left promiscuous mode [ 1417.072418][ T7] device 1567 left promiscuous mode [ 1417.123408][ T7] device 1568 left promiscuous mode [ 1417.182311][ T7] device 1569 left promiscuous mode [ 1417.232258][ T7] device 1570 left promiscuous mode [ 1417.282447][ T7] device 1571 left promiscuous mode [ 1417.342560][ T7] device 1572 left promiscuous mode [ 1417.412265][ T7] device 1573 left promiscuous mode [ 1417.482228][ T7] device 1574 left promiscuous mode [ 1417.552425][ T7] device 1575 left promiscuous mode [ 1417.612508][ T7] device 1576 left promiscuous mode [ 1417.673418][ T7] device 1577 left promiscuous mode [ 1417.712483][ T7] device 1578 left promiscuous mode [ 1417.772294][ T7] device 1579 left promiscuous mode [ 1417.832296][ T7] device 1580 left promiscuous mode [ 1417.882459][ T7] device 1581 left promiscuous mode [ 1417.922445][ T7] device 1582 left promiscuous mode [ 1417.992277][ T7] device 1583 left promiscuous mode [ 1418.052240][ T7] device 1584 left promiscuous mode [ 1418.112256][ T7] device 1585 left promiscuous mode [ 1418.172253][ T7] device 1586 left promiscuous mode [ 1418.232336][ T7] device 1587 left promiscuous mode [ 1418.302157][ T7] device 1588 left promiscuous mode [ 1418.362208][ T7] device 1589 left promiscuous mode [ 1418.422571][ T7] device 1590 left promiscuous mode [ 1418.472407][ T7] device 1591 left promiscuous mode [ 1418.522277][ T7] device 1592 left promiscuous mode [ 1418.572342][ T7] device 1593 left promiscuous mode [ 1418.612357][ T7] device 1594 left promiscuous mode [ 1418.652474][ T7] device 1595 left promiscuous mode [ 1418.692498][ T7] device 1596 left promiscuous mode [ 1418.752245][ T7] device 1597 left promiscuous mode [ 1418.792296][ T7] device 1598 left promiscuous mode [ 1418.852298][ T7] device 1599 left promiscuous mode [ 1418.912362][ T7] device 1600 left promiscuous mode [ 1418.982489][ T7] device 1601 left promiscuous mode [ 1419.042483][ T7] device 1602 left promiscuous mode [ 1419.102449][ T7] device 1603 left promiscuous mode [ 1419.162520][ T7] device 1604 left promiscuous mode [ 1419.202459][ T7] device 1605 left promiscuous mode [ 1419.272318][ T7] device 1606 left promiscuous mode [ 1419.322472][ T7] device 1607 left promiscuous mode [ 1419.362367][ T7] device 1608 left promiscuous mode [ 1419.402475][ T7] device 1609 left promiscuous mode [ 1419.442378][ T7] device 1610 left promiscuous mode [ 1419.492259][ T7] device 1611 left promiscuous mode [ 1419.562462][ T7] device 1612 left promiscuous mode [ 1419.622535][ T7] device 1613 left promiscuous mode [ 1419.682291][ T7] device 1614 left promiscuous mode [ 1419.742403][ T7] device 1615 left promiscuous mode [ 1419.812263][ T7] device 1616 left promiscuous mode [ 1419.882420][ T7] device 1617 left promiscuous mode [ 1419.922456][ T7] device 1618 left promiscuous mode [ 1419.962464][ T7] device 1619 left promiscuous mode [ 1420.002447][ T7] device 1620 left promiscuous mode [ 1420.052222][ T7] device 1621 left promiscuous mode [ 1420.102390][ T7] device 1622 left promiscuous mode [ 1420.172205][ T7] device 1623 left promiscuous mode [ 1420.232220][ T7] device 1624 left promiscuous mode [ 1420.282496][ T7] device 1625 left promiscuous mode [ 1420.342666][ T7] device 1626 left promiscuous mode [ 1420.412490][ T7] device 1627 left promiscuous mode [ 1420.462318][ T7] device 1628 left promiscuous mode [ 1420.522349][ T7] device 1629 left promiscuous mode [ 1420.572457][ T7] device 1630 left promiscuous mode [ 1420.612353][ T7] device 1631 left promiscuous mode [ 1420.652394][ T7] device 1632 left promiscuous mode [ 1420.712305][ T7] device 1633 left promiscuous mode [ 1420.762313][ T7] device 1634 left promiscuous mode [ 1420.812482][ T7] device 1635 left promiscuous mode [ 1420.882301][ T7] device 1636 left promiscuous mode [ 1420.942305][ T7] device 1637 left promiscuous mode [ 1421.022319][ T7] device 1638 left promiscuous mode [ 1421.072479][ T7] device 1639 left promiscuous mode [ 1421.142242][ T7] device 1640 left promiscuous mode [ 1421.202320][ T7] device 1641 left promiscuous mode [ 1421.262856][ T7] device 1642 left promiscuous mode [ 1421.332397][ T7] device 1643 left promiscuous mode [ 1421.393546][ T7] device 1644 left promiscuous mode [ 1421.442055][ T7] device 1645 left promiscuous mode [ 1421.492563][ T7] device 1646 left promiscuous mode [ 1421.532522][ T7] device 1647 left promiscuous mode [ 1421.592319][ T7] device 1648 left promiscuous mode [ 1421.652847][ T7] device 1649 left promiscuous mode [ 1421.742180][ T7] device 1650 left promiscuous mode [ 1421.812306][ T7] device 1651 left promiscuous mode [ 1421.872307][ T7] device 1652 left promiscuous mode [ 1421.932301][ T7] device 1653 left promiscuous mode [ 1422.032030][ T7] device 1654 left promiscuous mode [ 1422.082434][ T7] device 1655 left promiscuous mode [ 1422.122353][ T7] device 1656 left promiscuous mode [ 1422.162574][ T7] device 1657 left promiscuous mode [ 1422.222272][ T7] device 1658 left promiscuous mode [ 1422.282405][ T7] device 1659 left promiscuous mode [ 1422.322509][ T7] device 1660 left promiscuous mode [ 1422.362529][ T7] device 1661 left promiscuous mode [ 1422.402494][ T7] device 1662 left promiscuous mode [ 1422.442300][ T7] device 1663 left promiscuous mode [ 1422.492510][ T7] device 1664 left promiscuous mode [ 1422.552595][ T7] device 1665 left promiscuous mode [ 1422.592473][ T7] device 1666 left promiscuous mode [ 1422.632670][ T7] device 1667 left promiscuous mode [ 1422.692063][ T7] device 1668 left promiscuous mode [ 1422.762174][ T7] device 1669 left promiscuous mode [ 1422.822479][ T7] device 1670 left promiscuous mode [ 1422.882209][ T7] device 1671 left promiscuous mode [ 1422.922452][ T7] device 1672 left promiscuous mode [ 1422.963423][ T7] device 1673 left promiscuous mode [ 1423.012081][ T7] device 1674 left promiscuous mode [ 1423.062540][ T7] device 1675 left promiscuous mode [ 1423.102428][ T7] device 1676 left promiscuous mode [ 1423.172380][ T7] device 1677 left promiscuous mode [ 1423.242245][ T7] device 1678 left promiscuous mode [ 1423.312291][ T7] device 1679 left promiscuous mode [ 1423.372259][ T7] device 1680 left promiscuous mode [ 1423.432235][ T7] device 1681 left promiscuous mode [ 1423.482519][ T7] device 1682 left promiscuous mode [ 1423.552314][ T7] device 1683 left promiscuous mode [ 1423.622531][ T7] device 1684 left promiscuous mode [ 1423.662515][ T7] device 1685 left promiscuous mode [ 1423.732451][ T7] device 1686 left promiscuous mode [ 1423.792194][ T7] device 1687 left promiscuous mode [ 1423.852211][ T7] device 1688 left promiscuous mode [ 1423.932372][ T7] device 1689 left promiscuous mode [ 1423.992242][ T7] device 1690 left promiscuous mode [ 1424.062403][ T7] device 1691 left promiscuous mode [ 1424.132238][ T7] device 1692 left promiscuous mode [ 1424.212073][ T7] device 1693 left promiscuous mode [ 1424.272224][ T7] device 1694 left promiscuous mode [ 1424.332211][ T7] device 1695 left promiscuous mode [ 1424.392218][ T7] device 1696 left promiscuous mode [ 1424.472201][ T7] device 1697 left promiscuous mode [ 1424.542425][ T7] device 1698 left promiscuous mode [ 1424.602381][ T7] device 1699 left promiscuous mode [ 1424.652425][ T7] device 1700 left promiscuous mode [ 1424.692472][ T7] device 1701 left promiscuous mode [ 1424.752502][ T7] device 1702 left promiscuous mode [ 1424.792487][ T7] device 1703 left promiscuous mode [ 1424.832618][ T7] device 1704 left promiscuous mode [ 1424.892218][ T7] device 1705 left promiscuous mode [ 1424.952252][ T7] device 1706 left promiscuous mode [ 1425.002239][ T7] device 1707 left promiscuous mode [ 1425.052579][ T7] device 1708 left promiscuous mode [ 1425.112489][ T7] device 1709 left promiscuous mode [ 1425.162523][ T7] device 1710 left promiscuous mode [ 1425.222418][ T7] device 1711 left promiscuous mode [ 1425.282462][ T7] device 1712 left promiscuous mode [ 1425.342423][ T7] device 1713 left promiscuous mode [ 1425.402956][ T7] device 1714 left promiscuous mode [ 1425.462541][ T7] device 1715 left promiscuous mode [ 1425.532387][ T7] device 1716 left promiscuous mode [ 1425.592272][ T7] device 1717 left promiscuous mode [ 1425.652246][ T7] device 1718 left promiscuous mode [ 1425.732244][ T7] device 1719 left promiscuous mode [ 1425.812161][ T7] device 1720 left promiscuous mode [ 1425.872206][ T7] device 1721 left promiscuous mode [ 1425.952203][ T7] device 1722 left promiscuous mode [ 1426.012203][ T7] device 1723 left promiscuous mode [ 1426.082447][ T7] device 1724 left promiscuous mode [ 1426.152189][ T7] device 1725 left promiscuous mode [ 1426.222445][ T7] device 1726 left promiscuous mode [ 1426.262603][ T7] device 1727 left promiscuous mode [ 1426.332293][ T7] device 1728 left promiscuous mode [ 1426.392283][ T7] device 1729 left promiscuous mode [ 1426.462439][ T7] device 1730 left promiscuous mode [ 1426.522378][ T7] device 1731 left promiscuous mode [ 1426.562323][ T7] device 1732 left promiscuous mode [ 1426.612442][ T7] device 1733 left promiscuous mode [ 1426.652501][ T7] device 1734 left promiscuous mode [ 1426.722231][ T7] device 1735 left promiscuous mode [ 1426.772381][ T7] device 1736 left promiscuous mode [ 1426.842224][ T7] device 1737 left promiscuous mode [ 1426.912373][ T7] device 1738 left promiscuous mode [ 1426.952272][ T7] device 1739 left promiscuous mode [ 1427.002537][ T7] device 1740 left promiscuous mode [ 1427.062522][ T7] device 1741 left promiscuous mode [ 1427.102613][ T7] device 1742 left promiscuous mode [ 1427.172250][ T7] device 1743 left promiscuous mode [ 1427.242383][ T7] device 1744 left promiscuous mode [ 1427.292968][ T7] device 1745 left promiscuous mode [ 1427.342068][ T7] device 1746 left promiscuous mode [ 1427.392552][ T7] device 1747 left promiscuous mode [ 1427.432463][ T7] device 1748 left promiscuous mode [ 1427.472469][ T7] device 1749 left promiscuous mode [ 1427.532236][ T7] device 1750 left promiscuous mode [ 1427.582418][ T7] device 1751 left promiscuous mode [ 1427.622486][ T7] device 1752 left promiscuous mode [ 1427.662532][ T7] device 1753 left promiscuous mode [ 1427.732273][ T7] device 1754 left promiscuous mode [ 1427.792303][ T7] device 1755 left promiscuous mode [ 1427.852277][ T7] device 1756 left promiscuous mode [ 1427.902419][ T7] device 1757 left promiscuous mode [ 1427.952111][ T7] device 1758 left promiscuous mode [ 1428.002462][ T7] device 1759 left promiscuous mode [ 1428.042477][ T7] device 1760 left promiscuous mode [ 1428.102568][ T7] device 1761 left promiscuous mode [ 1428.162462][ T7] device 1762 left promiscuous mode [ 1428.232327][ T7] device 1763 left promiscuous mode [ 1428.292290][ T7] device 1764 left promiscuous mode [ 1428.352250][ T7] device 1765 left promiscuous mode [ 1428.412291][ T7] device 1766 left promiscuous mode [ 1428.462907][ T7] device 1767 left promiscuous mode [ 1428.522565][ T7] device 1768 left promiscuous mode [ 1428.583742][ T7] device 1769 left promiscuous mode [ 1428.662245][ T7] device 1770 left promiscuous mode [ 1428.742067][ T7] device 1771 left promiscuous mode [ 1428.822516][ T7] device 1772 left promiscuous mode [ 1428.862329][ T7] device 1773 left promiscuous mode [ 1428.942303][ T7] device 1774 left promiscuous mode [ 1429.002308][ T7] device 1775 left promiscuous mode [ 1429.052496][ T7] device 1776 left promiscuous mode [ 1429.122545][ T7] device 1777 left promiscuous mode [ 1429.162536][ T7] device 1778 left promiscuous mode [ 1429.202518][ T7] device 1779 left promiscuous mode [ 1429.262504][ T7] device 1780 left promiscuous mode [ 1429.312471][ T7] device 1781 left promiscuous mode [ 1429.372955][ T7] device 1782 left promiscuous mode [ 1429.422049][ T7] device 1783 left promiscuous mode [ 1429.472530][ T7] device 1784 left promiscuous mode [ 1429.512520][ T7] device 1785 left promiscuous mode [ 1429.562487][ T7] device 1786 left promiscuous mode [ 1429.632843][ T7] device 1787 left promiscuous mode [ 1429.692273][ T7] device 1788 left promiscuous mode [ 1429.752229][ T7] device 1789 left promiscuous mode [ 1429.812193][ T7] device 1790 left promiscuous mode [ 1429.892239][ T7] device 1791 left promiscuous mode [ 1429.972335][ T7] device 1792 left promiscuous mode [ 1430.022509][ T7] device 1793 left promiscuous mode [ 1430.062460][ T7] device 1794 left promiscuous mode [ 1430.132165][ T7] device 1795 left promiscuous mode [ 1430.192285][ T7] device 1796 left promiscuous mode [ 1430.272187][ T7] device 1797 left promiscuous mode [ 1430.332254][ T7] device 1798 left promiscuous mode [ 1430.432057][ T7] device 1799 left promiscuous mode [ 1430.504176][ T7] device 1800 left promiscuous mode [ 1430.562184][ T7] device 1801 left promiscuous mode [ 1430.602387][ T7] device 1802 left promiscuous mode [ 1430.642463][ T7] device 1803 left promiscuous mode [ 1430.712319][ T7] device 1804 left promiscuous mode [ 1430.772307][ T7] device 1805 left promiscuous mode [ 1430.832451][ T7] device 1806 left promiscuous mode [ 1430.892265][ T7] device 1807 left promiscuous mode [ 1430.952230][ T7] device 1808 left promiscuous mode [ 1431.012251][ T7] device 1809 left promiscuous mode [ 1431.092197][ T7] device 1810 left promiscuous mode [ 1431.162346][ T7] device 1811 left promiscuous mode [ 1431.202485][ T7] device 1812 left promiscuous mode [ 1431.242354][ T7] device 1813 left promiscuous mode [ 1431.282465][ T7] device 1814 left promiscuous mode [ 1431.322334][ T7] device 1815 left promiscuous mode [ 1431.392241][ T7] device 1816 left promiscuous mode [ 1431.462351][ T7] device 1817 left promiscuous mode [ 1431.512670][ T7] device 1818 left promiscuous mode [ 1431.562250][ T7] device 1819 left promiscuous mode [ 1431.632221][ T7] device 1820 left promiscuous mode [ 1431.692401][ T7] device 1821 left promiscuous mode [ 1431.732422][ T7] device 1822 left promiscuous mode [ 1431.802239][ T7] device 1823 left promiscuous mode [ 1431.862386][ T7] device 1824 left promiscuous mode [ 1431.922324][ T7] device 1825 left promiscuous mode [ 1431.972431][ T7] device 1826 left promiscuous mode [ 1432.032590][ T7] device 1827 left promiscuous mode [ 1432.092502][ T7] device 1828 left promiscuous mode [ 1432.152550][ T7] device 1829 left promiscuous mode [ 1432.212552][ T7] device 1830 left promiscuous mode [ 1432.252507][ T7] device 1831 left promiscuous mode [ 1432.292520][ T7] device 1832 left promiscuous mode [ 1432.333430][ T7] device 1833 left promiscuous mode [ 1432.392259][ T7] device 1834 left promiscuous mode [ 1432.462258][ T7] device 1835 left promiscuous mode [ 1432.512538][ T7] device 1836 left promiscuous mode [ 1432.572269][ T7] device 1837 left promiscuous mode [ 1432.622304][ T7] device 1838 left promiscuous mode [ 1432.672363][ T7] device 1839 left promiscuous mode [ 1432.742415][ T7] device 1840 left promiscuous mode [ 1432.792475][ T7] device 1841 left promiscuous mode [ 1432.842255][ T7] device 1842 left promiscuous mode [ 1432.902250][ T7] device 1843 left promiscuous mode [ 1432.982457][ T7] device 1844 left promiscuous mode [ 1433.032417][ T7] device 1845 left promiscuous mode [ 1433.072514][ T7] device 1846 left promiscuous mode [ 1433.112437][ T7] device 1847 left promiscuous mode [ 1433.162282][ T7] device 1848 left promiscuous mode [ 1433.212447][ T7] device 1849 left promiscuous mode [ 1433.272508][ T7] device 1850 left promiscuous mode [ 1433.322285][ T7] device 1851 left promiscuous mode [ 1433.372483][ T7] device 1852 left promiscuous mode [ 1433.412404][ T7] device 1853 left promiscuous mode [ 1433.618201][T21680] device 2672 entered promiscuous mode [ 1433.633062][T21681] device 1534 entered promiscuous mode [ 1433.659045][T21687] device 2673 entered promiscuous mode [ 1433.863622][T21695] device 2248 entered promiscuous mode [ 1433.895191][T21699] device 2249 entered promiscuous mode [ 1433.989905][T21704] device 2250 entered promiscuous mode 15:25:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r4, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) 15:25:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r2, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r4 = gettid() write$cgroup_pid(r3, &(0x7f00000005c0)=r4, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r4, r0, 0x0, 0x6, &(0x7f0000000140)='wlan1\x00'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f00000002c0)=0x4cfb) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r6, 0x400454de, &(0x7f0000000100)) gettid() r7 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xb7) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000380)={[{0x2b, 'memory'}, {0x7d, 'memory'}, {0x10, 'io'}, {0x2d, 'memory'}]}, 0x1c) r9 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:25:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x4, 0xd3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r3 = gettid() write$cgroup_pid(r2, &(0x7f00000005c0)=r3, 0x12) r4 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, r3, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 15:25:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x200}, r2, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/316], 0x0, 0x33}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) [ 1434.034341][T21703] device 1793 entered promiscuous mode [ 1434.373817][T21706] device 1794 entered promiscuous mode 15:25:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000980)='cgr\x84`\x9ezoup.prmx\x17\n\xfb\xcf;\x815[n\xa9{m\xaeq\xa5\xbb\xdcb\x06\x1bH\x03\x00\xf4\xb58\x99A\x9bt{Y.\xb1\x0f\x9d\xb2\x8a\xc8\xfc\xf3\x9c\xa1\xb7\xdew\x03\xc4\x04G\x8f\xbcHp\xea(\x90`\x13m\xd9\xcf\x84\xae\xf3\x04\r\xaf\x9c\xce\x1e\x04t\xf3\xc9\xa3\xd2J&\aL)1\xf2\xc7\x8f9\x1eS\xfd\xb5\x91\xbc\xc1\x1b\xda\x12O\xd1\xdaz\x05@pl\xb6T\xc0 \xfe\f\xd6\xc6N\xbf\xca\x04\xe9\xca|\x83\xaa`T\xa5\xc7}\xd1s\xaf2\xf3+\x18\x9d\x95\x01\x10\x942\x8bV\xf9[z\xc7\x98\x9f\x0e\x91\xaf=98^P', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={r4, 0x7, 0x10}, 0xc) gettid() r5 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x1c, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0xc, 0x0, 0x6, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r6 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 15:25:46 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r3 = gettid() r4 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r1, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000240)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r6) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000002c0)=0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r7 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r8 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r9 = gettid() write$cgroup_pid(r8, &(0x7f00000005c0)=r9, 0x12) r10 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r10) r11 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r11) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x2d, 'rdma'}]}, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r3, r11, 0x0, 0x1, &(0x7f0000000080)='\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r9, r10, 0x0, 0xd, &(0x7f0000000040)='cgroup.procs\x00', r12}, 0x30) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15:25:46 executing program 2: perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/316], 0x0, 0x33}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) 15:25:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x860, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200), 0xc}, 0x200, 0x530, 0x8, 0x9, 0x6, 0x7fffffff, 0x400}, r2, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r5 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x0, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000003c0)='memory.events\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836009be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/316], 0x0, 0x33}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000440)=ANY=[], @ANYRES64], 0xfffffffffffffffe) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001a80)={r1, r4, 0x12, 0x3}, 0x10) 15:25:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 15:25:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 15:25:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r2 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000005c0)=ANY=[@ANYBLOB="080000000000000000000000000000008000000000000000000000000000190000000000000000009c67e76af9e01e5901b3fc27b2144307eee4f384689a28c656b8772a8790c96ce72851187b16d191c2a93ffeb8f3109197ad0f4abea34b1995c4d4eb4f882b1e9f4c5fa21691acc4d4d5fb2421b6afabeda6e169dad22a7ca6f81797b425513eeef4678219f6cad8cbaff9fecf93675063fba1b58ae0beccfa3fd492f580d0cd07c5913cc21ce8a80f07c3080c811692603a28d86ddb168b8bb55d320cfb1b1a"]) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x9, 0x0, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x4400, 0x7fff, 0x80000000, 0x0, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) 15:25:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r2, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r5, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r5, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r6}, 0x10) r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', r7}, 0x10) r8 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r8, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x2400, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r9, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r9, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r10 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x2400, 0x0) r11 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r11) r12 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r12, 0xc008240a, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x2400, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r13, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r13, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) r14 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r14) write$cgroup_subtree(r2, &(0x7f0000000880)=ANY=[@ANYPTR64, @ANYRES16, @ANYRES32=r4, @ANYRESHEX=r5, @ANYPTR64=&(0x7f0000000680)=ANY=[], @ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB, @ANYRESDEC=r8, @ANYRESDEC=r6, @ANYPTR=&(0x7f0000000780)=ANY=[@ANYRES64=r9, @ANYRESHEX=r10, @ANYRESDEC, @ANYPTR, @ANYRES64=r7, @ANYPTR, @ANYRES64=r11, @ANYRES16=0x0, @ANYRESHEX=r12], @ANYRESOCT=r14], @ANYRES64=0x0, @ANYRESHEX=r13], 0x4a) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000580)='cgroup.procs\x00', 0x2, 0x0) gettid() r15 = perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x20, 0x0, 0xff, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x200, 0x530, 0x8, 0x0, 0x6, 0x7fffffff, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x8) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000280)=0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r15, 0xc008240a, &(0x7f0000000240)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r16 = perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x9, 0x5, 0x5, 0x0, 0x3, 0x41000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x4400, 0x7fff, 0x80000000, 0x8, 0xff, 0x5, 0x1eaf}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r16, 0x40082406, 0x0) r17 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r17, &(0x7f0000000080), 0x297ef) sendmsg$tipc(r17, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000d80)="4bc4b216b7eb069aaa67cf17e5363db942d3c622d5be3c81c969ea14b76b6ca9f44093c3127bc2267abe8cba19c833fcc00af58f3dc874ddae69f47c6c8142b6adc3bf3b9446cbe5701779a22f4dc2df9c7b5b8b4d592fa95eca220c76", 0x5d}, {&(0x7f0000000e00)="f9517cdd3c3e33fcac6a2339511914888587b33c159dd0accd415eb8e71b3f809a748ff1457d038c947235e5b06bf242e7192663ef2195c9fdb7bfcd7840c8037f5207908e6441d2e0b1571da1efc5a184ade732b56b1b0ded9bfd3b75f96da725cd64d53c58d38e5678379e9c3679b5f04099a84b20554de1569fcbded5afaf669f079fa5d0be7975b3cac52502b51162aa7a9e183cce40327ab11a881b6afa2f624b38f6fabe6d64380db92fb997ffbaaa0dc80c5b9aef3b87424be01f330b49", 