k_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:00 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37290001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:00 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000fe80000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xde030000}, 0x0) [ 3319.872581][T31152] validate_nla: 45 callbacks suppressed [ 3319.872622][T31152] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3319.896759][T31153] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3319.922892][T31155] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3319.950666][T31154] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 09:54:01 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e372a0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:01 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000fec0000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3320.106493][T31162] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3320.263231][T31136] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 3320.279501][T31135] device .3610 entered promiscuous mode 09:54:01 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x2f4, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:01 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e372b0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3320.326301][T31153] device .1313 entered promiscuous mode 09:54:01 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000fc000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3320.446684][T31176] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3320.496808][T31177] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3320.576783][T31179] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3320.688669][T31159] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3320.716921][T31154] device .1123 entered promiscuous mode [ 3320.754123][T31136] device .3611 entered promiscuous mode 09:54:02 executing program 3: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0x2, &(0x7f00000000c0)='%\x00'}, 0x30) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e256400d1bd", 0x2e}], 0x1}, 0x0) 09:54:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xdef70a00}, 0x0) 09:54:02 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e372c0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3320.813434][T31159] device .1124 entered promiscuous mode 09:54:02 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xaa410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:02 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000080fe000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:02 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x2f8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3320.949662][T31193] device .1314 entered promiscuous mode 09:54:02 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e372d0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:02 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000c0fe000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xdff70a00}, 0x0) [ 3321.142705][T31206] device .3612 entered promiscuous mode 09:54:02 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000ff000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:02 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e372e0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3321.514243][T31229] __nla_validate_parse: 14 callbacks suppressed [ 3321.514256][T31229] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:02 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000040000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3321.609455][T31207] device .1125 entered promiscuous mode [ 3321.682976][T31216] device .1315 entered promiscuous mode [ 3321.777897][T31217] device .3613 entered promiscuous mode 09:54:03 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000fc00000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:03 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000100000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:03 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e372f0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:03 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xab410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xe0f70a00}, 0x0) [ 3321.950507][T31247] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3322.006399][T31251] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:03 executing program 3: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x294, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:03 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000200000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:03 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x2fe, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:03 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37300001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3322.227042][T31249] device .1316 entered promiscuous mode 09:54:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xe1f70a00}, 0x0) [ 3322.389199][T31266] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:03 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000a00000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:03 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37310001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3322.653075][T31248] device .1126 entered promiscuous mode [ 3322.718985][T31278] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:03 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xac410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3322.769601][