0xc1}, {&(0x7f0000000f00)="ea937a6d8279b1981fc5c422b6469cd134ff5444ad275a66846432c0588f2374accee0f80183af68e412042fbbd65f44a02c06aaaba625f4905422d92ebf4453dd35295a8de0ffc3f4f2f1b8832f49b4996cfcf2cfc4ac09", 0x58}], 0x3, &(0x7f0000000fc0)="517d3bd66c80abba0a71b144b4", 0xd, 0x80}, 0x48080) recvmsg(r17, &(0x7f00000003c0)={&(0x7f00000004c0)=@caif=@rfm, 0x80, &(0x7f0000000280), 0x0, &(0x7f00000005c0)=""/89, 0x59}, 0x2000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000003000000010000000100000f00000010ac4e00000000000001000000005f00a6ed59a8c2d2856e55669550d36bd0b0f71cb179b62f103ef8752670081fbcc7d89ffdd32ea1b58e47d20c1e25471d79bf90fb66281eba6ef9913d4b2eab62a025b7338c9b4fd52b6e500b078e9e1145cb9115d606ffbb17058f1d88c188c573b7ccce651a7269b13c4a4a7f359019bca70756de84cb31388901aca07a7bc07ee5948ece1acf6790a3bcd219e9a8a28f234836129be93758f4c049cd8f3a87824e71d588fb1e325d0dff1212ee50af1e12ce79982a5399edcd9cec7fae883fc833dce1bc7e982f7fadf401fced6414d9e84f595cc83d925f82a6eafdbfce5c7f43fceb683693fcda9249eaa028a865b06ae59c3de0f16082ce3900"/314], 0x0, 0x13a}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0012000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 1435.550204][T21793] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1435.651955][T21793] CPU: 0 PID: 21793 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 1435.659534][T21793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1435.669582][T21793] Call Trace: [ 1435.672882][T21793] dump_stack+0x172/0x1f0 [ 1435.677221][T21793] dump_header+0x10b/0x82d [ 1435.681635][T21793] ? oom_kill_process+0x94/0x3f0 [ 1435.686578][T21793] oom_kill_process.cold+0x10/0x15 [ 1435.691688][T21793] out_of_memory+0x334/0x1340 [ 1435.696366][T21793] ? lock_downgrade+0x920/0x920 [ 1435.701237][T21793] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 1435.707056][T21793] ? oom_killer_disable+0x280/0x280 [ 1435.712267][T21793] mem_cgroup_out_of_memory+0x1d8/0x240 [ 1435.717832][T21793] ? memcg_stat_show+0xc40/0xc40 [ 1435.722787][T21793] ? do_raw_spin_unlock+0x57/0x270 [ 1435.727909][T21793] ? _raw_spin_unlock+0x2d/0x50 [ 1435.732776][T21793] try_charge+0xf4b/0x1440 [ 1435.737213][T21793] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1435.742767][T21793] ? percpu_ref_tryget_live+0x111/0x290 [ 1435.748322][T21793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1435.754600][T21793] ? __kasan_check_read+0x11/0x20 [ 1435.759670][T21793] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1435.765232][T21793] mem_cgroup_try_charge+0x136/0x590 [ 1435.770531][T21793] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1435.776176][T21793] __handle_mm_fault+0x1f0d/0x4040 [ 1435.781308][T21793] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1435.786869][T21793] ? handle_mm_fault+0x292/0xaa0 [ 1435.791827][T21793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1435.798055][T21793] ? __kasan_check_read+0x11/0x20 [ 1435.803087][T21793] handle_mm_fault+0x3b7/0xaa0 [ 1435.807851][T21793] __do_page_fault+0x536/0xdd0 [ 1435.812612][T21793] do_page_fault+0x38/0x590 [ 1435.817111][T21793] page_fault+0x39/0x40 [ 1435.821245][T21793] RIP: 0033:0x41139f [ 1435.825120][T21793] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 1435.844705][T21793] RSP: 002b:00007fffddce2940 EFLAGS: 00010206 [ 1435.850758][T21793] RAX: 00007f6948c0e000 RBX: 0000000000020000 RCX: 0000000000459aaa [ 1435.858720][T21793] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 1435.866686][T21793] RBP: 00007fffddce2a20 R08: ffffffffffffffff R09: 0000000000000000 [ 1435.874664][T21793] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fffddce2b10 [ 1435.882617][T21793] R13: 00007f6948c2e700 R14: 0000000000000001 R15: 000000000075bfd4 [ 1435.892095][T21793] memory: usage 5236kB, limit 0kB, failcnt 83 [ 1435.898217][T21793] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1435.905189][T21793] Memory cgroup stats for /syz5: [ 1435.905291][T21793] anon 2097152 [ 1435.905291][T21793] file 49152 [ 1435.905291][T21793] kernel_stack 65536 [ 1435.905291][T21793] slab 3006464 [ 1435.905291][T21793] sock 0 [ 1435.905291][T21793] shmem 0 [ 1435.905291][T21793] file_mapped 0 [ 1435.905291][T21793] file_dirty 135168 [ 1435.905291][T21793] file_writeback 0 [ 1435.905291][T21793] anon_thp 2097152 [ 1435.905291][T21793] inactive_anon 0 [ 1435.905291][T21793] active_anon 2097152 [ 1435.905291][T21793] inactive_file 65536 [ 1435.905291][T21793] active_file 135168 [ 1435.905291][T21793] unevictable 0 [ 1435.905291][T21793] slab_reclaimable 1351680 [ 1435.905291][T21793] slab_unreclaimable 1654784 [ 1435.905291][T21793] pgfault 171039 [ 1435.905291][T21793] pgmajfault 0 [ 1435.905291][T21793] workingset_refault 0 [ 1435.905291][T21793] workingset_activate 0 [ 1435.905291][T21793] workingset_nodereclaim 0 [ 1435.905291][T21793] pgrefill 66 [ 1435.905291][T21793] pgscan 3435 [ 1435.905291][T21793] pgsteal 3319 [ 1435.905291][T21793] pgactivate 66 [ 1435.910255][T21793] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=21793,uid=0 [ 1436.025331][T21793] Memory cgroup out of memory: Killed process 21793 (syz-executor.5) total-vm:72704kB, anon-rss:2148kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 1436.052675][ T1065] oom_reaper: reaped process 21793 (syz-executor.5), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB [ 1436.087278][T21800] IPVS: ftp: loaded support on port[0] = 21 [ 1436.155712][T21802] IPVS: ftp: loaded support on port[0] = 21 [ 1436.379812][T21805] IPVS: ftp: loaded support on port[0] = 21 [ 1436.592925][T21800] chnl_net:caif_netlink_parms(): no params data found [ 1436.695493][ T7] device bridge_slave_1 left promiscuous mode [ 1436.701805][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1436.753240][ T7] device bridge_slave_0 left promiscuous mode [ 1436.759498][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1438.732290][ T7] device hsr_slave_0 left promiscuous mode [ 1438.772021][ T7] device hsr_slave_1 left promiscuous mode [ 1438.827671][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1438.844151][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1438.860256][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1438.889715][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1438.990339][ T7] bond0 (unregistering): Released all slaves [ 1439.143293][T21809] IPVS: ftp: loaded support on port[0] = 21 [ 1439.159530][T21802] chnl_net:caif_netlink_parms(): no params data found [ 1439.254713][T21800] bridge0: port 1(bridge_slave_0) entered blocking state [ 1439.266703][T21800] bridge0: port 1(bridge_slave_0) entered disabled state [ 1439.278556][T21800] device bridge_slave_0 entered promiscuous mode [ 1439.294059][T21800] bridge0: port 2(bridge_slave_1) entered blocking state [ 1439.301117][T21800] bridge0: port 2(bridge_slave_1) entered disabled state [ 1439.313137][T21800] device bridge_slave_1 entered promiscuous mode [ 1439.399506][T21805] chnl_net:caif_netlink_parms(): no params data found [ 1439.413723][T21802] bridge0: port 1(bridge_slave_0) entered blocking state [ 1439.420793][T21802] bridge0: port 1(bridge_slave_0) entered disabled state [ 1439.433743][T21802] device bridge_slave_0 entered promiscuous mode [ 1439.447891][T21802] bridge0: port 2(bridge_slave_1) entered blocking state [ 1439.455356][T21802] bridge0: port 2(bridge_slave_1) entered disabled state [ 1439.466860][T21802] device bridge_slave_1 entered promiscuous mode [ 1439.481325][T21800] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1439.498409][T21800] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1439.661663][T21802] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1439.711193][T21800] team0: Port device team_slave_0 added [ 1439.729892][T21802] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1439.776543][T21805] bridge0: port 1(bridge_slave_0) entered blocking state [ 1439.784041][T21805] bridge0: port 1(bridge_slave_0) entered disabled state [ 1439.796283][T21805] device bridge_slave_0 entered promiscuous mode [ 1439.811519][T21800] team0: Port device team_slave_1 added [ 1439.830765][T21805] bridge0: port 2(bridge_slave_1) entered blocking state [ 1439.849397][T21805] bridge0: port 2(bridge_slave_1) entered disabled state [ 1439.875643][T21805] device bridge_slave_1 entered promiscuous mode [ 1439.918698][T21802] team0: Port device team_slave_0 added [ 1439.958982][T21802] team0: Port device team_slave_1 added [ 1440.038637][T21805] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1440.087541][T21805] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1440.219372][T21800] device hsr_slave_0 entered promiscuous mode [ 1440.274782][T21800] device hsr_slave_1 entered promiscuous mode [ 1440.311915][T21800] debugfs: Directory 'hsr0' with parent '/' already present! [ 1440.384706][T21805] team0: Port device team_slave_0 added [ 1440.450120][T21805] team0: Port device team_slave_1 added [ 1440.549569][T21802] device hsr_slave_0 entered promiscuous mode [ 1440.614734][T21802] device hsr_slave_1 entered promiscuous mode [ 1440.662077][T21802] debugfs: Directory 'hsr0' with parent '/' already present! [ 1440.694967][T21809] chnl_net:caif_netlink_parms(): no params data found [ 1440.808347][T21805] device hsr_slave_0 entered promiscuous mode [ 1440.854844][T21805] device hsr_slave_1 entered promiscuous mode [ 1440.891890][T21805] debugfs: Directory 'hsr0' with parent '/' already present! [ 1440.939182][T21809] bridge0: port 1(bridge_slave_0) entered blocking state [ 1440.946671][T21809] bridge0: port 1(bridge_slave_0) entered disabled state [ 1440.959312][T21809] device bridge_slave_0 entered promiscuous mode [ 1440.970520][T21809] bridge0: port 2(bridge_slave_1) entered blocking state [ 1440.977721][T21809] bridge0: port 2(bridge_slave_1) entered disabled state [ 1440.989496][T21809] device bridge_slave_1 entered promiscuous mode [ 1441.109936][T21809] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1441.165669][T21809] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1441.256750][T21809] team0: Port device team_slave_0 added [ 1441.268308][T21809] team0: Port device team_slave_1 added [ 1441.397515][T21809] device hsr_slave_0 entered promiscuous mode [ 1441.454785][T21809] device hsr_slave_1 entered promiscuous mode [ 1441.502135][T21809] debugfs: Directory 'hsr0' with parent '/' already present! [ 1441.542370][T21802] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1441.629498][T21800] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1441.651027][T21805] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1441.660508][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1441.670291][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1441.686330][T21802] 8021q: adding VLAN 0 to HW filter on device team0 [ 1441.713847][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1441.723845][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1441.733781][ T8767] bridge0: port 1(bridge_slave_0) entered blocking state [ 1441.740850][ T8767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1441.750081][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1441.779213][T21671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1441.788574][T21671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1441.798295][T21671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1441.809079][T21671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1441.817729][T21671] bridge0: port 2(bridge_slave_1) entered blocking state [ 1441.824842][T21671] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1441.834194][T21671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1441.843454][T21671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1441.863243][T21805] 8021q: adding VLAN 0 to HW filter on device team0 [ 1441.883030][ T7] device 0 left promiscuous mode [ 1441.898044][T21800] 8021q: adding VLAN 0 to HW filter on device team0 [ 1441.914356][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1441.926044][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1441.946601][T21671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1441.962835][T21671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1441.971232][T21671] bridge0: port 1(bridge_slave_0) entered blocking state [ 1441.978332][T21671] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1441.988048][ T7] device 1 left promiscuous mode [ 1442.023855][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1442.033492][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1442.043699][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1442.052334][ T4819] bridge0: port 1(bridge_slave_0) entered blocking state [ 1442.059386][ T4819] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1442.069078][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1442.080089][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1442.090036][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1442.099919][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1442.108787][ T4819] bridge0: port 2(bridge_slave_1) entered blocking state [ 1442.115889][ T4819] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1442.125229][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1442.134634][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1442.154022][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1442.165799][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1442.176267][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1442.186642][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1442.195663][ T4819] bridge0: port 2(bridge_slave_1) entered blocking state [ 1442.202792][ T4819] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1442.217184][ T7] device 2 left promiscuous mode [ 1442.249758][T21802] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1442.260196][T21802] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1442.297354][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1442.307710][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1442.318939][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1442.330121][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1442.339911][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1442.350257][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1442.375751][T21802] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1442.389835][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1442.414179][ T7] device 3 left promiscuous mode [ 1442.438281][T21809] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1442.446806][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1442.458152][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1442.470032][ T7] device 4 left promiscuous mode [ 1442.497270][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1442.521353][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1442.532551][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1442.543911][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1442.554376][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1442.565379][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1442.592316][ T7] device 5 left promiscuous mode [ 1442.609882][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1442.622567][ T8767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1442.637030][ T7] device 6 left promiscuous mode [ 1442.666665][T21805] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1442.677907][T21805] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1442.705923][T21745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1442.730719][T21745] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1442.742337][T21745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1442.752637][T21745] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1442.763582][T21745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1442.775401][T21745] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1442.785580][T21745] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1442.795863][ T7] device 7 left promiscuous mode [ 1442.829490][T21809] 8021q: adding VLAN 0 to HW filter on device team0 [ 1442.863306][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1442.878008][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1442.888030][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1442.898367][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1442.919400][T21820] validate_nla: 14 callbacks suppressed [ 1442.919453][T21820] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1442.948094][ T7] device 8 left promiscuous mode [ 1442.957928][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1442.965837][T21821] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1442.969192][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1442.985715][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1442.996247][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1443.005224][ T4819] bridge0: port 1(bridge_slave_0) entered blocking state [ 1443.012367][ T4819] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1443.012724][T21822] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 1443.022207][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1443.039230][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1443.047863][ T4819] bridge0: port 2(bridge_slave_1) entered blocking state [ 1443.054980][ T4819] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1443.064363][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1443.076056][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1443.087784][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1443.099112][ T4819] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1443.115290][T21800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1443.126572][ T7] device 9 left promiscuous mode [ 1443.142909][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1443.152299][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1443.161437][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1443.172890][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1443.191566][T21805] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1443.222413][T21671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1443.233160][T21671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1443.244637][T21671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1443.261174][T21671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1443.271092][ T7] device 10 left promiscuous mode [ 1443.285135][T21800] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1443.299579][T21809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1443.337853][ T7] device 11 left promiscuous mode [ 1443.383020][T21809] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1443.404957][ T7] device 12 left promiscuous mode [ 1443.491081][ T7] device 13 left promiscuous mode [ 1443.562950][ T7] device 14 left promiscuous mode [ 1443.596770][T21836] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1443.640787][ T7] device 15 left promiscuous mode [ 1443.675677][T21844] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1443.692256][ T7] device 16 left promiscuous mode [ 1443.711246][T21842] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 1443.722788][T21847] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 1443.761379][T21849] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 1443.772316][ T7] device 17 left promiscuous mode [ 1443.807472][T21851] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 1443.823304][ T7] device 18 left promiscuous mode [ 1443.875642][ T7] device 19 left promiscuous mode [ 1443.922661][ T7] device 20 left promiscuous mode [ 1443.962466][ T7] device 21 left promiscuous mode [ 1444.023345][ T7] device 22 left promiscuous mode [ 1444.072147][ T7] device 23 left promiscuous mode [ 1444.122563][ T7] device 24 left promiscuous mode [ 1444.182756][ T7] device 25 left promiscuous mode [ 1444.242223][ T7] device 26 left promiscuous mode [ 1444.302076][ T7] device 27 left promiscuous mode [ 1444.352377][ T7] device 28 left promiscuous mode [ 1444.392608][ T7] device 29 left promiscuous mode [ 1444.452171][ T7] device 30 left promiscuous mode [ 1444.502226][ T7] device 31 left promiscuous mode [ 1444.561999][ T7] device 32 left promiscuous mode [ 1444.602247][ T7] device 33 left promiscuous mode [ 1444.652436][ T7] device 34 left promiscuous mode [ 1444.713483][ T7] device 35 left promiscuous mode [ 1444.772506][ T7] device 36 left promiscuous mode [ 1444.832118][ T7] device 37 left promiscuous mode [ 1444.873710][ T7] device 38 left promiscuous mode [ 1444.942273][ T7] device 39 left promiscuous mode [ 1445.002284][ T7] device 40 left promiscuous mode [ 1445.042225][ T7] device 41 left promiscuous mode [ 1445.082457][ T7] device 42 left promiscuous mode [ 1445.122554][ T7] device 43 left promiscuous mode [ 1445.162368][ T7] device 44 left promiscuous mode [ 1445.233140][ T7] device 45 left promiscuous mode [ 1445.282117][ T7] device 46 left promiscuous mode [ 1445.332360][ T7] device 47 left promiscuous mode [ 1445.392224][ T7] device 48 left promiscuous mode [ 1445.442676][ T7] device 49 left promiscuous mode [ 1445.492178][ T7] device 50 left promiscuous mode [ 1445.532202][ T7] device 51 left promiscuous mode [ 1445.582391][ T7] device 52 left promiscuous mode [ 1445.632078][ T7] device 53 left promiscuous mode [ 1445.682219][ T7] device 54 left promiscuous mode [ 1445.742093][ T7] device 55 left promiscuous mode [ 1445.802235][ T7] device 56 left promiscuous mode [ 1445.862290][ T7] device 57 left promiscuous mode [ 1445.942074][ T7] device 58 left promiscuous mode [ 1446.002302][ T7] device 59 left promiscuous mode [ 1446.062163][ T7] device 60 left promiscuous mode [ 1446.122407][ T7] device 61 left promiscuous mode [ 1446.172228][ T7] device 62 left promiscuous mode [ 1446.212366][ T7] device 63 left promiscuous mode [ 1446.262437][ T7] device 64 left promiscuous mode [ 1446.302499][ T7] device 65 left promiscuous mode [ 1446.362032][ T7] device 66 left promiscuous mode [ 1446.422308][ T7] device 67 left promiscuous mode [ 1446.472492][ T7] device 68 left promiscuous mode [ 1446.532131][ T7] device 69 left promiscuous mode [ 1446.592244][ T7] device 70 left promiscuous mode [ 1446.632303][ T7] device 71 left promiscuous mode [ 1446.672267][ T7] device 72 left promiscuous mode [ 1446.732204][ T7] device 73 left promiscuous mode [ 1446.782388][ T7] device 74 left promiscuous mode [ 1446.852034][ T7] device 75 left promiscuous mode [ 1446.922393][ T7] device 76 left promiscuous mode [ 1446.992270][ T7] device 77 left promiscuous mode [ 1447.062960][ T7] device 78 left promiscuous mode [ 1447.142249][ T7] device 79 left promiscuous mode [ 1447.182359][ T7] device 80 left promiscuous mode [ 1447.242585][ T7] device 81 left promiscuous mode [ 1447.292375][ T7] device 82 left promiscuous mode [ 1447.332464][ T7] device 83 left promiscuous mode [ 1447.402174][ T7] device 84 left promiscuous mode [ 1447.442539][ T7] device 85 left promiscuous mode [ 1447.512971][ T7] device 86 left promiscuous mode [ 1447.562487][ T7] device 87 left promiscuous mode [ 1447.632080][ T7] device 88 left promiscuous mode [ 1447.692153][ T7] device 89 left promiscuous mode [ 1447.752266][ T7] device 90 left promiscuous mode [ 1447.793175][ T7] device 91 left promiscuous mode [ 1447.842116][ T7] device 92 left promiscuous mode [ 1447.902247][ T7] device 93 left promiscuous mode [ 1447.962214][ T7] device 94 left promiscuous mode [ 1448.012504][ T7] device 95 left promiscuous mode [ 1448.072158][ T7] device 96 left promiscuous mode [ 1448.112961][ T7] device 97 left promiscuous mode [ 1448.192161][ T7] device 98 left promiscuous mode [ 1448.252279][ T7] device 99 left promiscuous mode [ 1448.322105][ T7] device 100 left promiscuous mode [ 1448.362251][ T7] device 101 left promiscuous mode [ 1448.432193][ T7] device 102 left promiscuous mode [ 1448.492117][ T7] device 103 left promiscuous mode [ 1448.562412][ T7] device 104 left promiscuous mode [ 1448.622460][ T7] device 105 left promiscuous mode [ 1448.672453][ T7] device 106 left promiscuous mode [ 1448.752472][ T7] device 107 left promiscuous mode [ 1448.812280][ T7] device 108 left promiscuous mode [ 1448.862442][ T7] device 109 left promiscuous mode [ 1448.902477][ T7] device 110 left promiscuous mode [ 1448.942303][ T7] device 111 left promiscuous mode [ 1448.992472][ T7] device 112 left promiscuous mode [ 1449.062227][ T7] device 113 left promiscuous mode [ 1449.112116][ T7] device 114 left promiscuous mode [ 1449.152304][ T7] device 115 left promiscuous mode [ 1449.202460][ T7] device 116 left promiscuous mode [ 1449.242543][ T7] device 117 left promiscuous mode [ 1449.312059][ T7] device 118 left promiscuous mode [ 1449.362531][ T7] device 119 left promiscuous mode [ 1449.422402][ T7] device 120 left promiscuous mode [ 1449.492146][ T7] device 121 left promiscuous mode [ 1449.552597][ T7] device 122 left promiscuous mode [ 1449.592480][ T7] device 123 left promiscuous mode [ 1449.672190][ T7] device 124 left promiscuous mode [ 1449.732418][ T7] device 125 left promiscuous mode [ 1449.802819][ T7] device 126 left promiscuous mode [ 1449.862228][ T7] device 127 left promiscuous mode [ 1449.922489][ T7] device 128 left promiscuous mode [ 1449.962521][ T7] device 129 left promiscuous mode [ 1450.002492][ T7] device 130 left promiscuous mode [ 1450.072214][ T7] device 131 left promiscuous mode [ 1450.132218][ T7] device 132 left promiscuous mode [ 1450.202227][ T7] device 133 left promiscuous mode [ 1450.242473][ T7] device 134 left promiscuous mode [ 1450.312384][ T7] device 135 left promiscuous mode [ 1450.362518][ T7] device 136 left promiscuous mode [ 1450.422102][ T7] device 137 left promiscuous mode [ 1450.472146][ T7] device 138 left promiscuous mode [ 1450.552169][ T7] device 139 left promiscuous mode [ 1450.622218][ T7] device 140 left promiscuous mode [ 1450.682281][ T7] device 141 left promiscuous mode [ 1450.742323][ T7] device 142 left promiscuous mode [ 1450.792452][ T7] device 143 left promiscuous mode [ 1450.852277][ T7] device 144 left promiscuous mode [ 1450.922041][ T7] device 145 left promiscuous mode [ 1450.992501][ T7] device 146 left promiscuous mode [ 1451.042371][ T7] device 147 left promiscuous mode [ 1451.092586][ T7] device 148 left promiscuous mode [ 1451.132485][ T7] device 149 left promiscuous mode [ 1451.172500][ T7] device 150 left promiscuous mode [ 1451.222468][ T7] device 151 left promiscuous mode [ 1451.262488][ T7] device 152 left promiscuous mode [ 1451.322416][ T7] device 153 left promiscuous mode [ 1451.382515][ T7] device 154 left promiscuous mode [ 1451.422516][ T7] device 155 left promiscuous mode [ 1451.462426][ T7] device 156 left promiscuous mode [ 1451.512277][ T7] device 157 left promiscuous mode [ 1451.562466][ T7] device 158 left promiscuous mode [ 1451.622247][ T7] device 159 left promiscuous mode [ 1451.682355][ T7] device 160 left promiscuous mode [ 1451.752286][ T7] device 161 left promiscuous mode [ 1451.802490][ T7] device 162 left promiscuous mode [ 1451.872295][ T7] device 163 left promiscuous mode [ 1451.932261][ T7] device 164 left promiscuous mode [ 1451.972403][ T7] device 165 left promiscuous mode [ 1452.012282][ T7] device 166 left promiscuous mode [ 1452.062346][ T7] device 167 left promiscuous mode [ 1452.132245][ T7] device 168 left promiscuous mode [ 1452.192470][ T7] device 169 left promiscuous mode [ 1452.252335][ T7] device 170 left promiscuous mode [ 1452.302576][ T7] device 171 left promiscuous mode [ 1452.352023][ T7] device 172 left promiscuous mode [ 1452.402462][ T7] device 173 left promiscuous mode [ 1452.442473][ T7] device 174 left promiscuous mode [ 1452.522438][ T7] device 175 left promiscuous mode [ 1452.572543][ T7] device 176 left promiscuous mode [ 1452.642307][ T7] device 177 left promiscuous mode [ 1452.712163][ T7] device 178 left promiscuous mode [ 1452.762221][ T7] device 179 left promiscuous mode [ 1452.832393][ T7] device 180 left promiscuous mode [ 1452.872531][ T7] device 181 left promiscuous mode [ 1452.912477][ T7] device 182 left promiscuous mode [ 1452.982167][ T7] device 183 left promiscuous mode [ 1453.042340][ T7] device 184 left promiscuous mode [ 1453.112494][ T7] device 185 left promiscuous mode [ 1453.182104][ T7] device 186 left promiscuous mode [ 1453.252283][ T7] device 187 left promiscuous mode [ 1453.312285][ T7] device 188 left promiscuous mode [ 1453.382242][ T7] device 189 left promiscuous mode [ 1453.442278][ T7] device 190 left promiscuous mode [ 1453.492338][ T7] device 191 left promiscuous mode [ 1453.552309][ T7] device 192 left promiscuous mode [ 1453.612295][ T7] device 193 left promiscuous mode [ 1453.682124][ T7] device 194 left promiscuous mode [ 1453.742099][ T7] device 195 left promiscuous mode [ 1453.793501][ T7] device 196 left promiscuous mode [ 1453.882033][ T7] device 197 left promiscuous mode [ 1453.932453][ T7] device 198 left promiscuous mode [ 1454.012161][ T7] device 199 left promiscuous mode [ 1454.082253][ T7] device 200 left promiscuous mode [ 1454.132565][ T7] device 201 left promiscuous mode [ 1454.202184][ T7] device 202 left promiscuous mode [ 1454.262415][ T7] device 203 left promiscuous mode [ 1454.322106][ T7] device 204 left promiscuous mode [ 1454.382354][ T7] device 205 left promiscuous mode [ 1454.442401][ T7] device 206 left promiscuous mode [ 1454.512174][ T7] device 207 left promiscuous mode [ 1454.572231][ T7] device 208 left promiscuous mode [ 1454.632163][ T7] device 209 left promiscuous mode [ 1454.702283][ T7] device 210 left promiscuous mode [ 1454.762178][ T7] device 211 left promiscuous mode [ 1454.812565][ T7] device 212 left promiscuous mode [ 1454.872267][ T7] device 213 left promiscuous mode [ 1454.932229][ T7] device 214 left promiscuous mode [ 1454.992255][ T7] device 215 left promiscuous mode [ 1455.052330][ T7] device 216 left promiscuous mode [ 1455.112233][ T7] device 217 left promiscuous mode [ 1455.182225][ T7] device 218 left promiscuous mode [ 1455.232323][ T7] device 219 left promiscuous mode [ 1455.292204][ T7] device 220 left promiscuous mode [ 1455.352194][ T7] device 221 left promiscuous mode [ 1455.402367][ T7] device 222 left promiscuous mode [ 1455.472081][ T7] device 223 left promiscuous mode [ 1455.542564][ T7] device 224 left promiscuous mode [ 1455.582182][ T7] device 225 left promiscuous mode [ 1455.642334][ T7] device 226 left promiscuous mode [ 1455.692505][ T7] device 227 left promiscuous mode [ 1455.752047][ T7] device 228 left promiscuous mode [ 1455.792496][ T7] device 229 left promiscuous mode [ 1455.852212][ T7] device 230 left promiscuous mode [ 1455.912410][ T7] device 231 left promiscuous mode [ 1455.972080][ T7] device 232 left promiscuous mode [ 1456.012544][ T7] device 233 left promiscuous mode [ 1456.092209][ T7] device 234 left promiscuous mode [ 1456.132467][ T7] device 235 left promiscuous mode [ 1456.202252][ T7] device 236 left promiscuous mode [ 1456.252377][ T7] device 237 left promiscuous mode [ 1456.322239][ T7] device 238 left promiscuous mode [ 1456.382208][ T7] device 239 left promiscuous mode [ 1456.442275][ T7] device 240 left promiscuous mode [ 1456.502857][ T7] device 241 left promiscuous mode [ 1456.572295][ T7] device 242 left promiscuous mode [ 1456.622267][ T7] device 243 left promiscuous mode [ 1456.692322][ T7] device 244 left promiscuous mode [ 1456.742497][ T7] device 245 left promiscuous mode [ 1456.812224][ T7] device 246 left promiscuous mode [ 1456.872066][ T7] device 247 left promiscuous mode [ 1456.922270][ T7] device 248 left promiscuous mode [ 1456.992306][ T7] device 249 left promiscuous mode [ 1457.052504][ T7] device 250 left promiscuous mode [ 1457.112327][ T7] device 251 left promiscuous mode [ 1457.162381][ T7] device 252 left promiscuous mode [ 1457.222440][ T7] device 253 left promiscuous mode [ 1457.292014][ T7] device 254 left promiscuous mode [ 1457.342490][ T7] device 255 left promiscuous mode [ 1457.412410][ T7] device 256 left promiscuous mode [ 1457.481990][ T7] device 257 left promiscuous mode [ 1457.532494][ T7] device 258 left promiscuous mode [ 1457.592300][ T7] device 259 left promiscuous mode [ 1457.652279][ T7] device 260 left promiscuous mode [ 1457.712852][ T7] device 261 left promiscuous mode [ 1457.792006][ T7] device 262 left promiscuous mode [ 1457.862687][ T7] device 263 left promiscuous mode [ 1457.932193][ T7] device 264 left promiscuous mode [ 1457.982422][ T7] device 265 left promiscuous mode [ 1458.032005][ T7] device 266 left promiscuous mode [ 1458.082463][ T7] device 267 left promiscuous mode [ 1458.142236][ T7] device 268 left promiscuous mode [ 1458.212475][ T7] device 269 left promiscuous mode [ 1458.272159][ T7] device 270 left promiscuous mode [ 1458.342308][ T7] device 271 left promiscuous mode [ 1458.383444][ T7] device 272 left promiscuous mode [ 1458.452250][ T7] device 273 left promiscuous mode [ 1458.512352][ T7] device 274 left promiscuous mode [ 1458.572187][ T7] device 275 left promiscuous mode [ 1458.612229][ T7] device 276 left promiscuous mode [ 1458.672228][ T7] device 277 left promiscuous mode [ 1458.742436][ T7] device 278 left promiscuous mode [ 1458.802052][ T7] device 279 left promiscuous mode [ 1458.872219][ T7] device 280 left promiscuous mode [ 1458.932178][ T7] device 281 left promiscuous mode [ 1458.982532][ T7] device 282 left promiscuous mode [ 1459.052164][ T7] device 283 left promiscuous mode [ 1459.092441][ T7] device 284 left promiscuous mode [ 1459.172033][ T7] device 285 left promiscuous mode [ 1459.232274][ T7] device 286 left promiscuous mode [ 1459.282324][ T7] device 287 left promiscuous mode [ 1459.341996][ T7] device 288 left promiscuous mode [ 1459.412219][ T7] device 289 left promiscuous mode [ 1459.472322][ T7] device 290 left promiscuous mode [ 1459.542757][ T7] device 291 left promiscuous mode [ 1459.582589][ T7] device 292 left promiscuous mode [ 1459.662155][ T7] device 293 left promiscuous mode [ 1459.732304][ T7] device 294 left promiscuous mode [ 1459.782640][ T7] device 295 left promiscuous mode [ 1459.852165][ T7] device 296 left promiscuous mode [ 1459.922417][ T7] device 297 left promiscuous mode [ 1459.982148][ T7] device 298 left promiscuous mode [ 1460.022317][ T7] device 299 left promiscuous mode [ 1460.102056][ T7] device 300 left promiscuous mode [ 1460.142269][ T7] device 301 left promiscuous mode [ 1460.202233][ T7] device 302 left promiscuous mode [ 1460.252539][ T7] device 303 left promiscuous mode [ 1460.312176][ T7] device 304 left promiscuous mode [ 1460.352409][ T7] device 305 left promiscuous mode [ 1460.412141][ T7] device 306 left promiscuous mode [ 1460.452240][ T7] device 307 left promiscuous mode [ 1460.512265][ T7] device 308 left promiscuous mode [ 1460.572270][ T7] device 309 left promiscuous mode [ 1460.632511][ T7] device 310 left promiscuous mode [ 1460.712153][ T7] device 311 left promiscuous mode [ 1460.782207][ T7] device 312 left promiscuous mode [ 1460.852270][ T7] device 313 left promiscuous mode [ 1460.932058][ T7] device 314 left promiscuous mode [ 1460.992218][ T7] device 315 left promiscuous mode [ 1461.052159][ T7] device 316 left promiscuous mode [ 1461.112172][ T7] device 317 left promiscuous mode [ 1461.192171][ T7] device 318 left promiscuous mode [ 1461.242365][ T7] device 319 left promiscuous mode [ 1461.317779][ T7] device 320 left promiscuous mode [ 1461.372436][ T7] device 321 left promiscuous mode [ 1461.432481][ T7] device 322 left promiscuous mode [ 1461.492149][ T7] device 323 left promiscuous mode [ 1461.552571][ T7] device 324 left promiscuous mode [ 1461.612032][ T7] device 325 left promiscuous mode [ 1461.653410][ T7] device 326 left promiscuous mode [ 1461.732055][ T7] device 327 left promiscuous mode [ 1461.792228][ T7] device 328 left promiscuous mode [ 1461.852265][ T7] device 329 left promiscuous mode [ 1461.932246][ T7] device 330 left promiscuous mode [ 1461.982299][ T7] device 331 left promiscuous mode [ 1462.062048][ T7] device 332 left promiscuous mode [ 1462.112488][ T7] device 333 left promiscuous mode [ 1462.162002][ T7] device 334 left promiscuous mode [ 1462.202360][ T7] device 335 left promiscuous mode [ 1462.252421][ T7] device 336 left promiscuous mode [ 1462.342112][ T7] device 337 left promiscuous mode [ 1462.402112][ T7] device 338 left promiscuous mode [ 1462.453230][ T7] device 339 left promiscuous mode [ 1462.512157][ T7] device 340 left promiscuous mode [ 1462.562448][ T7] device 341 left promiscuous mode [ 1462.602432][ T7] device 342 left promiscuous mode [ 1462.682149][ T7] device 343 left promiscuous mode [ 1462.742330][ T7] device 344 left promiscuous mode [ 1462.812541][ T7] device 345 left promiscuous mode [ 1462.872204][ T7] device 346 left promiscuous mode [ 1462.932068][ T7] device 347 left promiscuous mode [ 1462.972402][ T7] device 348 left promiscuous mode [ 1463.012439][ T7] device 349 left promiscuous mode [ 1463.072455][ T7] device 350 left promiscuous mode [ 1463.132337][ T7] device 351 left promiscuous mode [ 1463.182534][ T7] device 352 left promiscuous mode [ 1463.232232][ T7] device 353 left promiscuous mode [ 1463.302444][ T7] device 354 left promiscuous mode [ 1463.352610][ T7] device 355 left promiscuous mode [ 1463.422300][ T7] device 356 left promiscuous mode [ 1463.472476][ T7] device 357 left promiscuous mode [ 1463.542381][ T7] device 358 left promiscuous mode [ 1463.602228][ T7] device 359 left promiscuous mode [ 1463.672375][ T7] device 360 left promiscuous mode [ 1463.722448][ T7] device 361 left promiscuous mode [ 1463.762985][ T7] device 362 left promiscuous mode [ 1463.832057][ T7] device 363 left promiscuous mode [ 1463.892986][ T7] device 364 left promiscuous mode [ 1463.942521][ T7] device 365 left promiscuous mode [ 1463.992263][ T7] device 366 left promiscuous mode [ 1464.082493][ T7] device 367 left promiscuous mode [ 1464.162004][ T7] device 368 left promiscuous mode [ 1464.202199][ T7] device 369 left promiscuous mode [ 1464.262342][ T7] device 370 left promiscuous mode [ 1464.322206][ T7] device 371 left promiscuous mode [ 1464.362161][ T7] device 372 left promiscuous mode [ 1464.422265][ T7] device 373 left promiscuous mode [ 1464.492093][ T7] device 374 left promiscuous mode [ 1464.562123][ T7] device 375 left promiscuous mode [ 1464.632256][ T7] device 376 left promiscuous mode [ 1464.692289][ T7] device 377 left promiscuous mode [ 1464.752223][ T7] device 378 left promiscuous mode [ 1464.792242][ T7] device 379 left promiscuous mode [ 1464.852275][ T7] device 380 left promiscuous mode [ 1464.912267][ T7] device 381 left promiscuous mode [ 1464.972300][ T7] device 382 left promiscuous mode [ 1465.022533][ T7] device 383 left promiscuous mode [ 1465.062424][ T7] device 384 left promiscuous mode [ 1465.122258][ T7] device 385 left promiscuous mode [ 1465.182287][ T7] device 386 left promiscuous mode [ 1465.232554][ T7] device 387 left promiscuous mode [ 1465.302406][ T7] device 388 left promiscuous mode [ 1465.372387][ T7] device 389 left promiscuous mode [ 1465.412492][ T7] device 390 left promiscuous mode [ 1465.482819][ T7] device 391 left promiscuous mode [ 1465.532400][ T7] device 392 left promiscuous mode [ 1465.581985][ T7] device 393 left promiscuous mode [ 1465.632531][ T7] device 394 left promiscuous mode [ 1465.702470][ T7] device 395 left promiscuous mode [ 1465.772213][ T7] device 396 left promiscuous mode [ 1465.832137][ T7] device 397 left promiscuous mode [ 1465.872392][ T7] device 398 left promiscuous mode [ 1465.932254][ T7] device 399 left promiscuous mode [ 1465.982418][ T7] device 400 left promiscuous mode [ 1466.022551][ T7] device 401 left promiscuous mode [ 1466.072401][ T7] device 402 left promiscuous mode [ 1466.152190][ T7] device 403 left promiscuous mode [ 1466.222198][ T7] device 404 left promiscuous mode [ 1466.282231][ T7] device 405 left promiscuous mode [ 1466.342316][ T7] device 406 left promiscuous mode [ 1466.392534][ T7] device 407 left promiscuous mode [ 1466.442054][ T7] device 408 left promiscuous mode [ 1466.492475][ T7] device 409 left promiscuous mode [ 1466.533080][ T7] device 410 left promiscuous mode [ 1466.602111][ T7] device 411 left promiscuous mode [ 1466.652049][ T7] device 412 left promiscuous mode [ 1466.722175][ T7] device 413 left promiscuous mode [ 1466.792232][ T7] device 414 left promiscuous mode [ 1466.852223][ T7] device 415 left promiscuous mode [ 1466.922026][ T7] device 416 left promiscuous mode [ 1466.992482][ T7] device 417 left promiscuous mode [ 1467.052383][ T7] device 418 left promiscuous mode [ 1467.112228][ T7] device 419 left promiscuous mode [ 1467.192210][ T7] device 420 left promiscuous mode [ 1467.262279][ T7] device 421 left promiscuous mode [ 1467.312476][ T7] device 422 left promiscuous mode [ 1467.382152][ T7] device 423 left promiscuous mode [ 1467.452276][ T7] device 424 left promiscuous mode [ 1467.512236][ T7] device 425 left promiscuous mode [ 1467.562501][ T7] device 426 left promiscuous mode [ 1467.642154][ T7] device 427 left promiscuous mode [ 1467.712246][ T7] device 428 left promiscuous mode [ 1467.772287][ T7] device 429 left promiscuous mode [ 1467.822350][ T7] device 430 left promiscuous mode [ 1467.892289][ T7] device 431 left promiscuous mode [ 1467.952251][ T7] device 432 left promiscuous mode [ 1468.012226][ T7] device 433 left promiscuous mode [ 1468.072249][ T7] device 434 left promiscuous mode [ 1468.132292][ T7] device 435 left promiscuous mode [ 1468.202243][ T7] device 436 left promiscuous mode [ 1468.262153][ T7] device 437 left promiscuous mode [ 1468.332273][ T7] device 438 left promiscuous mode [ 1468.382492][ T7] device 439 left promiscuous mode [ 1468.442385][ T7] device 440 left promiscuous mode [ 1468.492031][ T7] device 441 left promiscuous mode [ 1468.532882][ T7] device 442 left promiscuous mode [ 1468.622178][ T7] device 443 left promiscuous mode [ 1468.682589][ T7] device 444 left promiscuous mode [ 1468.752945][ T7] device 445 left promiscuous mode [ 1468.832148][ T7] device 446 left promiscuous mode [ 1468.882479][ T7] device 447 left promiscuous mode [ 1468.932139][ T7] device 448 left promiscuous mode [ 1468.972575][ T7] device 449 left promiscuous mode [ 1469.042276][ T7] device 450 left promiscuous mode [ 1469.092488][ T7] device 451 left promiscuous mode [ 1469.142046][ T7] device 452 left promiscuous mode [ 1469.222018][ T7] device 453 left promiscuous mode [ 1469.282283][ T7] device 454 left promiscuous mode [ 1469.342394][ T7] device 455 left promiscuous mode [ 1469.412623][ T7] device 456 left promiscuous mode [ 1469.472290][ T7] device 457 left promiscuous mode [ 1469.532151][ T7] device 458 left promiscuous mode [ 1469.572974][ T7] device 459 left promiscuous mode [ 1469.632344][ T7] device 460 left promiscuous mode [ 1469.672405][ T7] device 461 left promiscuous mode [ 1469.722265][ T7] device 462 left promiscuous mode [ 1469.792468][ T7] device 463 left promiscuous mode [ 1469.852253][ T7] device 464 left promiscuous mode [ 1469.912109][ T7] device 465 left promiscuous mode [ 1469.952427][ T7] device 466 left promiscuous mode [ 1470.012450][ T7] device 467 left promiscuous mode [ 1470.082281][ T7] device 468 left promiscuous mode [ 1470.132423][ T7] device 469 left promiscuous mode [ 1470.192266][ T7] device 470 left promiscuous mode [ 1470.252318][ T7] device 471 left promiscuous mode [ 1470.312091][ T7] device 472 left promiscuous mode [ 1470.362388][ T7] device 473 left promiscuous mode [ 1470.432482][ T7] device 474 left promiscuous mode [ 1470.511982][ T7] device 475 left promiscuous mode [ 1470.572254][ T7] device 476 left promiscuous mode [ 1470.622420][ T7] device 477 left promiscuous mode [ 1470.692089][ T7] device 478 left promiscuous mode [ 1470.752359][ T7] device 479 left promiscuous mode [ 1470.832005][ T7] device 480 left promiscuous mode [ 1470.872284][ T7] device 481 left promiscuous mode [ 1470.942407][ T7] device 482 left promiscuous mode [ 1470.982596][ T7] device 483 left promiscuous mode [ 1471.062119][ T7] device 484 left promiscuous mode [ 1471.122277][ T7] device 485 left promiscuous mode [ 1471.182251][ T7] device 486 left promiscuous mode [ 1471.232636][ T7] device 487 left promiscuous mode [ 1471.302300][ T7] device 488 left promiscuous mode [ 1471.362431][ T7] device 489 left promiscuous mode [ 1471.412478][ T7] device 490 left promiscuous mode [ 1471.472165][ T7] device 491 left promiscuous mode [ 1471.532187][ T7] device 492 left promiscuous mode [ 1471.592142][ T7] device 493 left promiscuous mode [ 1471.662332][ T7] device 494 left promiscuous mode [ 1471.722231][ T7] device 495 left promiscuous mode [ 1471.782556][ T7] device 496 left promiscuous mode [ 1471.832138][ T7] device 497 left promiscuous mode [ 1471.902274][ T7] device 498 left promiscuous mode [ 1471.952476][ T7] device 499 left promiscuous mode [ 1472.023874][ T7] device 500 left promiscuous mode [ 1472.072288][ T7] device 501 left promiscuous mode [ 1472.122279][ T7] device 502 left promiscuous mode [ 1472.192431][ T7] device 503 left promiscuous mode [ 1472.252246][ T7] device 504 left promiscuous mode [ 1472.312136][ T7] device 505 left promiscuous mode [ 1472.372264][ T7] device 506 left promiscuous mode [ 1472.442191][ T7] device 507 left promiscuous mode [ 1472.502265][ T7] device 508 left promiscuous mode [ 1472.562203][ T7] device 509 left promiscuous mode [ 1472.612480][ T7] device 510 left promiscuous mode [ 1472.663511][ T7] device 511 left promiscuous mode [ 1472.732187][ T7] device 512 left promiscuous mode [ 1472.792327][ T7] device 513 left promiscuous mode [ 1472.842501][ T7] device 514 left promiscuous mode [ 1472.902242][ T7] device 515 left promiscuous mode [ 1472.972277][ T7] device 516 left promiscuous mode [ 1473.032416][ T7] device 517 left promiscuous mode [ 1473.082528][ T7] device 518 left promiscuous mode [ 1473.142237][ T7] device 519 left promiscuous mode [ 1473.212232][ T7] device 520 left promiscuous mode [ 1473.272211][ T7] device 521 left promiscuous mode [ 1473.312200][ T7] device 522 left promiscuous mode [ 1473.362861][ T7] device 523 left promiscuous mode [ 1473.412095][ T7] device 524 left promiscuous mode [ 1473.472276][ T7] device 525 left promiscuous mode [ 1473.532242][ T7] device 526 left promiscuous mode [ 1473.592229][ T7] device 527 left promiscuous mode [ 1473.652275][ T7] device 528 left promiscuous mode [ 1473.732009][ T7] device 529 left promiscuous mode [ 1473.792224][ T7] device 530 left promiscuous mode [ 1473.852240][ T7] device 531 left promiscuous mode [ 1473.912203][ T7] device 532 left promiscuous mode [ 1473.962564][ T7] device 533 left promiscuous mode [ 1474.032145][ T7] device 534 left promiscuous mode [ 1474.102287][ T7] device 535 left promiscuous mode [ 1474.162237][ T7] device 536 left promiscuous mode [ 1474.232398][ T7] device 537 left promiscuous mode [ 1474.312223][ T7] device 538 left promiscuous mode [ 1474.382332][ T7] device 539 left promiscuous mode [ 1474.432545][ T7] device 540 left promiscuous mode [ 1474.492146][ T7] device 541 left promiscuous mode [ 1474.542478][ T7] device 542 left promiscuous mode [ 1474.584229][ T7] device 543 left promiscuous mode [ 1474.652452][ T7] device 544 left promiscuous mode [ 1474.731991][ T7] device 545 left promiscuous mode [ 1474.792316][ T7] device 546 left promiscuous mode [ 1474.852256][ T7] device 547 left promiscuous mode [ 1474.912289][ T7] device 548 left promiscuous mode [ 1474.962482][ T7] device 549 left promiscuous mode [ 1475.032090][ T7] device 550 left promiscuous mode [ 1475.102447][ T7] device 551 left promiscuous mode [ 1475.162226][ T7] device 552 left promiscuous mode [ 1475.222888][ T7] device 553 left promiscuous mode [ 1475.272493][ T7] device 554 left promiscuous mode [ 1475.342304][ T7] device 555 left promiscuous mode [ 1475.392478][ T7] device 556 left promiscuous mode [ 1475.462124][ T7] device 557 left promiscuous mode [ 1475.532225][ T7] device 558 left promiscuous mode [ 1475.592261][ T7] device 559 left promiscuous mode [ 1475.641953][ T7] device 560 left promiscuous mode [ 1475.702325][ T7] device 561 left promiscuous mode [ 1475.752308][ T7] device 562 left promiscuous mode [ 1475.822225][ T7] device 563 left promiscuous mode [ 1475.872469][ T7] device 564 left promiscuous mode [ 1475.942178][ T7] device 565 left promiscuous mode [ 1476.012049][ T7] device 566 left promiscuous mode [ 1476.072253][ T7] device 567 left promiscuous mode [ 1476.132269][ T7] device 568 left promiscuous mode [ 1476.211998][ T7] device 569 left promiscuous mode [ 1476.282914][ T7] device 570 left promiscuous mode [ 1476.331952][ T7] device 571 left promiscuous mode [ 1476.372191][ T7] device 572 left promiscuous mode [ 1476.432421][ T7] device 573 left promiscuous mode [ 1476.482459][ T7] device 574 left promiscuous mode [ 1476.532204][ T7] device 575 left promiscuous mode [ 1476.592217][ T7] device 576 left promiscuous mode [ 1476.642431][ T7] device 577 left promiscuous mode [ 1476.682451][ T7] device 578 left promiscuous mode [ 1476.752370][ T7] device 579 left promiscuous mode [ 1476.802442][ T7] device 580 left promiscuous mode [ 1476.872186][ T7] device 581 left promiscuous mode [ 1476.932201][ T7] device 582 left promiscuous mode [ 1476.982370][ T7] device 583 left promiscuous mode [ 1477.062031][ T7] device 584 left promiscuous mode [ 1477.112283][ T7] device 585 left promiscuous mode [ 1477.152471][ T7] device 586 left promiscuous mode [ 1477.192457][ T7] device 587 left promiscuous mode [ 1477.252062][ T7] device 588 left promiscuous mode [ 1477.312253][ T7] device 589 left promiscuous mode [ 1477.382168][ T7] device 590 left promiscuous mode [ 1477.442272][ T7] device 591 left promiscuous mode [ 1477.512353][ T7] device 592 left promiscuous mode [ 1477.562241][ T7] device 593 left promiscuous mode [ 1477.612429][ T7] device 594 left promiscuous mode [ 1477.672166][ T7] device 595 left promiscuous mode [ 1477.722273][ T7] device 596 left promiscuous mode [ 1477.773327][ T7] device 597 left promiscuous mode [ 1477.852169][ T7] device 598 left promiscuous mode [ 1477.922232][ T7] device 599 left promiscuous mode [ 1477.982227][ T7] device 600 left promiscuous mode [ 1478.042188][ T7] device 601 left promiscuous mode [ 1478.092361][ T7] device 602 left promiscuous mode [ 1478.132479][ T7] device 603 left promiscuous mode [ 1478.212225][ T7] device 604 left promiscuous mode [ 1478.252466][ T7] device 605 left promiscuous mode [ 1478.322301][ T7] device 606 left promiscuous mode [ 1478.362270][ T7] device 607 left promiscuous mode [ 1478.422298][ T7] device 608 left promiscuous mode [ 1478.492132][ T7] device 609 left promiscuous mode [ 1478.542666][ T7] device 610 left promiscuous mode [ 1478.602060][ T7] device 611 left promiscuous mode [ 1478.662389][ T7] device 612 left promiscuous mode [ 1478.722238][ T7] device 613 left promiscuous mode [ 1478.792420][ T7] device 614 left promiscuous mode [ 1478.852149][ T7] device 615 left promiscuous mode [ 1478.922008][ T7] device 616 left promiscuous mode [ 1478.992420][ T7] device 617 left promiscuous mode [ 1479.072149][ T7] device 618 left promiscuous mode [ 1479.113368][ T7] device 619 left promiscuous mode [ 1479.182330][ T7] device 620 left promiscuous mode [ 1479.262051][ T7] device 621 left promiscuous mode [ 1479.342166][ T7] device 622 left promiscuous mode [ 1479.402235][ T7] device 623 left promiscuous mode [ 1479.462194][ T7] device 624 left promiscuous mode [ 1479.512531][ T7] device 625 left promiscuous mode [ 1479.572151][ T7] device 626 left promiscuous mode [ 1479.632316][ T7] device 627 left promiscuous mode [ 1479.702889][ T7] device 628 left promiscuous mode [ 1479.752000][ T7] device 629 left promiscuous mode [ 1479.832151][ T7] device 630 left promiscuous mode [ 1479.882223][ T7] device 631 left promiscuous mode [ 1479.932344][ T7] device 632 left promiscuous mode [ 1479.992155][ T7] device 633 left promiscuous mode [ 1480.032473][ T7] device 634 left promiscuous mode [ 1480.102411][ T7] device 635 left promiscuous mode [ 1480.162185][ T7] device 636 left promiscuous mode [ 1480.222187][ T7] device 637 left promiscuous mode [ 1480.292481][ T7] device 638 left promiscuous mode [ 1480.362259][ T7] device 639 left promiscuous mode [ 1480.422285][ T7] device 640 left promiscuous mode [ 1480.502147][ T7] device 641 left promiscuous mode [ 1480.542317][ T7] device 642 left promiscuous mode [ 1480.592428][ T7] device 643 left promiscuous mode [ 1480.662131][ T7] device 644 left promiscuous mode [ 1480.702300][ T7] device 645 left promiscuous mode [ 1480.792526][ T7] device 646 left promiscuous mode [ 1480.832476][ T7] device 647 left promiscuous mode [ 1480.912013][ T7] device 648 left promiscuous mode [ 1480.972244][ T7] device 649 left promiscuous mode [ 1481.012219][ T7] device 650 left promiscuous mode [ 1481.072396][ T7] device 651 left promiscuous mode [ 1481.122442][ T7] device 652 left promiscuous mode [ 1481.182235][ T7] device 653 left promiscuous mode [ 1481.222404][ T7] device 654 left promiscuous mode [ 1481.262337][ T7] device 655 left promiscuous mode [ 1481.302472][ T7] device 656 left promiscuous mode [ 1481.382191][ T7] device 657 left promiscuous mode [ 1481.442496][ T7] device 658 left promiscuous mode [ 1481.502304][ T7] device 659 left promiscuous mode [ 1481.543496][ T7] device 660 left promiscuous mode [ 1481.602239][ T7] device 661 left promiscuous mode [ 1481.652215][ T7] device 662 left promiscuous mode [ 1481.702420][ T7] device 663 left promiscuous mode [ 1481.742478][ T7] device 664 left promiscuous mode [ 1481.802426][ T7] device 665 left promiscuous mode [ 1481.862153][ T7] device 666 left promiscuous mode [ 1481.932182][ T7] device 667 left promiscuous mode [ 1481.982292][ T7] device 668 left promiscuous mode [ 1482.052497][ T7] device 669 left promiscuous mode [ 1482.112322][ T7] device 670 left promiscuous mode [ 1482.172060][ T7] device 671 left promiscuous mode [ 1482.212376][ T7] device 672 left promiscuous mode [ 1482.252390][ T7] device 673 left promiscuous mode [ 1482.292413][ T7] device 674 left promiscuous mode [ 1482.362197][ T7] device 675 left promiscuous mode [ 1482.432139][ T7] device 676 left promiscuous mode [ 1482.492332][ T7] device 677 left promiscuous mode [ 1482.542457][ T7] device 678 left promiscuous mode [ 1482.583165][ T7] device 679 left promiscuous mode [ 1482.642097][ T7] device 680 left promiscuous mode [ 1482.682458][ T7] device 681 left promiscuous mode [ 1482.742493][ T7] device 682 left promiscuous mode [ 1482.782448][ T7] device 683 left promiscuous mode [ 1482.842516][ T7] device 684 left promiscuous mode [ 1482.892242][ T7] device 685 left promiscuous mode [ 1482.942464][ T7] device 686 left promiscuous mode [ 1483.002270][ T7] device 687 left promiscuous mode [ 1483.081994][ T7] device 688 left promiscuous mode [ 1483.152274][ T7] device 689 left promiscuous mode [ 1483.202095][ T7] device 690 left promiscuous mode [ 1483.262359][ T7] device 691 left promiscuous mode [ 1483.332148][ T7] device 692 left promiscuous mode [ 1483.392545][ T7] device 693 left promiscuous mode [ 1483.452192][ T7] device 694 left promiscuous mode [ 1483.522255][ T7] device 695 left promiscuous mode [ 1483.601959][ T7] device 696 left promiscuous mode [ 1483.662833][ T7] device 697 left promiscuous mode [ 1483.752214][ T7] device 698 left promiscuous mode [ 1483.822295][ T7] device 699 left promiscuous mode [ 1483.872472][ T7] device 700 left promiscuous mode [ 1483.942103][ T7] device 701 left promiscuous mode [ 1484.002023][ T7] device 702 left promiscuous mode [ 1484.042334][ T7] device 703 left promiscuous mode [ 1484.112484][ T7] device 704 left promiscuous mode [ 1484.192186][ T7] device 705 left promiscuous mode [ 1484.272032][ T7] device 706 left promiscuous mode [ 1484.332247][ T7] device 707 left promiscuous mode [ 1484.392293][ T7] device 708 left promiscuous mode [ 1484.442881][ T7] device 709 left promiscuous mode [ 1484.502240][ T7] device 710 left promiscuous mode [ 1484.562109][ T7] device 711 left promiscuous mode [ 1484.602483][ T7] device 712 left promiscuous mode [ 1484.682051][ T7] device 713 left promiscuous mode [ 1484.722506][ T7] device 714 left promiscuous mode [ 1484.792363][ T7] device 715 left promiscuous mode [ 1484.842370][ T7] device 716 left promiscuous mode [ 1484.914112][ T7] device 717 left promiscuous mode [ 1484.972244][ T7] device 718 left promiscuous mode [ 1485.042270][ T7] device 719 left promiscuous mode [ 1485.082532][ T7] device 720 left promiscuous mode [ 1485.122472][ T7] device 721 left promiscuous mode [ 1485.172395][ T7] device 722 left promiscuous mode [ 1485.212497][ T7] device 723 left promiscuous mode [ 1485.292032][ T7] device 724 left promiscuous mode [ 1485.352285][ T7] device 725 left promiscuous mode [ 1485.392258][ T7] device 726 left promiscuous mode [ 1485.442490][ T7] device 727 left promiscuous mode [ 1485.482443][ T7] device 728 left promiscuous mode [ 1485.552205][ T7] device 729 left promiscuous mode [ 1485.631973][ T7] device 730 left promiscuous mode [ 1485.692178][ T7] device 731 left promiscuous mode [ 1485.752290][ T7] device 732 left promiscuous mode [ 1485.822424][ T7] device 733 left promiscuous mode [ 1485.882464][ T7] device 734 left promiscuous mode [ 1485.942196][ T7] device 735 left promiscuous mode [ 1486.012037][ T7] device 736 left promiscuous mode [ 1486.052443][ T7] device 737 left promiscuous mode [ 1486.112383][ T7] device 738 left promiscuous mode [ 1486.162357][ T7] device 739 left promiscuous mode [ 1486.222191][ T7] device 740 left promiscuous mode [ 1486.272381][ T7] device 741 left promiscuous mode [ 1486.342352][ T7] device 742 left promiscuous mode [ 1486.402182][ T7] device 743 left promiscuous mode [ 1486.461980][ T7] device 744 left promiscuous mode [ 1486.522146][ T7] device 745 left promiscuous mode [ 1486.572429][ T7] device 746 left promiscuous mode [ 1486.642269][ T7] device 747 left promiscuous mode [ 1486.712210][ T7] device 748 left promiscuous mode [ 1486.772240][ T7] device 749 left promiscuous mode [ 1486.822560][ T7] device 750 left promiscuous mode [ 1486.882337][ T7] device 751 left promiscuous mode [ 1486.952275][ T7] device 752 left promiscuous mode [ 1487.012197][ T7] device 753 left promiscuous mode [ 1487.062525][ T7] device 754 left promiscuous mode [ 1487.142046][ T7] device 755 left promiscuous mode [ 1487.192268][ T7] device 756 left promiscuous mode [ 1487.262237][ T7] device 757 left promiscuous mode [ 1487.342072][ T7] device 758 left promiscuous mode [ 1487.402348][ T7] device 759 left promiscuous mode [ 1487.462219][ T7] device 760 left promiscuous mode [ 1487.522194][ T7] device 761 left promiscuous mode [ 1487.582186][ T7] device 762 left promiscuous mode [ 1487.632443][ T7] device 763 left promiscuous mode [ 1487.692521][ T7] device 764 left promiscuous mode [ 1487.752204][ T7] device 765 left promiscuous mode [ 1487.822035][ T7] device 766 left promiscuous mode [ 1487.862197][ T7] device 767 left promiscuous mode [ 1487.922250][ T7] device 768 left promiscuous mode [ 1487.982249][ T7] device 769 left promiscuous mode [ 1488.042211][ T7] device 770 left promiscuous mode [ 1488.092479][ T7] device 771 left promiscuous mode [ 1488.172192][ T7] device 772 left promiscuous mode [ 1488.232041][ T7] device 773 left promiscuous mode [ 1488.292312][ T7] device 774 left promiscuous mode [ 1488.352246][ T7] device 775 left promiscuous mode [ 1488.422593][ T7] device 776 left promiscuous mode [ 1488.492069][ T7] device 777 left promiscuous mode [ 1488.533500][ T7] device 778 left promiscuous mode [ 1488.592480][ T7] device 779 left promiscuous mode [ 1488.632222][ T7] device 780 left promiscuous mode [ 1488.692220][ T7] device 781 left promiscuous mode [ 1488.761998][ T7] device 782 left promiscuous mode [ 1488.822206][ T7] device 783 left promiscuous mode [ 1488.882206][ T7] device 784 left promiscuous mode [ 1488.932412][ T7] device 785 left promiscuous mode [ 1488.992515][ T7] device 786 left promiscuous mode [ 1489.052238][ T7] device 787 left promiscuous mode [ 1489.102279][ T7] device 788 left promiscuous mode [ 1489.142508][ T7] device 789 left promiscuous mode [ 1489.212176][ T7] device 790 left promiscuous mode [ 1489.252374][ T7] device 791 left promiscuous mode [ 1489.332196][ T7] device 792 left promiscuous mode [ 1489.382529][ T7] device 793 left promiscuous mode [ 1489.442259][ T7] device 794 left promiscuous mode [ 1489.492353][ T7] device 795 left promiscuous mode [ 1489.542595][ T7] device 796 left promiscuous mode [ 1489.612257][ T7] device 797 left promiscuous mode [ 1489.662430][ T7] device 798 left promiscuous mode [ 1489.711993][ T7] device 799 left promiscuous mode [ 1489.782631][ T7] device 800 left promiscuous mode [ 1489.842150][ T7] device 801 left promiscuous mode [ 1489.882708][ T7] device 802 left promiscuous mode [ 1489.952204][ T7] device 803 left promiscuous mode [ 1490.002476][ T7] device 804 left promiscuous mode [ 1490.062556][ T7] device 805 left promiscuous mode [ 1490.112011][ T7] device 806 left promiscuous mode [ 1490.182506][ T7] device 807 left promiscuous mode [ 1490.252176][ T7] device 808 left promiscuous mode [ 1490.342104][ T7] device 809 left promiscuous mode [ 1490.402194][ T7] device 810 left promiscuous mode [ 1490.472178][ T7] device 811 left promiscuous mode [ 1490.512376][ T7] device 812 left promiscuous mode [ 1490.572260][ T7] device 813 left promiscuous mode [ 1490.622397][ T7] device 814 left promiscuous mode [ 1490.672354][ T7] device 815 left promiscuous mode [ 1490.752032][ T7] device 816 left promiscuous mode [ 1490.802340][ T7] device 817 left promiscuous mode [ 1490.872265][ T7] device 818 left promiscuous mode [ 1490.922216][ T7] device 819 left promiscuous mode [ 1490.982257][ T7] device 820 left promiscuous mode [ 1491.032424][ T7] device 821 left promiscuous mode [ 1491.092194][ T7] device 822 left promiscuous mode [ 1491.132432][ T7] device 823 left promiscuous mode [ 1491.173928][ T7] device 824 left promiscuous mode [ 1491.222497][ T7] device 825 left promiscuous mode [ 1491.282166][ T7] device 826 left promiscuous mode [ 1491.352184][ T7] device 827 left promiscuous mode [ 1491.402417][ T7] device 828 left promiscuous mode [ 1491.472072][ T7] device 829 left promiscuous mode [ 1491.542278][ T7] device 830 left promiscuous mode [ 1491.602279][ T7] device 831 left promiscuous mode [ 1491.682037][ T7] device 832 left promiscuous mode [ 1491.752461][ T7] device 833 left promiscuous mode [ 1491.831988][ T7] device 834 left promiscuous mode [ 1491.892291][ T7] device 835 left promiscuous mode [ 1491.952840][ T7] device 836 left promiscuous mode [ 1492.002435][ T7] device 837 left promiscuous mode [ 1492.072179][ T7] device 838 left promiscuous mode [ 1492.122458][ T7] device 839 left promiscuous mode [ 1492.182506][ T7] device 840 left promiscuous mode [ 1492.252320][ T7] device 841 left promiscuous mode [ 1492.302508][ T7] device 842 left promiscuous mode [ 1492.362132][ T7] device 843 left promiscuous mode [ 1492.432480][ T7] device 844 left promiscuous mode [ 1492.512098][ T7] device 845 left promiscuous mode [ 1492.582969][ T7] device 846 left promiscuous mode [ 1492.662222][ T7] device 847 left promiscuous mode [ 1492.742348][ T7] device 848 left promiscuous mode [ 1492.812513][ T7] device 849 left promiscuous mode [ 1492.862136][ T7] device 850 left promiscuous mode [ 1492.912337][ T7] device 851 left promiscuous mode [ 1492.982340][ T7] device 852 left promiscuous mode [ 1493.022267][ T7] device 853 left promiscuous mode [ 1493.072529][ T7] device 854 left promiscuous mode [ 1493.122107][ T7] device 855 left promiscuous mode [ 1493.172474][ T7] device 856 left promiscuous mode [ 1493.232190][ T7] device 857 left promiscuous mode [ 1493.282286][ T7] device 858 left promiscuous mode [ 1493.342277][ T7] device 859 left promiscuous mode [ 1493.392509][ T7] device 860 left promiscuous mode [ 1493.442034][ T7] device 861 left promiscuous mode [ 1493.512120][ T7] device 862 left promiscuous mode [ 1493.582152][ T7] device 863 left promiscuous mode [ 1493.652201][ T7] device 864 left promiscuous mode [ 1493.712242][ T7] device 865 left promiscuous mode [ 1493.782426][ T7] device 866 left promiscuous mode [ 1493.832193][ T7] device 867 left promiscuous mode [ 1493.882340][ T7] device 868 left promiscuous mode [ 1493.952219][ T7] device 869 left promiscuous mode [ 1494.012349][ T7] device 870 left promiscuous mode [ 1494.072244][ T7] device 871 left promiscuous mode [ 1494.132273][ T7] device 872 left promiscuous mode [ 1494.202512][ T7] device 873 left promiscuous mode [ 1494.277233][ T7] device 874 left promiscuous mode [ 1494.332348][ T7] device 875 left promiscuous mode [ 1494.402139][ T7] device 876 left promiscuous mode [ 1494.462389][ T7] device 877 left promiscuous mode [ 1494.522461][ T7] device 878 left promiscuous mode [ 1494.584081][ T7] device 879 left promiscuous mode [ 1494.662442][ T7] device 880 left promiscuous mode [ 1494.722244][ T7] device 881 left promiscuous mode [ 1494.782261][ T7] device 882 left promiscuous mode [ 1494.832417][ T7] device 883 left promiscuous mode [ 1494.882081][ T7] device 884 left promiscuous mode [ 1494.942076][ T7] device 885 left promiscuous mode [ 1494.992397][ T7] device 886 left promiscuous mode [ 1495.072161][ T7] device 887 left promiscuous mode [ 1495.112478][ T7] device 888 left promiscuous mode [ 1495.182237][ T7] device 889 left promiscuous mode [ 1495.233450][ T7] device 890 left promiscuous mode [ 1495.322036][ T7] device 891 left promiscuous mode [ 1495.382381][ T7] device 892 left promiscuous mode [ 1495.432446][ T7] device 893 left promiscuous mode [ 1495.522035][ T7] device 894 left promiscuous mode [ 1495.582257][ T7] device 895 left promiscuous mode [ 1495.632468][ T7] device 896 left promiscuous mode [ 1495.702354][ T7] device 897 left promiscuous mode [ 1495.772185][ T7] device 898 left promiscuous mode [ 1495.822429][ T7] device 899 left promiscuous mode [ 1495.892249][ T7] device 900 left promiscuous mode [ 1495.962438][ T7] device 901 left promiscuous mode [ 1496.022528][ T7] device 902 left promiscuous mode [ 1496.082457][ T7] device 903 left promiscuous mode [ 1496.151986][ T7] device 904 left promiscuous mode [ 1496.202534][ T7] device 905 left promiscuous mode [ 1496.252086][ T7] device 906 left promiscuous mode [ 1496.292253][ T7] device 907 left promiscuous mode [ 1496.343391][ T7] device 908 left promiscuous mode [ 1496.422264][ T7] device 909 left promiscuous mode [ 1496.482255][ T7] device 910 left promiscuous mode [ 1496.522356][ T7] device 911 left promiscuous mode [ 1496.562377][ T7] device 912 left promiscuous mode [ 1496.602344][ T7] device 913 left promiscuous mode [ 1496.642405][ T7] device 914 left promiscuous mode [ 1496.682685][ T7] device 915 left promiscuous mode [ 1496.742579][ T7] device 916 left promiscuous mode [ 1496.802161][ T7] device 917 left promiscuous mode [ 1496.852528][ T7] device 918 left promiscuous mode [ 1496.892456][ T7] device 919 left promiscuous mode [ 1496.933294][ T7] device 920 left promiscuous mode [ 1497.002105][ T7] device 921 left promiscuous mode [ 1497.042519][ T7] device 922 left promiscuous mode [ 1497.112245][ T7] device 923 left promiscuous mode [ 1497.172339][ T7] device 924 left promiscuous mode [ 1497.222374][ T7] device 925 left promiscuous mode [ 1497.282226][ T7] device 926 left promiscuous mode [ 1497.342340][ T7] device 927 left promiscuous mode [ 1497.392436][ T7] device 928 left promiscuous mode [ 1497.452064][ T7] device 929 left promiscuous mode [ 1497.512263][ T7] device 930 left promiscuous mode [ 1497.572274][ T7] device 931 left promiscuous mode [ 1497.642081][ T7] device 932 left promiscuous mode [ 1497.692397][ T7] device 933 left promiscuous mode [ 1497.762057][ T7] device 934 left promiscuous mode [ 1497.832250][ T7] device 935 left promiscuous mode [ 1497.892289][ T7] device 936 left promiscuous mode [ 1497.952302][ T7] device 937 left promiscuous mode [ 1497.992252][ T7] device 938 left promiscuous mode [ 1498.042430][ T7] device 939 left promiscuous mode [ 1498.112140][ T7] device 940 left promiscuous mode [ 1498.182262][ T7] device 941 left promiscuous mode [ 1498.242193][ T7] device 942 left promiscuous mode [ 1498.302254][ T7] device 943 left promiscuous mode [ 1498.382207][ T7] device 944 left promiscuous mode [ 1498.442422][ T7] device 945 left promiscuous mode [ 1498.512275][ T7] device 946 left promiscuous mode [ 1498.562447][ T7] device 947 left promiscuous mode [ 1498.622254][ T7] device 948 left promiscuous mode [ 1498.682079][ T7] device 949 left promiscuous mode [ 1498.722523][ T7] device 950 left promiscuous mode [ 1498.782228][ T7] device 951 left promiscuous mode [ 1498.852230][ T7] device 952 left promiscuous mode [ 1498.902864][ T7] device 953 left promiscuous mode [ 1498.962107][ T7] device 954 left promiscuous mode [ 1499.002391][ T7] device 955 left promiscuous mode [ 1499.062265][ T7] device 956 left promiscuous mode [ 1499.132075][ T7] device 957 left promiscuous mode [ 1499.202330][ T7] device 958 left promiscuous mode [ 1499.262264][ T7] device 959 left promiscuous mode [ 1499.312448][ T7] device 960 left promiscuous mode [ 1499.362365][ T7] device 961 left promiscuous mode [ 1499.432272][ T7] device 962 left promiscuous mode [ 1499.492313][ T7] device 963 left promiscuous mode [ 1499.562524][ T7] device 964 left promiscuous mode [ 1499.612475][ T7] device 965 left promiscuous mode [ 1499.691999][ T7] device 966 left promiscuous mode [ 1499.752286][ T7] device 967 left promiscuous mode [ 1499.812283][ T7] device 968 left promiscuous mode [ 1499.872246][ T7] device 969 left promiscuous mode [ 1499.912566][ T7] device 970 left promiscuous mode [ 1499.982271][ T7] device 971 left promiscuous mode [ 1500.032497][ T7] device 972 left promiscuous mode [ 1500.102172][ T7] device 973 left promiscuous mode [ 1500.162296][ T7] device 974 left promiscuous mode [ 1500.212432][ T7] device 975 left promiscuous mode [ 1500.272184][ T7] device 976 left promiscuous mode [ 1500.312450][ T7] device 977 left promiscuous mode [ 1500.372392][ T7] device 978 left promiscuous mode [ 1500.442224][ T7] device 979 left promiscuous mode [ 1500.503037][ T7] device 980 left promiscuous mode [ 1500.582226][ T7] device 981 left promiscuous mode [ 1500.652258][ T7] device 982 left promiscuous mode [ 1500.712197][ T7] device 983 left promiscuous mode [ 1500.782397][ T7] device 984 left promiscuous mode [ 1500.842114][ T7] device 985 left promiscuous mode [ 1500.882517][ T7] device 986 left promiscuous mode [ 1500.942218][ T7] device 987 left promiscuous mode [ 1501.012268][ T7] device 988 left promiscuous mode [ 1501.072227][ T7] device 989 left promiscuous mode [ 1501.132208][ T7] device 990 left promiscuous mode [ 1501.212003][ T7] device 991 left promiscuous mode [ 1501.262447][ T7] device 992 left promiscuous mode [ 1501.322204][ T7] device 993 left promiscuous mode [ 1501.392262][ T7] device 994 left promiscuous mode [ 1501.465297][ T7] device 995 left promiscuous mode [ 1501.512215][ T7] device 996 left promiscuous mode [ 1501.582190][ T7] device 997 left promiscuous mode [ 1501.642224][ T7] device 998 left promiscuous mode [ 1501.702258][ T7] device 999 left promiscuous mode [ 1501.752451][ T7] device 1000 left promiscuous mode [ 1501.832165][ T7] device 1001 left promiscuous mode [ 1501.902180][ T7] device 1002 left promiscuous mode [ 1501.962219][ T7] device 1003 left promiscuous mode [ 1502.032199][ T7] device 1004 left promiscuous mode [ 1502.082307][ T7] device 1005 left promiscuous mode [ 1502.132565][ T7] device 1006 left promiscuous mode [ 1502.212034][ T7] device 1007 left promiscuous mode [ 1502.272829][ T7] device 1008 left promiscuous mode [ 1502.332209][ T7] device 1009 left promiscuous mode [ 1502.392213][ T7] device 1010 left promiscuous mode [ 1502.452264][ T7] device 1011 left promiscuous mode [ 1502.532203][ T7] device 1012 left promiscuous mode [ 1502.612172][ T7] device 1013 left promiscuous mode [ 1502.662591][ T7] device 1014 left promiscuous mode [ 1502.732357][ T7] device 1015 left promiscuous mode [ 1502.792620][ T7] device 1016 left promiscuous mode [ 1502.852200][ T7] device 1017 left promiscuous mode [ 1502.912371][ T7] device 1018 left promiscuous mode [ 1502.982221][ T7] device 1019 left promiscuous mode [ 1503.062174][ T7] device 1020 left promiscuous mode [ 1503.102244][ T7] device 1021 left promiscuous mode [ 1503.172492][ T7] device 1022 left promiscuous mode [ 1503.242031][ T7] device 1023 left promiscuous mode [ 1503.302260][ T7] device 1024 left promiscuous mode [ 1503.372563][ T7] device 1025 left promiscuous mode [ 1503.422088][ T7] device 1026 left promiscuous mode [ 1503.491984][ T7] device 1027 left promiscuous mode [ 1503.552043][ T7] device 1028 left promiscuous mode [ 1503.612209][ T7] device 1029 left promiscuous mode [ 1503.662461][ T7] device 1030 left promiscuous mode [ 1503.712449][ T7] device 1031 left promiscuous mode [ 1503.782404][ T7] device 1032 left promiscuous mode [ 1503.842206][ T7] device 1033 left promiscuous mode [ 1503.882356][ T7] device 1034 left promiscuous mode [ 1503.922464][ T7] device 1035 left promiscuous mode [ 1503.972260][ T7] device 1036 left promiscuous mode [ 1504.032262][ T7] device 1037 left promiscuous mode [ 1504.082543][ T7] device 1038 left promiscuous mode [ 1504.152980][ T7] device 1039 left promiscuous mode [ 1504.222274][ T7] device 1040 left promiscuous mode [ 1504.292458][ T7] device 1041 left promiscuous mode [ 1504.341999][ T7] device 1042 left promiscuous mode [ 1504.422036][ T7] device 1043 left promiscuous mode [ 1504.492442][ T7] device 1044 left promiscuous mode [ 1504.562165][ T7] device 1045 left promiscuous mode [ 1504.602485][ T7] device 1046 left promiscuous mode [ 1504.672366][ T7] device 1047 left promiscuous mode [ 1504.712304][ T7] device 1048 left promiscuous mode [ 1504.772300][ T7] device 1049 left promiscuous mode [ 1504.842482][ T7] device 1050 left promiscuous mode [ 1504.902153][ T7] device 1051 left promiscuous mode [ 1504.942329][ T7] device 1052 left promiscuous mode [ 1504.982572][ T7] device 1053 left promiscuous mode [ 1505.022434][ T7] device 1054 left promiscuous mode [ 1505.063041][ T7] device 1055 left promiscuous mode [ 1505.112171][ T7] device 1056 left promiscuous mode [ 1505.182180][ T7] device 1057 left promiscuous mode [ 1505.252305][ T7] device 1058 left promiscuous mode [ 1505.312246][ T7] device 1059 left promiscuous mode [ 1505.362585][ T7] device 1060 left promiscuous mode [ 1505.412015][ T7] device 1061 left promiscuous mode [ 1505.462550][ T7] device 1062 left promiscuous mode [ 1505.511988][ T7] device 1063 left promiscuous mode [ 1505.562469][ T7] device 1064 left promiscuous mode [ 1505.622196][ T7] device 1065 left promiscuous mode [ 1505.662328][ T7] device 1066 left promiscuous mode [ 1505.732547][ T7] device 1067 left promiscuous mode [ 1505.782147][ T7] device 1068 left promiscuous mode [ 1505.852163][ T7] device 1069 left promiscuous mode [ 1505.892378][ T7] device 1070 left promiscuous mode [ 1505.962242][ T7] device 1071 left promiscuous mode [ 1506.012435][ T7] device 1072 left promiscuous mode [ 1506.072112][ T7] device 1073 left promiscuous mode [ 1506.113590][ T7] device 1074 left promiscuous mode [ 1506.192100][ T7] device 1075 left promiscuous mode [ 1506.252255][ T7] device 1076 left promiscuous mode [ 1506.302507][ T7] device 1077 left promiscuous mode [ 1506.351964][ T7] device 1078 left promiscuous mode [ 1506.392254][ T7] device 1079 left promiscuous mode [ 1506.452299][ T7] device 1080 left promiscuous mode [ 1506.512325][ T7] device 1081 left promiscuous mode [ 1506.562400][ T7] device 1082 left promiscuous mode [ 1506.622134][ T7] device 1083 left promiscuous mode [ 1506.712236][ T7] device 1084 left promiscuous mode [ 1506.782289][ T7] device 1085 left promiscuous mode [ 1506.832483][ T7] device 1086 left promiscuous mode [ 1506.902117][ T7] device 1087 left promiscuous mode [ 1506.962320][ T7] device 1088 left promiscuous mode [ 1507.022806][ T7] device 1089 left promiscuous mode [ 1507.072416][ T7] device 1090 left promiscuous mode [ 1507.132062][ T7] device 1091 left promiscuous mode [ 1507.172376][ T7] device 1092 left promiscuous mode [ 1507.223014][ T7] device 1093 left promiscuous mode [ 1507.282560][ T7] device 1094 left promiscuous mode [ 1507.342517][ T7] device 1095 left promiscuous mode [ 1507.402395][ T7] device 1096 left promiscuous mode [ 1507.462560][ T7] device 1097 left promiscuous mode [ 1507.522182][ T7] device 1098 left promiscuous mode [ 1507.582190][ T7] device 1099 left promiscuous mode [ 1507.622285][ T7] device 1100 left promiscuous mode [ 1507.682326][ T7] device 1101 left promiscuous mode [ 1507.732491][ T7] device 1102 left promiscuous mode [ 1507.792463][ T7] device 1103 left promiscuous mode [ 1507.863347][ T7] device 1104 left promiscuous mode [ 1507.942100][ T7] device 1105 left promiscuous mode [ 1507.992360][ T7] device 1106 left promiscuous mode [ 1508.062259][ T7] device 1107 left promiscuous mode [ 1508.132446][ T7] device 1108 left promiscuous mode [ 1508.182368][ T7] device 1109 left promiscuous mode [ 1508.222308][ T7] device 1110 left promiscuous mode [ 1508.272504][ T7] device 1111 left promiscuous mode [ 1508.343018][ T7] device 1112 left promiscuous mode [ 1508.422222][ T7] device 1113 left promiscuous mode [ 1508.482285][ T7] device 1114 left promiscuous mode [ 1508.552108][ T7] device 1115 left promiscuous mode [ 1508.602274][ T7] device 1116 left promiscuous mode [ 1508.662268][ T7] device 1117 left promiscuous mode [ 1508.742192][ T7] device 1118 left promiscuous mode [ 1508.802232][ T7] device 1119 left promiscuous mode [ 1508.852599][ T7] device 1120 left promiscuous mode [ 1508.922039][ T7] device 1121 left promiscuous mode [ 1508.992521][ T7] device 1122 left promiscuous mode [ 1509.052209][ T7] device 1123 left promiscuous mode [ 1509.102490][ T7] device 1124 left promiscuous mode [ 1509.144863][ T7] device 1125 left promiscuous mode [ 1509.212422][ T7] device 1126 left promiscuous mode [ 1509.292000][ T7] device 1127 left promiscuous mode [ 1509.352278][ T7] device 1128 left promiscuous mode [ 1509.422454][ T7] device 1129 left promiscuous mode [ 1509.471979][ T7] device 1130 left promiscuous mode [ 1509.542524][ T7] device 1131 left promiscuous mode [ 1509.582504][ T7] device 1132 left promiscuous mode [ 1509.652029][ T7] device 1133 left promiscuous mode [ 1509.702503][ T7] device 1134 left promiscuous mode [ 1509.752104][ T7] device 1135 left promiscuous mode [ 1509.812405][ T7] device 1136 left promiscuous mode [ 1509.872391][ T7] device 1137 left promiscuous mode [ 1509.922475][ T7] device 1138 left promiscuous mode [ 1509.982472][ T7] device 1139 left promiscuous mode [ 1510.062106][ T7] device 1140 left promiscuous mode [ 1510.132286][ T7] device 1141 left promiscuous mode [ 1510.192247][ T7] device 1142 left promiscuous mode [ 1510.262228][ T7] device 1143 left promiscuous mode [ 1510.322250][ T7] device 1144 left promiscuous mode [ 1510.382098][ T7] device 1145 left promiscuous mode [ 1510.422409][ T7] device 1146 left promiscuous mode [ 1510.482047][ T7] device 1147 left promiscuous mode [ 1510.552436][ T7] device 1148 left promiscuous mode [ 1510.612174][ T7] device 1149 left promiscuous mode [ 1510.672365][ T7] device 1150 left promiscuous mode [ 1510.742261][ T7] device 1151 left promiscuous mode [ 1510.792421][ T7] device 1152 left promiscuous mode [ 1510.892107][ T7] device 1153 left promiscuous mode [ 1510.952305][ T7] device 1154 left promiscuous mode [ 1511.012308][ T7] device 1155 left promiscuous mode [ 1511.072294][ T7] device 1156 left promiscuous mode [ 1511.132270][ T7] device 1157 left promiscuous mode [ 1511.182495][ T7] device 1158 left promiscuous mode [ 1511.222487][ T7] device 1159 left promiscuous mode [ 1511.292339][ T7] device 1160 left promiscuous mode [ 1511.372056][ T7] device 1161 left promiscuous mode [ 1511.432311][ T7] device 1162 left promiscuous mode [ 1511.492308][ T7] device 1163 left promiscuous mode [ 1511.552311][ T7] device 1164 left promiscuous mode [ 1511.602494][ T7] device 1165 left promiscuous mode [ 1511.642998][ T7] device 1166 left promiscuous mode [ 1511.692077][ T7] device 1167 left promiscuous mode [ 1511.742536][ T7] device 1168 left promiscuous mode [ 1511.792434][ T7] device 1169 left promiscuous mode [ 1511.862318][ T7] device 1170 left promiscuous mode [ 1511.912532][ T7] device 1171 left promiscuous mode [ 1511.962098][ T7] device 1172 left promiscuous mode [ 1512.022393][ T7] device 1173 left promiscuous mode [ 1512.082251][ T7] device 1174 left promiscuous mode [ 1512.142366][ T7] device 1175 left promiscuous mode [ 1512.212299][ T7] device 1176 left promiscuous mode [ 1512.262616][ T7] device 1177 left promiscuous mode [ 1512.322407][ T7] device 1178 left promiscuous mode [ 1512.372611][ T7] device 1179 left promiscuous mode [ 1512.422124][ T7] device 1180 left promiscuous mode [ 1512.482369][ T7] device 1181 left promiscuous mode [ 1512.522348][ T7] device 1182 left promiscuous mode [ 1512.572931][ T7] device 1183 left promiscuous mode [ 1512.632127][ T7] device 1184 left promiscuous mode [ 1512.702274][ T7] device 1185 left promiscuous mode [ 1512.752533][ T7] device 1186 left promiscuous mode [ 1512.812163][ T7] device 1187 left promiscuous mode [ 1512.852587][ T7] device 1188 left promiscuous mode [ 1512.932059][ T7] device 1189 left promiscuous mode [ 1512.983398][ T7] device 1190 left promiscuous mode [ 1513.072050][ T7] device 1191 left promiscuous mode [ 1513.122488][ T7] device 1192 left promiscuous mode [ 1513.172083][ T7] device 1193 left promiscuous mode [ 1513.232731][ T7] device 1194 left promiscuous mode [ 1513.292288][ T7] device 1195 left promiscuous mode [ 1513.352298][ T7] device 1196 left promiscuous mode [ 1513.412266][ T7] device 1197 left promiscuous mode [ 1513.472312][ T7] device 1198 left promiscuous mode [ 1513.532241][ T7] device 1199 left promiscuous mode [ 1513.592299][ T7] device 1200 left promiscuous mode [ 1513.672345][ T7] device 1201 left promiscuous mode [ 1513.752447][ T7] device 1202 left promiscuous mode [ 1513.812192][ T7] device 1203 left promiscuous mode [ 1513.872261][ T7] device 1204 left promiscuous mode [ 1513.932206][ T7] device 1205 left promiscuous mode [ 1513.992205][ T7] device 1206 left promiscuous mode [ 1514.072205][ T7] device 1207 left promiscuous mode [ 1514.132227][ T7] device 1208 left promiscuous mode [ 1514.202446][ T7] device 1209 left promiscuous mode [ 1514.262450][ T7] device 1210 left promiscuous mode [ 1514.322080][ T7] device 1211 left promiscuous mode [ 1514.362576][ T7] device 1212 left promiscuous mode [ 1514.422504][ T7] device 1213 left promiscuous mode [ 1514.472427][ T7] device 1214 left promiscuous mode [ 1514.542223][ T7] device 1215 left promiscuous mode [ 1514.602201][ T7] device 1216 left promiscuous mode [ 1514.672250][ T7] device 1217 left promiscuous mode [ 1514.742284][ T7] device 1218 left promiscuous mode [ 1514.802251][ T7] device 1219 left promiscuous mode [ 1514.852450][ T7] device 1220 left promiscuous mode [ 1514.922011][ T7] device 1221 left promiscuous mode [ 1514.982215][ T7] device 1222 left promiscuous mode [ 1515.042239][ T7] device 1223 left promiscuous mode [ 1515.102253][ T7] device 1224 left promiscuous mode [ 1515.162027][ T7] device 1225 left promiscuous mode [ 1515.242347][ T7] device 1226 left promiscuous mode [ 1515.312205][ T7] device 1227 left promiscuous mode [ 1515.372171][ T7] device 1228 left promiscuous mode [ 1515.432354][ T7] device 1229 left promiscuous mode [ 1515.502276][ T7] device 1230 left promiscuous mode [ 1515.562160][ T7] device 1231 left promiscuous mode [ 1515.622385][ T7] device 1232 left promiscuous mode [ 1515.672449][ T7] device 1233 left promiscuous mode [ 1515.732173][ T7] device 1234 left promiscuous mode [ 1515.772536][ T7] device 1235 left promiscuous mode [ 1515.852006][ T7] device 1236 left promiscuous mode [ 1515.912817][ T7] device 1237 left promiscuous mode [ 1515.972210][ T7] device 1238 left promiscuous mode [ 1516.022636][ T7] device 1239 left promiscuous mode [ 1516.092259][ T7] device 1240 left promiscuous mode [ 1516.152074][ T7] device 1241 left promiscuous mode [ 1516.222294][ T7] device 1242 left promiscuous mode [ 1516.282256][ T7] device 1243 left promiscuous mode [ 1516.342430][ T7] device 1244 left promiscuous mode [ 1516.392441][ T7] device 1245 left promiscuous mode [ 1516.442008][ T7] device 1246 left promiscuous mode [ 1516.503128][ T7] device 1247 left promiscuous mode [ 1516.572442][ T7] device 1248 left promiscuous mode [ 1516.622988][ T7] device 1249 left promiscuous mode [ 1516.672178][ T7] device 1250 left promiscuous mode [ 1516.722479][ T7] device 1251 left promiscuous mode [ 1516.782178][ T7] device 1252 left promiscuous mode [ 1516.842303][ T7] device 1253 left promiscuous mode [ 1516.882031][ T7] device 1254 left promiscuous mode [ 1516.952455][ T7] device 1255 left promiscuous mode [ 1517.012282][ T7] device 1256 left promiscuous mode [ 1517.052583][ T7] device 1257 left promiscuous mode [ 1517.122235][ T7] device 1258 left promiscuous mode [ 1517.162846][ T7] device 1259 left promiscuous mode [ 1517.212381][ T7] device 1260 left promiscuous mode [ 1517.272270][ T7] device 1261 left promiscuous mode [ 1517.352205][ T7] device 1262 left promiscuous mode [ 1517.402417][ T7] device 1263 left promiscuous mode [ 1517.472093][ T7] device 1264 left promiscuous mode [ 1517.542488][ T7] device 1265 left promiscuous mode [ 1517.582252][ T7] device 1266 left promiscuous mode [ 1517.622436][ T7] device 1267 left promiscuous mode [ 1517.672509][ T7] device 1268 left promiscuous mode [ 1517.732246][ T7] device 1269 left promiscuous mode [ 1517.772513][ T7] device 1270 left promiscuous mode [ 1517.812539][ T7] device 1271 left promiscuous mode [ 1517.872105][ T7] device 1272 left promiscuous mode [ 1517.912465][ T7] device 1273 left promiscuous mode [ 1517.972338][ T7] device 1274 left promiscuous mode [ 1518.032634][ T7] device 1275 left promiscuous mode [ 1518.112040][ T7] device 1276 left promiscuous mode [ 1518.172334][ T7] device 1277 left promiscuous mode [ 1518.223056][ T7] device 1278 left promiscuous mode [ 1518.272005][ T7] device 1279 left promiscuous mode [ 1518.322499][ T7] device 1280 left promiscuous mode [ 1518.371941][ T7] device 1281 left promiscuous mode [ 1518.422632][ T7] device 1282 left promiscuous mode [ 1518.492083][ T7] device 1283 left promiscuous mode [ 1518.542479][ T7] device 1284 left promiscuous mode [ 1518.592494][ T7] device 1285 left promiscuous mode [ 1518.632262][ T7] device 1286 left promiscuous mode [ 1518.682453][ T7] device 1287 left promiscuous mode [ 1518.752165][ T7] device 1288 left promiscuous mode [ 1518.812236][ T7] device 1289 left promiscuous mode [ 1518.882395][ T7] device 1290 left promiscuous mode [ 1518.952242][ T7] device 1291 left promiscuous mode [ 1519.002971][ T7] device 1292 left promiscuous mode [ 1519.051988][ T7] device 1293 left promiscuous mode [ 1519.102498][ T7] device 1294 left promiscuous mode [ 1519.172268][ T7] device 1295 left promiscuous mode [ 1519.232247][ T7] device 1296 left promiscuous mode [ 1519.282546][ T7] device 1297 left promiscuous mode [ 1519.332031][ T7] device 1298 left promiscuous mode [ 1519.382630][ T7] device 1299 left promiscuous mode [ 1519.472008][ T7] device 1300 left promiscuous mode [ 1519.522989][ T7] device 1301 left promiscuous mode [ 1519.572005][ T7] device 1302 left promiscuous mode [ 1519.622573][ T7] device 1303 left promiscuous mode [ 1519.692143][ T7] device 1304 left promiscuous mode [ 1519.762295][ T7] device 1305 left promiscuous mode [ 1519.822339][ T7] device 1306 left promiscuous mode [ 1519.882278][ T7] device 1307 left promiscuous mode [ 1519.932529][ T7] device 1308 left promiscuous mode [ 1520.012100][ T7] device 1309 left promiscuous mode [ 1520.072286][ T7] device 1310 left promiscuous mode [ 1520.132363][ T7] device 1311 left promiscuous mode [ 1520.182616][ T7] device 1312 left promiscuous mode [ 1520.252234][ T7] device 1313 left promiscuous mode [ 1520.292505][ T7] device 1314 left promiscuous mode [ 1520.352108][ T7] device 1315 left promiscuous mode [ 1520.412181][ T7] device 1316 left promiscuous mode [ 1520.472254][ T7] device 1317 left promiscuous mode [ 1520.512450][ T7] device 1318 left promiscuous mode [ 1520.592026][ T7] device 1319 left promiscuous mode [ 1520.662664][ T7] device 1320 left promiscuous mode [ 1520.732208][ T7] device 1321 left promiscuous mode [ 1520.802270][ T7] device 1322 left promiscuous mode [ 1520.842399][ T7] device 1323 left promiscuous mode [ 1520.892470][ T7] device 1324 left promiscuous mode [ 1520.962264][ T7] device 1325 left promiscuous mode [ 1521.022238][ T7] device 1326 left promiscuous mode [ 1521.072709][ T7] device 1327 left promiscuous mode [ 1521.132274][ T7] device 1328 left promiscuous mode [ 1521.172374][ T7] device 1329 left promiscuous mode [ 1521.242258][ T7] device 1330 left promiscuous mode [ 1521.302402][ T7] device 1331 left promiscuous mode [ 1521.362886][ T7] device 1332 left promiscuous mode [ 1521.432210][ T7] device 1333 left promiscuous mode [ 1521.472561][ T7] device 1334 left promiscuous mode [ 1521.552007][ T7] device 1335 left promiscuous mode [ 1521.612346][ T7] device 1336 left promiscuous mode [ 1521.662590][ T7] device 1337 left promiscuous mode [ 1521.742056][ T7] device 1338 left promiscuous mode [ 1521.812306][ T7] device 1339 left promiscuous mode [ 1521.872250][ T7] device 1340 left promiscuous mode [ 1521.952055][ T7] device 1341 left promiscuous mode [ 1522.022629][ T7] device 1342 left promiscuous mode [ 1522.101976][ T7] device 1343 left promiscuous mode [ 1522.162289][ T7] device 1344 left promiscuous mode [ 1522.222267][ T7] device 1345 left promiscuous mode [ 1522.282077][ T7] device 1346 left promiscuous mode [ 1522.342303][ T7] device 1347 left promiscuous mode [ 1522.402252][ T7] device 1348 left promiscuous mode [ 1522.442377][ T7] device 1349 left promiscuous mode [ 1522.518450][ T7] device 1350 left promiscuous mode [ 1522.572425][ T7] device 1351 left promiscuous mode [ 1522.622276][ T7] device 1352 left promiscuous mode [ 1522.681996][ T7] device 1353 left promiscuous mode [ 1522.742420][ T7] device 1354 left promiscuous mode [ 1522.792440][ T7] device 1355 left promiscuous mode [ 1522.862225][ T7] device 1356 left promiscuous mode [ 1522.932121][ T7] device 1357 left promiscuous mode [ 1522.993094][ T7] device 1358 left promiscuous mode [ 1523.062250][ T7] device 1359 left promiscuous mode [ 1523.102522][ T7] device 1360 left promiscuous mode [ 1523.162574][ T7] device 1361 left promiscuous mode [ 1523.222550][ T7] device 1362 left promiscuous mode [ 1523.263350][ T7] device 1363 left promiscuous mode [ 1523.322082][ T7] device 1364 left promiscuous mode [ 1523.382842][ T7] device 1365 left promiscuous mode [ 1523.442232][ T7] device 1366 left promiscuous mode [ 1523.492525][ T7] device 1367 left promiscuous mode [ 1523.542400][ T7] device 1368 left promiscuous mode [ 1523.592344][ T7] device 1369 left promiscuous mode [ 1523.662398][ T7] device 1370 left promiscuous mode [ 1523.712429][ T7] device 1371 left promiscuous mode [ 1523.782278][ T7] device 1372 left promiscuous mode [ 1523.822189][ T7] device 1373 left promiscuous mode [ 1523.872398][ T7] device 1374 left promiscuous mode [ 1523.942288][ T7] device 1375 left promiscuous mode [ 1523.992564][ T7] device 1376 left promiscuous mode [ 1524.062380][ T7] device 1377 left promiscuous mode [ 1524.122200][ T7] device 1378 left promiscuous mode [ 1524.182205][ T7] device 1379 left promiscuous mode [ 1524.232201][ T7] device 1380 left promiscuous mode [ 1524.282377][ T7] device 1381 left promiscuous mode [ 1524.352201][ T7] device 1382 left promiscuous mode [ 1524.412289][ T7] device 1383 left promiscuous mode [ 1524.462419][ T7] device 1384 left promiscuous mode [ 1524.522139][ T7] device 1385 left promiscuous mode [ 1524.562537][ T7] device 1386 left promiscuous mode [ 1524.622060][ T7] device 1387 left promiscuous mode [ 1524.662734][ T7] device 1388 left promiscuous mode [ 1524.722158][ T7] device 1389 left promiscuous mode [ 1524.762416][ T7] device 1390 left promiscuous mode [ 1524.802451][ T7] device 1391 left promiscuous mode [ 1524.862086][ T7] device 1392 left promiscuous mode [ 1524.922486][ T7] device 1393 left promiscuous mode [ 1524.962984][ T7] device 1394 left promiscuous mode [ 1525.012564][ T7] device 1395 left promiscuous mode [ 1525.082296][ T7] device 1396 left promiscuous mode [ 1525.142277][ T7] device 1397 left promiscuous mode [ 1525.192461][ T7] device 1398 left promiscuous mode [ 1525.242254][ T7] device 1399 left promiscuous mode [ 1525.302265][ T7] device 1400 left promiscuous mode [ 1525.372455][ T7] device 1401 left promiscuous mode [ 1525.412459][ T7] device 1402 left promiscuous mode [ 1525.472442][ T7] device 1403 left promiscuous mode [ 1525.522187][ T7] device 1404 left promiscuous mode [ 1525.572450][ T7] device 1405 left promiscuous mode [ 1525.622359][ T7] device 1406 left promiscuous mode [ 1525.692508][ T7] device 1407 left promiscuous mode [ 1525.742404][ T7] device 1408 left promiscuous mode [ 1525.782446][ T7] device 1409 left promiscuous mode [ 1525.842155][ T7] device 1410 left promiscuous mode [ 1525.892454][ T7] device 1411 left promiscuous mode [ 1525.942483][ T7] device 1412 left promiscuous mode [ 1526.012625][ T7] device 1413 left promiscuous mode [ 1526.062055][ T7] device 1414 left promiscuous mode [ 1526.102465][ T7] device 1415 left promiscuous mode [ 1526.142273][ T7] device 1416 left promiscuous mode [ 1526.192479][ T7] device 1417 left promiscuous mode [ 1526.232441][ T7] device 1418 left promiscuous mode [ 1526.292273][ T7] device 1419 left promiscuous mode [ 1526.352288][ T7] device 1420 left promiscuous mode [ 1526.392292][ T7] device 1421 left promiscuous mode [ 1526.452246][ T7] device 1422 left promiscuous mode [ 1526.522237][ T7] device 1423 left promiscuous mode [ 1526.562386][ T7] device 1424 left promiscuous mode [ 1526.632401][ T7] device 1425 left promiscuous mode [ 1526.682553][ T7] device 1426 left promiscuous mode [ 1526.752986][ T7] device 1427 left promiscuous mode [ 1526.832043][ T7] device 1428 left promiscuous mode [ 1526.892293][ T7] device 1429 left promiscuous mode [ 1526.952284][ T7] device 1430 left promiscuous mode [ 1527.012371][ T7] device 1431 left promiscuous mode [ 1527.062430][ T7] device 1432 left promiscuous mode [ 1527.122075][ T7] device 1433 left promiscuous mode [ 1527.182419][ T7] device 1434 left promiscuous mode [ 1527.232488][ T7] device 1435 left promiscuous mode [ 1527.282347][ T7] device 1436 left promiscuous mode [ 1527.342389][ T7] device 1437 left promiscuous mode [ 1527.392494][ T7] device 1438 left promiscuous mode [ 1527.462217][ T7] device 1439 left promiscuous mode [ 1527.522199][ T7] device 1440 left promiscuous mode [ 1527.582200][ T7] device 1441 left promiscuous mode [ 1527.642207][ T7] device 1442 left promiscuous mode [ 1527.702262][ T7] device 1443 left promiscuous mode [ 1527.772154][ T7] device 1444 left promiscuous mode [ 1527.812501][ T7] device 1445 left promiscuous mode [ 1527.852568][ T7] device 1446 left promiscuous mode [ 1527.912250][ T7] device 1447 left promiscuous mode [ 1527.992100][ T7] device 1448 left promiscuous mode [ 1528.062475][ T7] device 1449 left promiscuous mode [ 1528.122052][ T7] device 1450 left promiscuous mode [ 1528.192311][ T7] device 1451 left promiscuous mode [ 1528.262441][ T7] device 1452 left promiscuous mode [ 1528.322043][ T7] device 1453 left promiscuous mode [ 1528.392403][ T7] device 1454 left promiscuous mode [ 1528.452316][ T7] device 1455 left promiscuous mode [ 1528.512345][ T7] device 1456 left promiscuous mode [ 1528.562360][ T7] device 1457 left promiscuous mode [ 1528.612157][ T7] device 1458 left promiscuous mode [ 1528.662540][ T7] device 1459 left promiscuous mode [ 1528.722090][ T7] device 1460 left promiscuous mode [ 1528.772479][ T7] device 1461 left promiscuous mode [ 1528.822496][ T7] device 1462 left promiscuous mode [ 1528.892068][ T7] device 1463 left promiscuous mode [ 1528.952304][ T7] device 1464 left promiscuous mode [ 1529.012354][ T7] device 1465 left promiscuous mode [ 1529.062736][ T7] device 1466 left promiscuous mode [ 1529.102478][ T7] device 1467 left promiscuous mode [ 1529.142336][ T7] device 1468 left promiscuous mode [ 1529.192497][ T7] device 1469 left promiscuous mode [ 1529.252562][ T7] device 1470 left promiscuous mode [ 1529.292347][ T7] device 1471 left promiscuous mode [ 1529.362604][ T7] device 1472 left promiscuous mode [ 1529.402476][ T7] device 1473 left promiscuous mode [ 1529.472334][ T7] device 1474 left promiscuous mode [ 1529.552025][ T7] device 1475 left promiscuous mode [ 1529.632317][ T7] device 1476 left promiscuous mode [ 1529.712240][ T7] device 1477 left promiscuous mode [ 1529.762416][ T7] device 1478 left promiscuous mode [ 1529.822278][ T7] device 1479 left promiscuous mode [ 1529.872464][ T7] device 1480 left promiscuous mode [ 1529.932281][ T7] device 1481 left promiscuous mode [ 1529.972452][ T7] device 1482 left promiscuous mode [ 1530.012396][ T7] device 1483 left promiscuous mode [ 1530.052449][ T7] device 1484 left promiscuous mode [ 1530.132441][ T7] device 1485 left promiscuous mode [ 1530.201998][ T7] device 1486 left promiscuous mode [ 1530.252483][ T7] device 1487 left promiscuous mode [ 1530.302479][ T7] device 1488 left promiscuous mode [ 1530.362472][ T7] device 1489 left promiscuous mode [ 1530.432080][ T7] device 1490 left promiscuous mode [ 1530.492334][ T7] device 1491 left promiscuous mode [ 1530.542480][ T7] device 1492 left promiscuous mode [ 1530.583147][ T7] device 1493 left promiscuous mode [ 1530.632004][ T7] device 1494 left promiscuous mode [ 1530.682059][ T7] device 1495 left promiscuous mode [ 1530.722500][ T7] device 1496 left promiscuous mode [ 1530.762291][ T7] device 1497 left promiscuous mode [ 1530.812440][ T7] device 1498 left promiscuous mode [ 1530.872050][ T7] device 1499 left promiscuous mode [ 1530.922219][ T7] device 1500 left promiscuous mode [ 1530.992408][ T7] device 1501 left promiscuous mode [ 1531.032490][ T7] device 1502 left promiscuous mode [ 1531.092068][ T7] device 1503 left promiscuous mode [ 1531.132621][ T7] device 1504 left promiscuous mode [ 1531.192241][ T7] device 1505 left promiscuous mode [ 1531.252243][ T7] device 1506 left promiscuous mode [ 1531.332222][ T7] device 1507 left promiscuous mode [ 1531.392500][ T7] device 1508 left promiscuous mode [ 1531.432456][ T7] device 1509 left promiscuous mode [ 1531.472508][ T7] device 1510 left promiscuous mode [ 1531.532084][ T7] device 1511 left promiscuous mode [ 1531.572525][ T7] device 1512 left promiscuous mode [ 1531.612475][ T7] device 1513 left promiscuous mode [ 1531.653359][ T7] device 1514 left promiscuous mode [ 1531.712164][ T7] device 1515 left promiscuous mode [ 1531.752444][ T7] device 1516 left promiscuous mode [ 1531.802278][ T7] device 1517 left promiscuous mode [ 1531.872059][ T7] device 1518 left promiscuous mode [ 1531.932324][ T7] device 1519 left promiscuous mode [ 1531.982457][ T7] device 1520 left promiscuous mode [ 1532.022518][ T7] device 1521 left promiscuous mode [ 1532.082187][ T7] device 1522 left promiscuous mode [ 1532.132531][ T7] device 1523 left promiscuous mode [ 1532.183495][ T7] device 1524 left promiscuous mode [ 1532.252122][ T7] device 1525 left promiscuous mode [ 1532.322357][ T7] device 1526 left promiscuous mode [ 1532.362267][ T7] device 1527 left promiscuous mode [ 1532.412486][ T7] device 1528 left promiscuous mode [ 1532.452489][ T7] device 1529 left promiscuous mode [ 1532.512396][ T7] device 1530 left promiscuous mode [ 1532.582896][ T7] device 1531 left promiscuous mode [ 1532.652147][ T7] device 1532 left promiscuous mode [ 1532.692480][ T7] device 1533 left promiscuous mode [ 1532.762130][ T7] device 1534 left promiscuous mode [ 1532.802477][ T7] device 1535 left promiscuous mode [ 1532.872189][ T7] device 1536 left promiscuous mode [ 1532.922185][ T7] device 1537 left promiscuous mode [ 1532.982397][ T7] device 1538 left promiscuous mode [ 1533.042341][ T7] device 1539 left promiscuous mode [ 1533.082232][ T7] device 1540 left promiscuous mode [ 1533.152517][ T7] device 1541 left promiscuous mode [ 1533.222046][ T7] device 1542 left promiscuous mode [ 1533.282462][ T7] device 1543 left promiscuous mode [ 1533.352245][ T7] device 1544 left promiscuous mode [ 1533.412401][ T7] device 1545 left promiscuous mode [ 1533.462377][ T7] device 1546 left promiscuous mode [ 1533.532234][ T7] device 1547 left promiscuous mode [ 1533.602482][ T7] device 1548 left promiscuous mode [ 1533.662202][ T7] device 1549 left promiscuous mode [ 1533.702426][ T7] device 1550 left promiscuous mode [ 1533.742368][ T7] device 1551 left promiscuous mode [ 1533.812218][ T7] device 1552 left promiscuous mode [ 1533.862619][ T7] device 1553 left promiscuous mode [ 1533.932073][ T7] device 1554 left promiscuous mode [ 1533.982241][ T7] device 1555 left promiscuous mode [ 1534.042244][ T7] device 1556 left promiscuous mode [ 1534.102408][ T7] device 1557 left promiscuous mode [ 1534.152561][ T7] device 1558 left promiscuous mode [ 1534.212282][ T7] device 1559 left promiscuous mode [ 1534.272380][ T7] device 1560 left promiscuous mode [ 1534.342434][ T7] device 1561 left promiscuous mode [ 1534.402237][ T7] device 1562 left promiscuous mode [ 1534.462220][ T7] device 1563 left promiscuous mode [ 1534.522212][ T7] device 1564 left promiscuous mode [ 1534.582263][ T7] device 1565 left promiscuous mode [ 1534.622195][ T7] device 1566 left promiscuous mode [ 1534.672469][ T7] device 1567 left promiscuous mode [ 1534.732017][ T7] device 1568 left promiscuous mode [ 1534.772455][ T7] device 1569 left promiscuous mode [ 1534.812437][ T7] device 1570 left promiscuous mode [ 1534.852490][ T7] device 1571 left promiscuous mode [ 1534.892438][ T7] device 1572 left promiscuous mode [ 1534.932449][ T7] device 1573 left promiscuous mode [ 1534.992270][ T7] device 1574 left promiscuous mode [ 1535.082223][ T7] device 1575 left promiscuous mode [ 1535.152281][ T7] device 1576 left promiscuous mode [ 1535.212204][ T7] device 1577 left promiscuous mode [ 1535.272297][ T7] device 1578 left promiscuous mode [ 1535.342500][ T7] device 1579 left promiscuous mode [ 1535.442160][ T7] device 1580 left promiscuous mode [ 1535.512361][ T7] device 1581 left promiscuous mode [ 1535.562575][ T7] device 1582 left promiscuous mode [ 1535.611964][ T7] device 1583 left promiscuous mode [ 1535.662491][ T7] device 1584 left promiscuous mode [ 1535.702453][ T7] device 1585 left promiscuous mode [ 1535.762526][ T7] device 1586 left promiscuous mode [ 1535.822399][ T7] device 1587 left promiscuous mode [ 1535.872215][ T7] device 1588 left promiscuous mode [ 1535.942688][ T7] device 1589 left promiscuous mode [ 1535.992430][ T7] device 1590 left promiscuous mode [ 1536.042257][ T7] device 1591 left promiscuous mode [ 1536.112403][ T7] device 1592 left promiscuous mode [ 1536.172045][ T7] device 1593 left promiscuous mode [ 1536.212418][ T7] device 1594 left promiscuous mode [ 1536.272432][ T7] device 1595 left promiscuous mode [ 1536.342307][ T7] device 1596 left promiscuous mode [ 1536.382633][ T7] device 1597 left promiscuous mode [ 1536.452265][ T7] device 1598 left promiscuous mode [ 1536.512288][ T7] device 1599 left promiscuous mode [ 1536.572247][ T7] device 1600 left promiscuous mode [ 1536.632007][ T7] device 1601 left promiscuous mode [ 1536.702452][ T7] device 1602 left promiscuous mode [ 1536.742477][ T7] device 1603 left promiscuous mode [ 1536.812362][ T7] device 1604 left promiscuous mode [ 1536.872361][ T7] device 1605 left promiscuous mode [ 1536.922416][ T7] device 1606 left promiscuous mode [ 1536.962421][ T7] device 1607 left promiscuous mode [ 1537.032338][ T7] device 1608 left promiscuous mode [ 1537.092280][ T7] device 1609 left promiscuous mode [ 1537.152267][ T7] device 1610 left promiscuous mode [ 1537.202487][ T7] device 1611 left promiscuous mode [ 1537.242517][ T7] device 1612 left promiscuous mode [ 1537.302738][ T7] device 1613 left promiscuous mode [ 1537.362066][ T7] device 1614 left promiscuous mode [ 1537.432306][ T7] device 1615 left promiscuous mode [ 1537.482442][ T7] device 1616 left promiscuous mode [ 1537.542190][ T7] device 1617 left promiscuous mode [ 1537.602246][ T7] device 1618 left promiscuous mode [ 1537.672269][ T7] device 1619 left promiscuous mode [ 1537.742464][ T7] device 1620 left promiscuous mode [ 1537.782488][ T7] device 1621 left promiscuous mode [ 1537.852297][ T7] device 1622 left promiscuous mode [ 1537.912327][ T7] device 1623 left promiscuous mode [ 1537.962679][ T7] device 1624 left promiscuous mode [ 1538.032283][ T7] device 1625 left promiscuous mode [ 1538.072553][ T7] device 1626 left promiscuous mode [ 1538.112454][ T7] device 1627 left promiscuous mode [ 1538.172047][ T7] device 1628 left promiscuous mode [ 1538.212436][ T7] device 1629 left promiscuous mode [ 1538.252349][ T7] device 1630 left promiscuous mode [ 1538.292364][ T7] device 1631 left promiscuous mode [ 1538.332350][ T7] device 1632 left promiscuous mode [ 1538.372399][ T7] device 1633 left promiscuous mode [ 1538.422526][ T7] device 1634 left promiscuous mode [ 1538.472408][ T7] device 1635 left promiscuous mode [ 1538.522401][ T7] device 1636 left promiscuous mode [ 1538.562307][ T7] device 1637 left promiscuous mode [ 1538.622001][ T7] device 1638 left promiscuous mode [ 1538.692485][ T7] device 1639 left promiscuous mode [ 1538.752177][ T7] device 1640 left promiscuous mode [ 1538.792417][ T7] device 1641 left promiscuous mode [ 1538.832529][ T7] device 1642 left promiscuous mode [ 1538.892273][ T7] device 1643 left promiscuous mode [ 1538.962422][ T7] device 1644 left promiscuous mode [ 1539.002223][ T7] device 1645 left promiscuous mode [ 1539.082197][ T7] device 1646 left promiscuous mode [ 1539.142289][ T7] device 1647 left promiscuous mode [ 1539.192508][ T7] device 1648 left promiscuous mode [ 1539.252144][ T7] device 1649 left promiscuous mode [ 1539.312352][ T7] device 1650 left promiscuous mode [ 1539.372025][ T7] device 1651 left promiscuous mode [ 1539.422453][ T7] device 1652 left promiscuous mode [ 1539.492110][ T7] device 1653 left promiscuous mode [ 1539.552172][ T7] device 1654 left promiscuous mode [ 1539.632196][ T7] device 1655 left promiscuous mode [ 1539.702470][ T7] device 1656 left promiscuous mode [ 1539.742509][ T7] device 1657 left promiscuous mode [ 1539.812291][ T7] device 1658 left promiscuous mode [ 1539.862662][ T7] device 1659 left promiscuous mode [ 1539.922104][ T7] device 1660 left promiscuous mode [ 1539.962447][ T7] device 1661 left promiscuous mode [ 1540.002404][ T7] device 1662 left promiscuous mode [ 1540.072240][ T7] device 1663 left promiscuous mode [ 1540.122337][ T7] device 1664 left promiscuous mode [ 1540.162348][ T7] device 1665 left promiscuous mode [ 1540.232406][ T7] device 1666 left promiscuous mode [ 1540.282467][ T7] device 1667 left promiscuous mode [ 1540.352322][ T7] device 1668 left promiscuous mode [ 1540.412282][ T7] device 1669 left promiscuous mode [ 1540.462550][ T7] device 1670 left promiscuous mode [ 1540.512057][ T7] device 1671 left promiscuous mode [ 1540.562497][ T7] device 1672 left promiscuous mode [ 1540.622045][ T7] device 1673 left promiscuous mode [ 1540.662524][ T7] device 1674 left promiscuous mode [ 1540.702495][ T7] device 1675 left promiscuous mode [ 1540.762491][ T7] device 1676 left promiscuous mode [ 1540.802499][ T7] device 1677 left promiscuous mode [ 1540.872370][ T7] device 1678 left promiscuous mode [ 1540.932301][ T7] device 1679 left promiscuous mode [ 1540.992267][ T7] device 1680 left promiscuous mode [ 1541.052283][ T7] device 1681 left promiscuous mode [ 1541.102500][ T7] device 1682 left promiscuous mode [ 1541.151979][ T7] device 1683 left promiscuous mode [ 1541.222717][ T7] device 1684 left promiscuous mode [ 1541.302434][ T7] device 1685 left promiscuous mode [ 1541.372228][ T7] device 1686 left promiscuous mode [ 1541.422290][ T7] device 1687 left promiscuous mode [ 1541.482300][ T7] device 1688 left promiscuous mode [ 1541.552507][ T7] device 1689 left promiscuous mode [ 1541.612138][ T7] device 1690 left promiscuous mode [ 1541.662504][ T7] device 1691 left promiscuous mode [ 1541.702407][ T7] device 1692 left promiscuous mode [ 1541.742220][ T7] device 1693 left promiscuous mode [ 1541.792350][ T7] device 1694 left promiscuous mode [ 1541.852775][ T7] device 1695 left promiscuous mode [ 1541.912427][ T7] device 1696 left promiscuous mode [ 1541.972077][ T7] device 1697 left promiscuous mode [ 1542.012492][ T7] device 1698 left promiscuous mode [ 1542.052460][ T7] device 1699 left promiscuous mode [ 1542.113412][ T7] device 1700 left promiscuous mode [ 1542.162125][ T7] device 1701 left promiscuous mode [ 1542.222254][ T7] device 1702 left promiscuous mode [ 1542.282294][ T7] device 1703 left promiscuous mode [ 1542.342299][ T7] device 1704 left promiscuous mode [ 1542.392495][ T7] device 1705 left promiscuous mode [ 1542.452284][ T7] device 1706 left promiscuous mode [ 1542.512284][ T7] device 1707 left promiscuous mode [ 1542.562496][ T7] device 1708 left promiscuous mode [ 1542.642026][ T7] device 1709 left promiscuous mode [ 1542.702312][ T7] device 1710 left promiscuous mode [ 1542.752473][ T7] device 1711 left promiscuous mode [ 1542.792482][ T7] device 1712 left promiscuous mode [ 1542.862313][ T7] device 1713 left promiscuous mode [ 1542.942071][ T7] device 1714 left promiscuous mode [ 1543.012549][ T7] device 1715 left promiscuous mode [ 1543.052478][ T7] device 1716 left promiscuous mode [ 1543.092453][ T7] device 1717 left promiscuous mode [ 1543.172028][ T7] device 1718 left promiscuous mode [ 1543.242470][ T7] device 1719 left promiscuous mode [ 1543.302161][ T7] device 1720 left promiscuous mode [ 1543.372295][ T7] device 1721 left promiscuous mode [ 1543.432244][ T7] device 1722 left promiscuous mode [ 1543.492316][ T7] device 1723 left promiscuous mode [ 1543.552333][ T7] device 1724 left promiscuous mode [ 1543.602478][ T7] device 1725 left promiscuous mode [ 1543.682156][ T7] device 1726 left promiscuous mode [ 1543.742420][ T7] device 1727 left promiscuous mode [ 1543.802961][ T7] device 1728 left promiscuous mode [ 1543.872267][ T7] device 1729 left promiscuous mode [ 1543.932895][ T7] device 1730 left promiscuous mode [ 1543.982447][ T7] device 1731 left promiscuous mode [ 1544.052226][ T7] device 1732 left promiscuous mode [ 1544.122422][ T7] device 1733 left promiscuous mode [ 1544.162479][ T7] device 1734 left promiscuous mode [ 1544.222462][ T7] device 1735 left promiscuous mode [ 1544.292275][ T7] device 1736 left promiscuous mode [ 1544.342456][ T7] device 1737 left promiscuous mode [ 1544.402207][ T7] device 1738 left promiscuous mode [ 1544.442413][ T7] device 1739 left promiscuous mode [ 1544.482412][ T7] device 1740 left promiscuous mode [ 1544.542254][ T7] device 1741 left promiscuous mode [ 1544.602239][ T7] device 1742 left promiscuous mode [ 1544.662268][ T7] device 1743 left promiscuous mode [ 1544.712516][ T7] device 1744 left promiscuous mode [ 1544.772102][ T7] device 1745 left promiscuous mode [ 1544.812491][ T7] device 1746 left promiscuous mode [ 1544.892174][ T7] device 1747 left promiscuous mode [ 1544.952347][ T7] device 1748 left promiscuous mode [ 1545.002474][ T7] device 1749 left promiscuous mode [ 1545.052043][ T7] device 1750 left promiscuous mode [ 1545.122121][ T7] device 1751 left promiscuous mode [ 1545.192236][ T7] device 1752 left promiscuous mode [ 1545.252263][ T7] device 1753 left promiscuous mode [ 1545.312246][ T7] device 1754 left promiscuous mode [ 1545.372247][ T7] device 1755 left promiscuous mode [ 1545.432242][ T7] device 1756 left promiscuous mode [ 1545.512267][ T7] device 1757 left promiscuous mode [ 1545.582455][ T7] device 1758 left promiscuous mode [ 1545.624048][ T7] device 1759 left promiscuous mode [ 1545.702096][ T7] device 1760 left promiscuous mode [ 1545.762253][ T7] device 1761 left promiscuous mode [ 1545.832521][ T7] device 1762 left promiscuous mode [ 1545.892262][ T7] device 1763 left promiscuous mode [ 1545.952249][ T7] device 1764 left promiscuous mode [ 1546.031970][ T7] device 1765 left promiscuous mode [ 1546.092317][ T7] device 1766 left promiscuous mode [ 1546.152314][ T7] device 1767 left promiscuous mode [ 1546.212244][ T7] device 1768 left promiscuous mode [ 1546.262802][ T7] device 1769 left promiscuous mode [ 1546.342165][ T7] device 1770 left promiscuous mode [ 1546.402329][ T7] device 1771 left promiscuous mode [ 1546.462267][ T7] device 1772 left promiscuous mode [ 1546.522286][ T7] device 1773 left promiscuous mode [ 1546.572433][ T7] device 1774 left promiscuous mode [ 1546.652008][ T7] device 1775 left promiscuous mode [ 1546.712286][ T7] device 1776 left promiscuous mode [ 1546.782076][ T7] device 1777 left promiscuous mode [ 1546.852365][ T7] device 1778 left promiscuous mode [ 1546.912267][ T7] device 1779 left promiscuous mode [ 1546.952808][ T7] device 1780 left promiscuous mode [ 1547.002342][ T7] device 1781 left promiscuous mode [ 1547.072455][ T7] device 1782 left promiscuous mode [ 1547.132200][ T7] device 1783 left promiscuous mode [ 1547.172506][ T7] device 1784 left promiscuous mode [ 1547.232207][ T7] device 1785 left promiscuous mode [ 1547.282528][ T7] device 1786 left promiscuous mode [ 1547.322280][ T7] device 1787 left promiscuous mode [ 1547.382247][ T7] device 1788 left promiscuous mode [ 1547.442321][ T7] device 1789 left promiscuous mode [ 1547.492492][ T7] device 1790 left promiscuous mode [ 1547.552437][ T7] device 1791 left promiscuous mode [ 1547.613174][ T7] device 1792 left promiscuous mode [ 1547.672218][ T7] device 1793 left promiscuous mode [ 1547.722188][ T7] device 1794 left promiscuous mode [ 1547.806140][T21820] device 0 entered promiscuous mode [ 1547.811594][ T7] device 0 left promiscuous mode [ 1547.852402][ T7] device 1 left promiscuous mode [ 1547.892428][ T7] device 2 left promiscuous mode [ 1547.932384][ T7] device 3 left promiscuous mode [ 1547.982207][ T7] device 4 left promiscuous mode [ 1548.032435][ T7] device 5 left promiscuous mode [ 1548.092259][ T7] device 6 left promiscuous mode [ 1548.152234][ T7] device 7 left promiscuous mode [ 1548.232236][ T7] device 8 left promiscuous mode [ 1548.292241][ T7] device 9 left promiscuous mode [ 1548.352208][ T7] device 10 left promiscuous mode [ 1548.412233][ T7] device 11 left promiscuous mode [ 1548.472239][ T7] device 12 left promiscuous mode [ 1548.562453][ T7] device 13 left promiscuous mode [ 1548.622096][ T7] device 14 left promiscuous mode [ 1548.692378][ T7] device 15 left promiscuous mode [ 1548.762224][ T7] device 16 left promiscuous mode [ 1548.812253][ T7] device 17 left promiscuous mode [ 1548.872271][ T7] device 18 left promiscuous mode [ 1548.932229][ T7] device 19 left promiscuous mode [ 1549.002447][ T7] device 20 left promiscuous mode [ 1549.042474][ T7] device 21 left promiscuous mode [ 1549.082437][ T7] device 22 left promiscuous mode [ 1549.142463][ T7] device 23 left promiscuous mode [ 1549.212163][ T7] device 24 left promiscuous mode [ 1549.282217][ T7] device 25 left promiscuous mode [ 1549.342263][ T7] device 26 left promiscuous mode [ 1549.402497][ T7] device 27 left promiscuous mode [ 1549.472227][ T7] device 28 left promiscuous mode [ 1549.532201][ T7] device 29 left promiscuous mode [ 1549.602414][ T7] device 30 left promiscuous mode [ 1549.642530][ T7] device 31 left promiscuous mode [ 1549.702219][ T7] device 32 left promiscuous mode [ 1549.772145][ T7] device 33 left promiscuous mode [ 1549.812394][ T7] device 34 left promiscuous mode [ 1549.852409][ T7] device 35 left promiscuous mode [ 1549.912388][ T7] device 36 left promiscuous mode [ 1549.972410][ T7] device 37 left promiscuous mode [ 1550.032382][ T7] device 38 left promiscuous mode [ 1550.082588][ T7] device 39 left promiscuous mode [ 1550.142450][ T7] device 40 left promiscuous mode [ 1550.192501][ T7] device 41 left promiscuous mode [ 1550.252206][ T7] device 42 left promiscuous mode [ 1550.292357][ T7] device 43 left promiscuous mode [ 1550.342551][ T7] device 44 left promiscuous mode [ 1550.402104][ T7] device 45 left promiscuous mode [ 1550.472219][ T7] device 46 left promiscuous mode [ 1550.542145][ T7] device 47 left promiscuous mode [ 1550.602501][ T7] device 48 left promiscuous mode [ 1550.702075][ T7] device 49 left promiscuous mode [ 1550.752621][ T7] device 50 left promiscuous mode [ 1550.832107][ T7] device 51 left promiscuous mode [ 1550.872343][ T7] device 52 left promiscuous mode [ 1550.942265][ T7] device 53 left promiscuous mode [ 1551.002212][ T7] device 54 left promiscuous mode [ 1551.052509][ T7] device 55 left promiscuous mode [ 1551.112102][ T7] device 56 left promiscuous mode [ 1551.162472][ T7] device 57 left promiscuous mode [ 1551.212452][ T7] device 58 left promiscuous mode [ 1551.273458][ T7] device 59 left promiscuous mode [ 1551.332202][ T7] device 60 left promiscuous mode [ 1551.392417][ T7] device 61 left promiscuous mode [ 1551.452390][ T7] device 62 left promiscuous mode [ 1551.512483][ T7] device 63 left promiscuous mode [ 1551.582250][ T7] device 64 left promiscuous mode [ 1551.652344][ T7] device 65 left promiscuous mode [ 1551.712750][ T7] device 66 left promiscuous mode [ 1551.752305][ T7] device 67 left promiscuous mode [ 1551.802347][ T7] device 68 left promiscuous mode [ 1551.852457][ T7] device 69 left promiscuous mode [ 1551.912474][ T7] device 70 left promiscuous mode [ 1551.952363][ T7] device 71 left promiscuous mode [ 1551.992410][ T7] device 72 left promiscuous mode [ 1552.032427][ T7] device 73 left promiscuous mode [ 1552.092091][ T7] device 74 left promiscuous mode [ 1552.132310][ T7] device 75 left promiscuous mode [ 1552.172368][ T7] device 76 left promiscuous mode [ 1552.232334][ T7] device 77 left promiscuous mode [ 1552.272162][ T7] device 78 left promiscuous mode [ 1552.362217][ T7] device 79 left promiscuous mode [ 1552.432347][ T7] device 80 left promiscuous mode [ 1552.511990][ T7] device 81 left promiscuous mode [ 1552.562450][ T7] device 82 left promiscuous mode [ 1552.602489][ T7] device 83 left promiscuous mode [ 1552.672246][ T7] device 84 left promiscuous mode [ 1552.712197][ T7] device 85 left promiscuous mode [ 1552.772179][ T7] device 86 left promiscuous mode [ 1552.832222][ T7] device 87 left promiscuous mode [ 1552.882412][ T7] device 88 left promiscuous mode [ 1552.922487][ T7] device 89 left promiscuous mode [ 1552.992266][ T7] device 90 left promiscuous mode [ 1553.052336][ T7] device 91 left promiscuous mode [ 1553.122428][ T7] device 92 left promiscuous mode [ 1553.172291][ T7] device 93 left promiscuous mode [ 1553.222438][ T7] device 94 left promiscuous mode [ 1553.282079][ T7] device 95 left promiscuous mode [ 1553.342387][ T7] device 96 left promiscuous mode [ 1553.402425][ T7] device 97 left promiscuous mode [ 1553.452424][ T7] device 98 left promiscuous mode [ 1553.512462][ T7] device 99 left promiscuous mode [ 1553.572123][ T7] device 100 left promiscuous mode [ 1553.632440][ T7] device 101 left promiscuous mode [ 1553.712397][ T7] device 102 left promiscuous mode [ 1553.772225][ T7] device 103 left promiscuous mode [ 1553.852008][ T7] device 104 left promiscuous mode [ 1553.922463][ T7] device 105 left promiscuous mode [ 1553.962482][ T7] device 106 left promiscuous mode [ 1554.032252][ T7] device 107 left promiscuous mode [ 1554.092221][ T7] device 108 left promiscuous mode [ 1554.162480][ T7] device 109 left promiscuous mode [ 1554.222140][ T7] device 110 left promiscuous mode [ 1554.292316][ T7] device 111 left promiscuous mode [ 1554.352384][ T7] device 112 left promiscuous mode [ 1554.422449][ T7] device 113 left promiscuous mode [ 1554.462470][ T7] device 114 left promiscuous mode [ 1554.512426][ T7] device 115 left promiscuous mode [ 1554.552499][ T7] device 116 left promiscuous mode [ 1554.602209][ T7] device 117 left promiscuous mode [ 1554.652430][ T7] device 118 left promiscuous mode [ 1554.692250][ T7] device 119 left promiscuous mode [ 1554.752264][ T7] device 120 left promiscuous mode [ 1554.812213][ T7] device 121 left promiscuous mode [ 1554.892267][ T7] device 122 left promiscuous mode [ 1554.952205][ T7] device 123 left promiscuous mode [ 1555.012183][ T7] device 124 left promiscuous mode [ 1555.062427][ T7] device 125 left promiscuous mode [ 1555.132195][ T7] device 126 left promiscuous mode [ 1555.172453][ T7] device 127 left promiscuous mode [ 1555.232667][ T7] device 128 left promiscuous mode [ 1555.292444][ T7] device 129 left promiscuous mode [ 1555.352535][ T7] device 130 left promiscuous mode [ 1555.392234][ T7] device 131 left promiscuous mode [ 1555.472270][ T7] device 132 left promiscuous mode [ 1555.522417][ T7] device 133 left promiscuous mode [ 1555.582267][ T7] device 134 left promiscuous mode [ 1555.622295][ T7] device 135 left promiscuous mode [ 1555.672445][ T7] device 136 left promiscuous mode [ 1555.712259][ T7] device 137 left promiscuous mode [ 1555.772242][ T7] device 138 left promiscuous mode [ 1555.832233][ T7] device 139 left promiscuous mode [ 1555.882493][ T7] device 140 left promiscuous mode [ 1555.942348][ T7] device 141 left promiscuous mode [ 1556.002145][ T7] device 142 left promiscuous mode [ 1556.072300][ T7] device 143 left promiscuous mode [ 1556.132258][ T7] device 144 left promiscuous mode [ 1556.192291][ T7] device 145 left promiscuous mode [ 1556.232282][ T7] device 146 left promiscuous mode [ 1556.292106][ T7] device 147 left promiscuous mode [ 1556.352186][ T7] device 148 left promiscuous mode [ 1556.402462][ T7] device 149 left promiscuous mode [ 1556.442469][ T7] device 150 left promiscuous mode [ 1556.512490][ T7] device 151 left promiscuous mode [ 1556.572254][ T7] device 152 left promiscuous mode [ 1556.622426][ T7] device 153 left promiscuous mode [ 1556.672332][ T7] device 154 left promiscuous mode [ 1556.712507][ T7] device 155 left promiscuous mode [ 1556.752615][ T7] device 156 left promiscuous mode [ 1556.802485][ T7] device 157 left promiscuous mode [ 1556.872870][ T7] device 158 left promiscuous mode [ 1556.922411][ T7] device 159 left promiscuous mode [ 1556.962487][ T7] device 160 left promiscuous mode [ 1557.032316][ T7] device 161 left promiscuous mode [ 1557.112306][ T7] device 162 left promiscuous mode [ 1557.172522][ T7] device 163 left promiscuous mode [ 1557.232504][ T7] device 164 left promiscuous mode [ 1557.292164][ T7] device 165 left promiscuous mode [ 1557.332536][ T7] device 166 left promiscuous mode [ 1557.382137][ T7] device 167 left promiscuous mode [ 1557.442289][ T7] device 168 left promiscuous mode [ 1557.492497][ T7] device 169 left promiscuous mode [ 1557.532523][ T7] device 170 left promiscuous mode [ 1557.592259][ T7] device 171 left promiscuous mode [ 1557.652865][ T7] device 172 left promiscuous mode [ 1557.702506][ T7] device 173 left promiscuous mode [ 1557.772235][ T7] device 174 left promiscuous mode [ 1557.822295][ T7] device 175 left promiscuous mode [ 1557.892280][ T7] device 176 left promiscuous mode [ 1557.952248][ T7] device 177 left promiscuous mode [ 1558.012330][ T7] device 178 left promiscuous mode [ 1558.062489][ T7] device 179 left promiscuous mode [ 1558.102676][ T7] device 180 left promiscuous mode [ 1558.172254][ T7] device 181 left promiscuous mode [ 1558.242247][ T7] device 182 left promiscuous mode [ 1558.302267][ T7] device 183 left promiscuous mode [ 1558.352400][ T7] device 184 left promiscuous mode [ 1558.412229][ T7] device 185 left promiscuous mode [ 1558.472331][ T7] device 186 left promiscuous mode [ 1558.522451][ T7] device 187 left promiscuous mode [ 1558.562502][ T7] device 188 left promiscuous mode [ 1558.632274][ T7] device 189 left promiscuous mode [ 1558.682636][ T7] device 190 left promiscuous mode [ 1558.742385][ T7] device 191 left promiscuous mode [ 1558.782597][ T7] device 192 left promiscuous mode [ 1558.852283][ T7] device 193 left promiscuous mode [ 1558.912093][ T7] device 194 left promiscuous mode [ 1558.982677][ T7] device 195 left promiscuous mode [ 1559.022289][ T7] device 196 left promiscuous mode [ 1559.072473][ T7] device 197 left promiscuous mode [ 1559.112526][ T7] device 198 left promiscuous mode [ 1559.182309][ T7] device 199 left promiscuous mode [ 1559.232510][ T7] device 200 left promiscuous mode [ 1559.302301][ T7] device 201 left promiscuous mode [ 1559.372245][ T7] device 202 left promiscuous mode [ 1559.442263][ T7] device 203 left promiscuous mode [ 1559.492506][ T7] device 204 left promiscuous mode [ 1559.552290][ T7] device 205 left promiscuous mode [ 1559.622518][ T7] device 206 left promiscuous mode [ 1559.662566][ T7] device 207 left promiscuous mode [ 1559.732305][ T7] device 208 left promiscuous mode [ 1559.782757][ T7] device 209 left promiscuous mode [ 1559.852194][ T7] device 210 left promiscuous mode [ 1559.892491][ T7] device 211 left promiscuous mode [ 1559.932504][ T7] device 212 left promiscuous mode [ 1559.972466][ T7] device 213 left promiscuous mode [ 1560.012579][ T7] device 214 left promiscuous mode [ 1560.092040][ T7] device 215 left promiscuous mode [ 1560.152308][ T7] device 216 left promiscuous mode [ 1560.212324][ T7] device 217 left promiscuous mode [ 1560.282491][ T7] device 218 left promiscuous mode [ 1560.332112][ T7] device 219 left promiscuous mode [ 1560.382303][ T7] device 220 left promiscuous mode [ 1560.452480][ T7] device 221 left promiscuous mode [ 1560.512085][ T7] device 222 left promiscuous mode [ 1560.583064][ T7] device 223 left promiscuous mode [ 1560.652826][ T7] device 224 left promiscuous mode [ 1560.712208][ T7] device 225 left promiscuous mode [ 1560.792197][ T7] device 226 left promiscuous mode [ 1560.842459][ T7] device 227 left promiscuous mode [ 1560.892280][ T7] device 228 left promiscuous mode [ 1560.962432][ T7] device 229 left promiscuous mode [ 1561.002493][ T7] device 230 left promiscuous mode [ 1561.062359][ T7] device 231 left promiscuous mode [ 1561.122246][ T7] device 232 left promiscuous mode [ 1561.182560][ T7] device 233 left promiscuous mode [ 1561.252275][ T7] device 234 left promiscuous mode [ 1561.312252][ T7] device 235 left promiscuous mode [ 1561.372228][ T7] device 236 left promiscuous mode [ 1561.422547][ T7] device 237 left promiscuous mode [ 1561.482040][ T7] device 238 left promiscuous mode [ 1561.542428][ T7] device 239 left promiscuous mode [ 1561.602244][ T7] device 240 left promiscuous mode [ 1561.662173][ T7] device 241 left promiscuous mode [ 1561.732461][ T7] device 242 left promiscuous mode [ 1561.792300][ T7] device 243 left promiscuous mode [ 1561.832390][ T7] device 244 left promiscuous mode [ 1561.872576][ T7] device 245 left promiscuous mode [ 1561.932466][ T7] device 246 left promiscuous mode [ 1561.992520][ T7] device 247 left promiscuous mode [ 1562.052095][ T7] device 248 left promiscuous mode [ 1562.092522][ T7] device 249 left promiscuous mode [ 1562.132580][ T7] device 250 left promiscuous mode [ 1562.172470][ T7] device 251 left promiscuous mode [ 1562.232115][ T7] device 252 left promiscuous mode [ 1562.272564][ T7] device 253 left promiscuous mode [ 1562.312492][ T7] device 254 left promiscuous mode [ 1562.372434][ T7] device 255 left promiscuous mode [ 1562.442226][ T7] device 256 left promiscuous mode [ 1562.504421][ T7] device 257 left promiscuous mode [ 1562.572201][ T7] device 258 left promiscuous mode [ 1562.612427][ T7] device 259 left promiscuous mode [ 1562.672430][ T7] device 260 left promiscuous mode [ 1562.742320][ T7] device 261 left promiscuous mode [ 1562.802293][ T7] device 262 left promiscuous mode [ 1562.862237][ T7] device 263 left promiscuous mode [ 1562.922225][ T7] device 264 left promiscuous mode [ 1562.972432][ T7] device 265 left promiscuous mode [ 1563.032542][ T7] device 266 left promiscuous mode [ 1563.092201][ T7] device 267 left promiscuous mode [ 1563.162254][ T7] device 268 left promiscuous mode [ 1563.232051][ T7] device 269 left promiscuous mode [ 1563.272537][ T7] device 270 left promiscuous mode [ 1563.312368][ T7] device 271 left promiscuous mode [ 1563.362444][ T7] device 272 left promiscuous mode [ 1563.422497][ T7] device 273 left promiscuous mode [ 1563.472407][ T7] device 274 left promiscuous mode [ 1563.542239][ T7] device 275 left promiscuous mode [ 1563.612167][ T7] device 276 left promiscuous mode [ 1563.672260][ T7] device 277 left promiscuous mode [ 1563.732235][ T7] device 278 left promiscuous mode [ 1563.792205][ T7] device 279 left promiscuous mode [ 1563.852250][ T7] device 280 left promiscuous mode [ 1563.912207][ T7] device 281 left promiscuous mode [ 1563.982212][ T7] device 282 left promiscuous mode [ 1564.052861][ T7] device 283 left promiscuous mode [ 1564.112297][ T7] device 284 left promiscuous mode [ 1564.182442][ T7] device 285 left promiscuous mode [ 1564.262194][ T7] device 286 left promiscuous mode [ 1564.312230][ T7] device 287 left promiscuous mode [ 1564.362340][ T7] device 288 left promiscuous mode [ 1564.432277][ T7] device 289 left promiscuous mode [ 1564.492270][ T7] device 290 left promiscuous mode [ 1564.542411][ T7] device 291 left promiscuous mode [ 1564.584275][ T7] device 292 left promiscuous mode [ 1564.652385][ T7] device 293 left promiscuous mode [ 1564.702380][ T7] device 294 left promiscuous mode [ 1564.772252][ T7] device 295 left promiscuous mode [ 1564.822392][ T7] device 296 left promiscuous mode [ 1564.892270][ T7] device 297 left promiscuous mode [ 1564.952202][ T7] device 298 left promiscuous mode [ 1565.012201][ T7] device 299 left promiscuous mode [ 1565.072321][ T7] device 300 left promiscuous mode [ 1565.142339][ T7] device 301 left promiscuous mode [ 1565.212204][ T7] device 302 left promiscuous mode [ 1565.262366][ T7] device 303 left promiscuous mode [ 1565.312438][ T7] device 304 left promiscuous mode [ 1565.392350][ T7] device 305 left promiscuous mode [ 1565.432841][ T7] device 306 left promiscuous mode [ 1565.512029][ T7] device 307 left promiscuous mode [ 1565.572197][ T7] device 308 left promiscuous mode [ 1565.632237][ T7] device 309 left promiscuous mode [ 1565.682679][ T7] device 310 left promiscuous mode [ 1565.742392][ T7] device 311 left promiscuous mode [ 1565.812202][ T7] device 312 left promiscuous mode [ 1565.872184][ T7] device 313 left promiscuous mode [ 1565.932259][ T7] device 314 left promiscuous mode [ 1565.982491][ T7] device 315 left promiscuous mode [ 1566.042199][ T7] device 316 left promiscuous mode [ 1566.112353][ T7] device 317 left promiscuous mode [ 1566.162529][ T7] device 318 left promiscuous mode [ 1566.222200][ T7] device 319 left promiscuous mode [ 1566.282507][ T7] device 320 left promiscuous mode [ 1566.342435][ T7] device 321 left promiscuous mode [ 1566.412062][ T7] device 322 left promiscuous mode [ 1566.472506][ T7] device 323 left promiscuous mode [ 1566.512216][ T7] device 324 left promiscuous mode [ 1566.552219][ T7] device 325 left promiscuous mode [ 1566.602445][ T7] device 326 left promiscuous mode [ 1566.652468][ T7] device 327 left promiscuous mode [ 1566.722291][ T7] device 328 left promiscuous mode [ 1566.772434][ T7] device 329 left promiscuous mode [ 1566.852111][ T7] device 330 left promiscuous mode [ 1566.892492][ T7] device 331 left promiscuous mode [ 1566.972095][ T7] device 332 left promiscuous mode [ 1567.032253][ T7] device 333 left promiscuous mode [ 1567.092269][ T7] device 334 left promiscuous mode [ 1567.152231][ T7] device 335 left promiscuous mode [ 1567.212262][ T7] device 336 left promiscuous mode [ 1567.272314][ T7] device 337 left promiscuous mode [ 1567.322511][ T7] device 338 left promiscuous mode [ 1567.392091][ T7] device 339 left promiscuous mode [ 1567.462683][ T7] device 340 left promiscuous mode [ 1567.522251][ T7] device 341 left promiscuous mode [ 1567.582253][ T7] device 342 left promiscuous mode [ 1567.632344][ T7] device 343 left promiscuous mode [ 1567.712153][ T7] device 344 left promiscuous mode [ 1567.792196][ T7] device 345 left promiscuous mode [ 1567.842377][ T7] device 346 left promiscuous mode [ 1567.912209][ T7] device 347 left promiscuous mode [ 1567.962409][ T7] device 348 left promiscuous mode [ 1568.032179][ T7] device 349 left promiscuous mode [ 1568.102624][ T7] device 350 left promiscuous mode [ 1568.152331][ T7] device 351 left promiscuous mode [ 1568.212413][ T7] device 352 left promiscuous mode [ 1568.252624][ T7] device 353 left promiscuous mode [ 1568.312070][ T7] device 354 left promiscuous mode [ 1568.352554][ T7] device 355 left promiscuous mode [ 1568.392470][ T7] device 356 left promiscuous mode [ 1568.433431][ T7] device 357 left promiscuous mode [ 1568.492119][ T7] device 358 left promiscuous mode [ 1568.563074][ T7] device 359 left promiscuous mode [ 1568.622093][ T7] device 360 left promiscuous mode [ 1568.662503][ T7] device 361 left promiscuous mode [ 1568.731989][ T7] device 362 left promiscuous mode [ 1568.792305][ T7] device 363 left promiscuous mode [ 1568.852278][ T7] device 364 left promiscuous mode [ 1568.922467][ T7] device 365 left promiscuous mode [ 1568.962611][ T7] device 366 left promiscuous mode [ 1569.022320][ T7] device 367 left promiscuous mode [ 1569.082439][ T7] device 368 left promiscuous mode [ 1569.142399][ T7] device 369 left promiscuous mode [ 1569.202333][ T7] device 370 left promiscuous mode [ 1569.252494][ T7] device 371 left promiscuous mode [ 1569.312376][ T7] device 372 left promiscuous mode [ 1569.372102][ T7] device 373 left promiscuous mode [ 1569.412495][ T7] device 374 left promiscuous mode [ 1569.473460][ T7] device 375 left promiscuous mode [ 1569.552123][ T7] device 376 left promiscuous mode [ 1569.602605][ T7] device 377 left promiscuous mode [ 1569.662414][ T7] device 378 left promiscuous mode [ 1569.702502][ T7] device 379 left promiscuous mode [ 1569.762116][ T7] device 380 left promiscuous mode [ 1569.812538][ T7] device 381 left promiscuous mode [ 1569.872964][ T7] device 382 left promiscuous mode [ 1569.932348][ T7] device 383 left promiscuous mode [ 1569.972521][ T7] device 384 left promiscuous mode [ 1570.012418][ T7] device 385 left promiscuous mode [ 1570.082244][ T7] device 386 left promiscuous mode [ 1570.142268][ T7] device 387 left promiscuous mode [ 1570.202227][ T7] device 388 left promiscuous mode [ 1570.262612][ T7] device 389 left promiscuous mode [ 1570.312594][ T7] device 390 left promiscuous mode [ 1570.352561][ T7] device 391 left promiscuous mode [ 1570.423630][ T7] device 392 left promiscuous mode [ 1570.492186][ T7] device 393 left promiscuous mode [ 1570.552970][ T7] device 394 left promiscuous mode [ 1570.622375][ T7] device 395 left promiscuous mode [ 1570.662427][ T7] device 396 left promiscuous mode [ 1570.732204][ T7] device 397 left promiscuous mode [ 1570.812015][ T7] device 398 left promiscuous mode [ 1570.872206][ T7] device 399 left promiscuous mode [ 1570.922505][ T7] device 400 left promiscuous mode [ 1570.982395][ T7] device 401 left promiscuous mode [ 1571.022506][ T7] device 402 left promiscuous mode [ 1571.083070][ T7] device 403 left promiscuous mode [ 1571.162025][ T7] device 404 left promiscuous mode [ 1571.224089][ T7] device 405 left promiscuous mode [ 1571.292214][ T7] device 406 left promiscuous mode [ 1571.352246][ T7] device 407 left promiscuous mode [ 1571.412219][ T7] device 408 left promiscuous mode [ 1571.472300][ T7] device 409 left promiscuous mode [ 1571.552217][ T7] device 410 left promiscuous mode [ 1571.622675][ T7] device 411 left promiscuous mode [ 1571.692111][ T7] device 412 left promiscuous mode [ 1571.752459][ T7] device 413 left promiscuous mode [ 1571.812324][ T7] device 414 left promiscuous mode [ 1571.852452][ T7] device 415 left promiscuous mode [ 1571.892337][ T7] device 416 left promiscuous mode [ 1571.962253][ T7] device 417 left promiscuous mode [ 1572.012275][ T7] device 418 left promiscuous mode [ 1572.072286][ T7] device 419 left promiscuous mode [ 1572.122307][ T7] device 420 left promiscuous mode [ 1572.162544][ T7] device 421 left promiscuous mode [ 1572.232317][ T7] device 422 left promiscuous mode [ 1572.283455][ T7] device 423 left promiscuous mode [ 1572.332515][ T7] device 424 left promiscuous mode [ 1572.392325][ T7] device 425 left promiscuous mode [ 1572.472059][ T7] device 426 left promiscuous mode [ 1572.522505][ T7] device 427 left promiscuous mode [ 1572.562405][ T7] device 428 left promiscuous mode [ 1572.602562][ T7] device 429 left promiscuous mode [ 1572.662454][ T7] device 430 left promiscuous mode [ 1572.742063][ T7] device 431 left promiscuous mode [ 1572.812668][ T7] device 432 left promiscuous mode [ 1572.872476][ T7] device 433 left promiscuous mode [ 1572.942296][ T7] device 434 left promiscuous mode [ 1573.002390][ T7] device 435 left promiscuous mode [ 1573.062485][ T7] device 436 left promiscuous mode [ 1573.122470][ T7] device 437 left promiscuous mode [ 1573.172422][ T7] device 438 left promiscuous mode [ 1573.242245][ T7] device 439 left promiscuous mode [ 1573.292473][ T7] device 440 left promiscuous mode [ 1573.372408][ T7] device 441 left promiscuous mode [ 1573.422291][ T7] device 442 left promiscuous mode [ 1573.482276][ T7] device 443 left promiscuous mode [ 1573.542421][ T7] device 444 left promiscuous mode [ 1573.593496][ T7] device 445 left promiscuous mode [ 1573.652187][ T7] device 446 left promiscuous mode [ 1573.732174][ T7] device 447 left promiscuous mode [ 1573.802272][ T7] device 448 left promiscuous mode [ 1573.862796][ T7] device 449 left promiscuous mode [ 1573.932538][ T7] device 450 left promiscuous mode [ 1573.972495][ T7] device 451 left promiscuous mode [ 1574.042302][ T7] device 452 left promiscuous mode [ 1574.102340][ T7] device 453 left promiscuous mode [ 1574.142184][ T7] device 454 left promiscuous mode [ 1574.202246][ T7] device 455 left promiscuous mode [ 1574.272202][ T7] device 456 left promiscuous mode [ 1574.342409][ T7] device 457 left promiscuous mode [ 1574.402213][ T7] device 458 left promiscuous mode [ 1574.452251][ T7] device 459 left promiscuous mode [ 1574.504514][ T7] device 460 left promiscuous mode [ 1574.562481][ T7] device 461 left promiscuous mode [ 1574.622490][ T7] device 462 left promiscuous mode [ 1574.682369][ T7] device 463 left promiscuous mode [ 1574.742559][ T7] device 464 left promiscuous mode [ 1574.782217][ T7] device 465 left promiscuous mode [ 1574.852502][ T7] device 466 left promiscuous mode [ 1574.912319][ T7] device 467 left promiscuous mode [ 1574.992149][ T7] device 468 left promiscuous mode [ 1575.062490][ T7] device 469 left promiscuous mode [ 1575.142134][ T7] device 470 left promiscuous mode [ 1575.202294][ T7] device 471 left promiscuous mode [ 1575.252555][ T7] device 472 left promiscuous mode [ 1575.313040][ T7] device 473 left promiscuous mode [ 1575.382541][ T7] device 474 left promiscuous mode [ 1575.452373][ T7] device 475 left promiscuous mode [ 1575.512358][ T7] device 476 left promiscuous mode [ 1575.562508][ T7] device 477 left promiscuous mode [ 1575.622196][ T7] device 478 left promiscuous mode [ 1575.682325][ T7] device 479 left promiscuous mode [ 1575.742373][ T7] device 480 left promiscuous mode [ 1575.782632][ T7] device 481 left promiscuous mode [ 1575.842267][ T7] device 482 left promiscuous mode [ 1575.902423][ T7] device 483 left promiscuous mode [ 1575.982217][ T7] device 484 left promiscuous mode [ 1576.042323][ T7] device 485 left promiscuous mode [ 1576.102338][ T7] device 486 left promiscuous mode [ 1576.162357][ T7] device 487 left promiscuous mode [ 1576.223430][ T7] device 488 left promiscuous mode [ 1576.292315][ T7] device 489 left promiscuous mode [ 1576.352798][ T7] device 490 left promiscuous mode [ 1576.402651][ T7] device 491 left promiscuous mode [ 1576.472307][ T7] device 492 left promiscuous mode [ 1576.522458][ T7] device 493 left promiscuous mode [ 1576.562607][ T7] device 494 left promiscuous mode [ 1576.632362][ T7] device 495 left promiscuous mode [ 1576.712060][ T7] device 496 left promiscuous mode [ 1576.792402][ T7] device 497 left promiscuous mode [ 1576.842351][ T7] device 498 left promiscuous mode [ 1576.892526][ T7] device 499 left promiscuous mode [ 1576.962112][ T7] device 500 left promiscuous mode [ 1577.002522][ T7] device 501 left promiscuous mode [ 1577.072360][ T7] device 502 left promiscuous mode [ 1577.112361][ T7] device 503 left promiscuous mode [ 1577.172315][ T7] device 504 left promiscuous mode [ 1577.222497][ T7] device 505 left promiscuous mode [ 1577.282114][ T7] device 506 left promiscuous mode [ 1577.322519][ T7] device 507 left promiscuous mode [ 1577.362446][ T7] device 508 left promiscuous mode [ 1577.432278][ T7] device 509 left promiscuous mode [ 1577.492209][ T7] device 510 left promiscuous mode [ 1577.552218][ T7] device 511 left promiscuous mode [ 1577.632073][ T7] device 512 left promiscuous mode [ 1577.702511][ T7] device 513 left promiscuous mode [ 1577.772182][ T7] device 514 left promiscuous mode [ 1577.842324][ T7] device 515 left promiscuous mode [ 1577.882229][ T7] device 516 left promiscuous mode [ 1577.942481][ T7] device 517 left promiscuous mode [ 1577.982374][ T7] device 518 left promiscuous mode [ 1578.052336][ T7] device 519 left promiscuous mode [ 1578.112238][ T7] device 520 left promiscuous mode [ 1578.172243][ T7] device 521 left promiscuous mode [ 1578.232324][ T7] device 522 left promiscuous mode [ 1578.302499][ T7] device 523 left promiscuous mode [ 1578.373230][ T7] device 524 left promiscuous mode [ 1578.432462][ T7] device 525 left promiscuous mode [ 1578.512058][ T7] device 526 left promiscuous mode [ 1578.562482][ T7] device 527 left promiscuous mode [ 1578.632456][ T7] device 528 left promiscuous mode [ 1578.692317][ T7] device 529 left promiscuous mode [ 1578.742396][ T7] device 530 left promiscuous mode [ 1578.802271][ T7] device 531 left promiscuous mode [ 1578.872371][ T7] device 532 left promiscuous mode [ 1578.912349][ T7] device 533 left promiscuous mode [ 1578.982354][ T7] device 534 left promiscuous mode [ 1579.042316][ T7] device 535 left promiscuous mode [ 1579.092685][ T7] device 536 left promiscuous mode [ 1579.162326][ T7] device 537 left promiscuous mode [ 1579.232543][ T7] device 538 left promiscuous mode [ 1579.292121][ T7] device 539 left promiscuous mode [ 1579.352324][ T7] device 540 left promiscuous mode [ 1579.432042][ T7] device 541 left promiscuous mode [ 1579.492337][ T7] device 542 left promiscuous mode [ 1579.572289][ T7] device 543 left promiscuous mode [ 1579.622527][ T7] device 544 left promiscuous mode [ 1579.692069][ T7] device 545 left promiscuous mode [ 1579.732488][ T7] device 546 left promiscuous mode [ 1579.792324][ T7] device 547 left promiscuous mode [ 1579.852255][ T7] device 548 left promiscuous mode [ 1579.902598][ T7] device 549 left promiscuous mode [ 1579.962079][ T7] device 550 left promiscuous mode [ 1580.032344][ T7] device 551 left promiscuous mode [ 1580.102363][ T7] device 552 left promiscuous mode [ 1580.152469][ T7] device 553 left promiscuous mode [ 1580.193393][ T7] device 554 left promiscuous mode [ 1580.262420][ T7] device 555 left promiscuous mode [ 1580.312460][ T7] device 556 left promiscuous mode [ 1580.382207][ T7] device 557 left promiscuous mode [ 1580.452477][ T7] device 558 left promiscuous mode [ 1580.512206][ T7] device 559 left promiscuous mode [ 1580.572237][ T7] device 560 left promiscuous mode [ 1580.612521][ T7] device 561 left promiscuous mode [ 1580.672607][ T7] device 562 left promiscuous mode [ 1580.732130][ T7] device 563 left promiscuous mode [ 1580.792298][ T7] device 564 left promiscuous mode [ 1580.842530][ T7] device 565 left promiscuous mode [ 1580.902474][ T7] device 566 left promiscuous mode [ 1580.972192][ T7] device 567 left promiscuous mode [ 1581.012474][ T7] device 568 left promiscuous mode [ 1581.072508][ T7] device 569 left promiscuous mode [ 1581.113377][ T7] device 570 left promiscuous mode [ 1581.182376][ T7] device 571 left promiscuous mode [ 1581.232380][ T7] device 572 left promiscuous mode [ 1581.272510][ T7] device 573 left promiscuous mode [ 1581.322324][ T7] device 574 left promiscuous mode [ 1581.392507][ T7] device 575 left promiscuous mode [ 1581.442120][ T7] device 576 left promiscuous mode [ 1581.482433][ T7] device 577 left promiscuous mode [ 1581.512235][ T7] device 578 left promiscuous mode [ 1581.592232][ T7] device 579 left promiscuous mode [ 1581.672240][ T7] device 580 left promiscuous mode [ 1581.732233][ T7] device 581 left promiscuous mode [ 1581.802450][ T7] device 582 left promiscuous mode [ 1581.842606][ T7] device 583 left promiscuous mode [ 1581.912272][ T7] device 584 left promiscuous mode [ 1581.992286][ T7] device 585 left promiscuous mode [ 1582.053449][ T7] device 586 left promiscuous mode [ 1582.122304][ T7] device 587 left promiscuous mode [ 1582.192188][ T7] device 588 left promiscuous mode [ 1582.242395][ T7] device 589 left promiscuous mode [ 1582.292403][ T7] device 590 left promiscuous mode [ 1582.352328][ T7] device 591 left promiscuous mode [ 1582.392405][ T7] device 592 left promiscuous mode [ 1582.432389][ T7] device 593 left promiscuous mode [ 1582.504025][ T7] device 594 left promiscuous mode [ 1582.583496][ T7] device 595 left promiscuous mode [ 1582.632412][ T7] device 596 left promiscuous mode [ 1582.672589][ T7] device 597 left promiscuous mode [ 1582.732141][ T7] device 598 left promiscuous mode [ 1582.792283][ T7] device 599 left promiscuous mode [ 1582.872221][ T7] device 600 left promiscuous mode [ 1582.932231][ T7] device 601 left promiscuous mode [ 1582.982541][ T7] device 602 left promiscuous mode [ 1583.062191][ T7] device 603 left promiscuous mode [ 1583.122183][ T7] device 604 left promiscuous mode [ 1583.182422][ T7] device 605 left promiscuous mode [ 1583.252243][ T7] device 606 left promiscuous mode [ 1583.312218][ T7] device 607 left promiscuous mode [ 1583.372235][ T7] device 608 left promiscuous mode [ 1583.442167][ T7] device 609 left promiscuous mode [ 1583.502554][ T7] device 610 left promiscuous mode [ 1583.562124][ T7] device 611 left promiscuous mode [ 1583.602541][ T7] device 612 left promiscuous mode [ 1583.642502][ T7] device 613 left promiscuous mode [ 1583.702068][ T7] device 614 left promiscuous mode [ 1583.742470][ T7] device 615 left promiscuous mode [ 1583.782489][ T7] device 616 left promiscuous mode [ 1583.842196][ T7] device 617 left promiscuous mode [ 1583.892466][ T7] device 618 left promiscuous mode [ 1583.942106][ T7] device 619 left promiscuous mode [ 1583.992379][ T7] device 620 left promiscuous mode [ 1584.042199][ T7] device 621 left promiscuous mode [ 1584.102429][ T7] device 622 left promiscuous mode [ 1584.162250][ T7] device 623 left promiscuous mode [ 1584.232393][ T7] device 624 left promiscuous mode [ 1584.322035][ T7] device 625 left promiscuous mode [ 1584.362409][ T7] device 626 left promiscuous mode [ 1584.412359][ T7] device 627 left promiscuous mode [ 1584.482499][ T7] device 628 left promiscuous mode [ 1584.522477][ T7] device 629 left promiscuous mode [ 1584.582479][ T7] device 630 left promiscuous mode [ 1584.652135][ T7] device 631 left promiscuous mode [ 1584.712591][ T7] device 632 left promiscuous mode [ 1584.753030][ T7] device 633 left promiscuous mode [ 1584.792422][ T7] device 634 left promiscuous mode [ 1584.842299][ T7] device 635 left promiscuous mode [ 1584.912487][ T7] device 636 left promiscuous mode [ 1584.952487][ T7] device 637 left promiscuous mode [ 1585.013933][ T7] device 638 left promiscuous mode [ 1585.082156][ T7] device 639 left promiscuous mode [ 1585.122524][ T7] device 640 left promiscuous mode [ 1585.192307][ T7] device 641 left promiscuous mode [ 1585.252294][ T7] device 642 left promiscuous mode [ 1585.312274][ T7] device 643 left promiscuous mode [ 1585.372317][ T7] device 644 left promiscuous mode [ 1585.412276][ T7] device 645 left promiscuous mode [ 1585.462608][ T7] device 646 left promiscuous mode [ 1585.502568][ T7] device 647 left promiscuous mode [ 1585.572357][ T7] device 648 left promiscuous mode [ 1585.632311][ T7] device 649 left promiscuous mode [ 1585.692271][ T7] device 650 left promiscuous mode [ 1585.752288][ T7] device 651 left promiscuous mode [ 1585.842483][ T7] device 652 left promiscuous mode [ 1585.892209][ T7] device 653 left promiscuous mode [ 1585.962170][ T7] device 654 left promiscuous mode [ 1586.022400][ T7] device 655 left promiscuous mode [ 1586.063415][ T7] device 656 left promiscuous mode [ 1586.112477][ T7] device 657 left promiscuous mode [ 1586.182471][ T7] device 658 left promiscuous mode [ 1586.242212][ T7] device 659 left promiscuous mode [ 1586.312350][ T7] device 660 left promiscuous mode [ 1586.372343][ T7] device 661 left promiscuous mode [ 1586.442622][ T7] device 662 left promiscuous mode [ 1586.512353][ T7] device 663 left promiscuous mode [ 1586.562467][ T7] device 664 left promiscuous mode [ 1586.582999][ T1064] INFO: task syz-executor.4:21822 blocked for more than 143 seconds. [ 1586.591100][ T1064] Not tainted 5.3.0+ #0 [ 1586.597591][ T1064] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1586.606641][ T1064] syz-executor.4 D27968 21822 21802 0x00004004 [ 1586.613283][ T1064] Call Trace: [ 1586.616584][ T1064] __schedule+0x94f/0x1e70 [ 1586.620987][ T1064] ? __sched_text_start+0x8/0x8 [ 1586.626111][ T1064] ? lock_downgrade+0x920/0x920 [ 1586.630972][ T1064] ? rwlock_bug.part.0+0x90/0x90 [ 1586.635961][ T1064] schedule+0xd9/0x260 [ 1586.640049][ T1064] schedule_preempt_disabled+0x13/0x20 [ 1586.645568][ T1064] __mutex_lock+0x7b0/0x13c0 [ 1586.650254][ T1064] ? ovs_dp_cmd_new+0x5d9/0xe30 [ 1586.655147][ T1064] ? mutex_trylock+0x2d0/0x2d0 [ 1586.659920][ T1064] ? lock_downgrade+0x920/0x920 [ 1586.664844][ T1064] ? rcu_read_lock_any_held+0xcd/0xf0 [ 1586.670227][ T1064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1586.676565][ T1064] mutex_lock_nested+0x16/0x20 [ 1586.681325][ T1064] ? mutex_lock_nested+0x16/0x20 [ 1586.686327][ T1064] ovs_dp_cmd_new+0x5d9/0xe30 [ 1586.691013][ T1064] ? ovs_vport_cmd_new+0xf50/0xf50 [ 1586.696702][ T1064] ? __nla_parse+0x43/0x60 [ 1586.701184][ T1064] genl_family_rcv_msg+0x74b/0xf90 [ 1586.706357][ T1064] ? genl_unregister_family+0x7b0/0x7b0 [ 1586.711947][ T1064] ? __kasan_check_read+0x11/0x20 [ 1586.716964][ T1064] ? __lock_acquire+0x16f2/0x4a00 [ 1586.722942][ T1064] ? __dev_queue_xmit+0xbb5/0x3720 [ 1586.728092][ T1064] ? radix_tree_lookup+0x22/0x30 [ 1586.733096][ T1064] genl_rcv_msg+0xca/0x170 [ 1586.737516][ T1064] netlink_rcv_skb+0x177/0x450 [ 1586.742339][ T1064] ? genl_family_rcv_msg+0xf90/0xf90 [ 1586.747639][ T1064] ? netlink_ack+0xb50/0xb50 [ 1586.752283][ T1064] ? __kasan_check_write+0x14/0x20 [ 1586.757398][ T1064] ? netlink_deliver_tap+0x254/0xbf0 [ 1586.762739][ T1064] genl_rcv+0x29/0x40 [ 1586.766724][ T1064] netlink_unicast+0x531/0x710 [ 1586.771478][ T1064] ? netlink_attachskb+0x7c0/0x7c0 [ 1586.776622][ T1064] ? _copy_from_iter_full+0x25d/0x8c0 [ 1586.782075][ T1064] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1586.787791][ T1064] ? __check_object_size+0x3d/0x437 [ 1586.793051][ T1064] netlink_sendmsg+0x8a5/0xd60 [ 1586.797812][ T1064] ? netlink_unicast+0x710/0x710 [ 1586.802799][ T1064] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1586.808354][ T1064] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1586.813862][ T1064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1586.820131][ T1064] ? security_socket_sendmsg+0x8d/0xc0 [ 1586.825713][ T1064] ? netlink_unicast+0x710/0x710 [ 1586.830651][ T1064] sock_sendmsg+0xd7/0x130 [ 1586.835108][ T1064] ___sys_sendmsg+0x803/0x920 [ 1586.839788][ T1064] ? copy_msghdr_from_user+0x440/0x440 [ 1586.845313][ T1064] ? __kasan_check_read+0x11/0x20 [ 1586.850340][ T1064] ? __fget+0x384/0x560 [ 1586.855235][ T1064] ? ksys_dup3+0x3e0/0x3e0 [ 1586.859674][ T1064] ? __fget_light+0x1a9/0x230 [ 1586.864518][ T1064] ? __fdget+0x1b/0x20 [ 1586.868627][ T1064] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1586.874932][ T1064] __sys_sendmsg+0x105/0x1d0 [ 1586.879527][ T1064] ? __sys_sendmsg_sock+0xd0/0xd0 [ 1586.884742][ T1064] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1586.890491][ T1064] ? do_syscall_64+0x26/0x760 [ 1586.895222][ T1064] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1586.901425][ T1064] ? do_syscall_64+0x26/0x760 [ 1586.906259][ T1064] __x64_sys_sendmsg+0x78/0xb0 [ 1586.911137][ T1064] do_syscall_64+0xfa/0x760 [ 1586.915729][ T1064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1586.921720][ T1064] RIP: 0033:0x459a59 [ 1586.925692][ T1064] Code: Bad RIP value. [ 1586.929746][ T1064] RSP: 002b:00007f86b923cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1586.938195][ T1064] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1586.946326][ T1064] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000009 [ 1586.954342][ T1064] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1586.962374][ T1064] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f86b923d6d4 [ 1586.970359][ T1064] R13: 00000000004c7b64 R14: 00000000004dd8c0 R15: 00000000ffffffff [ 1586.978437][ T1064] [ 1586.978437][ T1064] Showing all locks held in the system: [ 1586.982409][ T7] kobject: '664' (00000000738eb092): kobject_cleanup, parent 00000000b2b27864 [ 1586.987066][ T1064] 7 locks held by kworker/u4:0/7: [ 1587.000388][ T1064] 1 lock held by khungtaskd/1064: [ 1587.005043][ T7] kobject: '664' (00000000738eb092): calling ktype release [ 1587.005677][ T1064] #0: ffffffff88faad00 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 1587.018711][ T7] kobject: '664': free name [ 1587.022167][ T1064] 1 lock held by rsyslogd/8623: [ 1587.022177][ T1064] 2 locks held by getty/8713: [ 1587.022183][ T1064] #0: ffff8880a929c110 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1587.031225][ T7] device 665 left promiscuous mode [ 1587.031636][ T1064] #1: ffffc90005f332e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1587.067019][ T1064] 2 locks held by getty/8714: [ 1587.071685][ T1064] #0: ffff8880a8761310 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1587.080693][ T1064] #1: ffffc90005f432e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1587.090335][ T1064] 2 locks held by getty/8715: [ 1587.095426][ T1064] #0: ffff8880919d4f50 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1587.104461][ T1064] #1: ffffc90005f192e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1587.115086][ T1064] 2 locks held by getty/8716: [ 1587.120292][ T1064] #0: ffff88808c942190 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1587.129470][ T1064] #1: ffffc90005f3f2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1587.139178][ T1064] 2 locks held by getty/8717: [ 1587.143936][ T1064] #0: ffff8880a83bd2d0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1587.152928][ T1064] #1: ffffc90005f3b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1587.162660][ T1064] 2 locks held by getty/8718: [ 1587.167428][ T1064] #0: ffff8880a1c469d0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1587.176414][ T1064] #1: ffffc90005f2f2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1587.186041][ T1064] 2 locks held by getty/8719: [ 1587.190724][ T1064] #0: ffff8880a9bfe610 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1587.199742][ T1064] #1: ffffc90005f112e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 1587.209383][ T1064] 2 locks held by kworker/1:1/21745: [ 1587.214711][ T1064] #0: ffff8880aa435ba8 ((wq_completion)rcu_gp){+.+.}, at: process_one_work+0x88b/0x1740 [ 1587.224843][ T1064] #1: ffff8881fe73fdc0 ((work_completion)(&rew.rew_work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 1587.235732][ T1064] 2 locks held by syz-executor.4/21821: [ 1587.241420][ T1064] #0: ffffffff899e8a28 (cb_lock){++++}, at: genl_rcv+0x1a/0x40 [ 1587.249728][ T1064] #1: ffffffff89be56e0 (ovs_mutex){+.+.}, at: ovs_dp_cmd_new+0x5d9/0xe30 [ 1587.258294][ T1064] 2 locks held by syz-executor.4/21822: [ 1587.263883][ T1064] #0: ffffffff899e8a28 (cb_lock){++++}, at: genl_rcv+0x1a/0x40 [ 1587.271531][ T1064] #1: ffffffff89be56e0 (ovs_mutex){+.+.}, at: ovs_dp_cmd_new+0x5d9/0xe30 [ 1587.280156][ T1064] 2 locks held by syz-executor.3/21836: [ 1587.286875][ T1064] #0: ffffffff899e8a28 (cb_lock){++++}, at: genl_rcv+0x1a/0x40 [ 1587.294601][ T1064] #1: ffffffff89be56e0 (ovs_mutex){+.+.}, at: ovs_dp_cmd_new+0x5d9/0xe30 [ 1587.303403][ T1064] 2 locks held by syz-executor.3/21844: [ 1587.308936][ T1064] #0: ffffffff899e8a28 (cb_lock){++++}, at: genl_rcv+0x1a/0x40 [ 1587.316798][ T1064] #1: ffffffff89be56e0 (ovs_mutex){+.+.}, at: ovs_dp_cmd_new+0x5d9/0xe30 [ 1587.325493][ T1064] 2 locks held by syz-executor.3/21847: [ 1587.331027][ T1064] #0: ffffffff899e8a28 (cb_lock){++++}, at: genl_rcv+0x1a/0x40 [ 1587.338724][ T1064] #1: ffffffff89be56e0 (ovs_mutex){+.+.}, at: ovs_dp_cmd_new+0x5d9/0xe30 [ 1587.347385][ T1064] 2 locks held by syz-executor.0/21842: [ 1587.352973][ T1064] #0: ffffffff899e8a28 (cb_lock){++++}, at: genl_rcv+0x1a/0x40 [ 1587.360627][ T1064] #1: ffffffff89be56e0 (ovs_mutex){+.+.}, at: ovs_dp_cmd_new+0x5d9/0xe30 [ 1587.369199][ T1064] 2 locks held by syz-executor.2/21849: [ 1587.375722][ T1064] #0: ffffffff899e8a28 (cb_lock){++++}, at: genl_rcv+0x1a/0x40 [ 1587.383525][ T1064] #1: ffffffff89be56e0 (ovs_mutex){+.+.}, at: ovs_dp_cmd_new+0x5d9/0xe30 [ 1587.393928][ T1064] 2 locks held by syz-executor.2/21851: [ 1587.399469][ T1064] #0: ffffffff899e8a28 (cb_lock){++++}, at: genl_rcv+0x1a/0x40 [ 1587.407276][ T1064] #1: ffffffff89be56e0 (ovs_mutex){+.+.}, at: ovs_dp_cmd_new+0x5d9/0xe30 [ 1587.415906][ T1064] [ 1587.418295][ T1064] ============================================= [ 1587.418295][ T1064] [ 1587.426837][ T1064] NMI backtrace for cpu 0 [ 1587.429810][ T7] kobject: 'batman_adv' (000000009837cbd8): kobject_uevent_env [ 1587.431172][ T1064] CPU: 0 PID: 1064 Comm: khungtaskd Not tainted 5.3.0+ #0 [ 1587.445846][ T1064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1587.448408][ T7] kobject: 'batman_adv' (000000009837cbd8): kobject_uevent_env: filter function caused the event to drop! [ 1587.455988][ T1064] Call Trace: [ 1587.456012][ T1064] dump_stack+0x172/0x1f0 [ 1587.456032][ T1064] nmi_cpu_backtrace.cold+0x70/0xb2 [ 1587.456047][ T1064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1587.456063][ T1064] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 1587.456077][ T1064] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 1587.456092][ T1064] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1587.456105][ T1064] watchdog+0x9d0/0xef0 [ 1587.456128][ T1064] kthread+0x361/0x430 [ 1587.456141][ T1064] ? reset_hung_task_detector+0x30/0x30 [ 1587.456154][ T1064] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1587.456173][ T1064] ret_from_fork+0x24/0x30 [ 1587.478116][ T7] kobject: 'batman_adv' (000000009837cbd8): kobject_cleanup, parent 00000000b2b27864 [ 1587.480697][ T1064] Sending NMI from CPU 0 to CPUs 1: [ 1587.491026][ T7] kobject: 'batman_adv' (000000009837cbd8): calling ktype release [ 1587.493568][ C1] NMI backtrace for cpu 1 [ 1587.493572][ C1] CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 5.3.0+ #0 [ 1587.493577][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1587.493580][ C1] Workqueue: netns cleanup_net [ 1587.493586][ C1] RIP: 0010:lock_release+0x163/0x960 [ 1587.493595][ C1] Code: 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 49 05 00 00 <41> c7 87 94 08 00 00 01 00 00 00 0f 1f 44 00 00 65 44 8b 3d e5 5d [ 1587.493598][ C1] RSP: 0018:ffff8880ae909be0 EFLAGS: 00000046 [ 1587.493604][ C1] RAX: 0000000000000007 RBX: 1ffff11015d21381 RCX: ffffffff815a2b9a [ 1587.493609][ C1] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8880a988ca54 [ 1587.493613][ C1] RBP: ffff8880ae909cb0 R08: ffffffff88fb8f20 R09: ffffffff8aca0a28 [ 1587.493617][ C1] R10: ffffed1015d21388 R11: 0000000000000003 R12: ffffffff8aca0a40 [ 1587.493621][ C1] R13: ffffffff8344c171 R14: ffff8880ae909c88 R15: ffff8880a988c1c0 [ 1587.493625][ C1] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1587.493629][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1587.493633][ C1] CR2: 000000c424cf5010 CR3: 00000000a045e000 CR4: 00000000001406e0 [ 1587.493637][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1587.493641][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1587.493643][ C1] Call Trace: [ 1587.493645][ C1] [ 1587.493648][ C1] ? __kasan_check_write+0x14/0x20 [ 1587.493651][ C1] ? lock_downgrade+0x920/0x920 [ 1587.493654][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 1587.493657][ C1] ? lock_acquire+0x190/0x410 [ 1587.493660][ C1] ? debug_object_activate+0x131/0x470 [ 1587.493663][ C1] _raw_spin_unlock_irqrestore+0x1f/0xe0 [ 1587.493666][ C1] debug_object_activate+0x201/0x470 [ 1587.493669][ C1] ? debug_object_init_on_stack+0x20/0x20 [ 1587.493672][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 1587.493675][ C1] ? lock_acquire+0x190/0x410 [ 1587.493678][ C1] ? __hrtimer_run_queues+0x3df/0xe40 [ 1587.493681][ C1] enqueue_hrtimer+0x2a/0x420 [ 1587.493684][ C1] __hrtimer_run_queues+0xaed/0xe40 [ 1587.493687][ C1] ? tick_sched_do_timer+0x1b0/0x1b0 [ 1587.493690][ C1] ? hrtimer_init+0x330/0x330 [ 1587.493693][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1587.493696][ C1] ? ktime_get_update_offsets_now+0x2d3/0x440 [ 1587.493699][ C1] hrtimer_interrupt+0x314/0x770 [ 1587.493703][ C1] smp_apic_timer_interrupt+0x160/0x610 [ 1587.493705][ C1] apic_timer_interrupt+0xf/0x20 [ 1587.493708][ C1] [ 1587.493711][ C1] RIP: 0010:vprintk_emit+0x5df/0x700 [ 1587.493719][ C1] Code: 00 48 b8 00 00 00 00 00 fc ff df 41 80 3c 06 00 0f 85 f8 00 00 00 48 83 3d 8d 97 96 07 00 74 6a e8 66 81 16 00 48 89 df 57 9d <0f> 1f 44 00 00 e9 06 ff ff ff e8 52 81 16 00 49 c1 ee 03 e8 c9 f8 [ 1587.493722][ C1] RSP: 0018:ffff8880a98a7570 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 1587.493729][ C1] RAX: ffff8880a988c1c0 RBX: 0000000000000293 RCX: 0000000000000006 [ 1587.493733][ C1] RDX: 0000000000000000 RSI: ffffffff815c849a RDI: 0000000000000293 [ 1587.493738][ C1] RBP: ffff8880a98a75b8 R08: 1ffffffff14ee12f R09: fffffbfff14ee130 [ 1587.493742][ C1] R10: fffffbfff14ee12f R11: ffffffff8a77097f R12: 000000000000003f [ 1587.493746][ C1] R13: 0000000000000200 R14: 1ffffffff11e6384 R15: ffff8880a7d7a540 [ 1587.493749][ C1] ? vprintk_emit+0x5da/0x700 [ 1587.493751][ C1] vprintk_default+0x28/0x30 [ 1587.493754][ C1] vprintk_func+0x7e/0x189 [ 1587.493757][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1587.493760][ C1] printk+0xba/0xed [ 1587.493763][ C1] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1587.493766][ C1] ? kobject_put.cold+0x1b6/0x2e6 [ 1587.493769][ C1] kobject_put.cold+0x266/0x2e6 [ 1587.493771][ C1] batadv_sysfs_del_hardif+0x6f/0xb8 [ 1587.493775][ C1] batadv_hardif_remove_interface+0x7d/0x170 [ 1587.493778][ C1] batadv_hard_if_event+0x2cb/0xf80 [ 1587.493781][ C1] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1587.493784][ C1] notifier_call_chain+0xc2/0x230 [ 1587.493787][ C1] raw_notifier_call_chain+0x2e/0x40 [ 1587.493790][ C1] call_netdevice_notifiers_info+0x3f/0x90 [ 1587.493793][ C1] rollback_registered_many+0x9b9/0xfc0 [ 1587.493796][ C1] ? generic_xdp_install+0x4a0/0x4a0 [ 1587.493800][ C1] ? __kasan_check_read+0x11/0x20 [ 1587.493803][ C1] ? mark_held_locks+0xa4/0xf0 [ 1587.493806][ C1] rollback_registered+0x109/0x1d0 [ 1587.493809][ C1] ? rollback_registered_many+0xfc0/0xfc0 [ 1587.493812][ C1] ? dev_set_rx_mode+0x30/0x40 [ 1587.493815][ C1] unregister_netdevice_queue+0x1ee/0x2c0 [ 1587.493818][ C1] internal_dev_destroy+0xc2/0x150 [ 1587.493821][ C1] ovs_vport_del+0x15e/0x1d0 [ 1587.493824][ C1] ovs_dp_detach_port+0x126/0x1b0 [ 1587.493827][ C1] __dp_destroy+0x351/0x450 [ 1587.493830][ C1] ovs_exit_net+0x287/0xc30 [ 1587.493833][ C1] ? synchronize_rcu.part.0+0xcf/0xe0 [ 1587.493835][ C1] ? ovs_dp_cmd_del+0x270/0x270 [ 1587.493838][ C1] ? ovs_dp_cmd_del+0x270/0x270 [ 1587.493841][ C1] ops_exit_list.isra.0+0xaa/0x150 [ 1587.493844][ C1] cleanup_net+0x4e2/0xa60 [ 1587.493847][ C1] ? netns_install+0x1d0/0x1d0 [ 1587.493850][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1587.493853][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1587.493856][ C1] ? trace_hardirqs_on+0x67/0x240 [ 1587.493859][ C1] process_one_work+0x9af/0x1740 [ 1587.493862][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1587.493865][ C1] ? lock_acquire+0x190/0x410 [ 1587.493867][ C1] worker_thread+0x98/0xe40 [ 1587.493870][ C1] kthread+0x361/0x430 [ 1587.493873][ C1] ? process_one_work+0x1740/0x1740 [ 1587.493876][ C1] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1587.493879][ C1] ret_from_fork+0x24/0x30 [ 1587.493946][ T1064] Kernel panic - not syncing: hung_task: blocked tasks [ 1587.493961][ T1064] CPU: 0 PID: 1064 Comm: khungtaskd Not tainted 5.3.0+ #0 [ 1587.493967][ T1064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1587.493971][ T1064] Call Trace: [ 1587.493986][ T1064] dump_stack+0x172/0x1f0 [ 1587.494004][ T1064] panic+0x2dc/0x755 [ 1587.494014][ T1064] ? add_taint.cold+0x16/0x16 [ 1587.494029][ T1064] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 1587.494045][ T1064] ? ___preempt_schedule+0x16/0x20 [ 1587.494062][ T1064] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 1587.494075][ T1064] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 1587.494089][ T1064] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 1587.494103][ T1064] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 1587.494121][ T1064] watchdog+0x9e1/0xef0 [ 1587.494142][ T1064] kthread+0x361/0x430 [ 1587.509655][ T7] kobject: (000000009837cbd8): dynamic_kobj_release [ 1587.510137][ T1064] ? reset_hung_task_detector+0x30/0x30 [ 1587.534427][ T7] kobject: 'batman_adv': free name [ 1587.539782][ T1064] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1587.552338][ T7] kobject: 'rx-0' (000000008880ea13): kobject_cleanup, parent 000000002b142397 [ 1587.552742][ T1064] ret_from_fork+0x24/0x30 [ 1587.557040][ T7] kobject: 'rx-0' (000000008880ea13): auto cleanup 'remove' event [ 1587.575829][ T1064] Kernel Offset: disabled [ 1588.253211][ T1064] Rebooting in 86400 seconds..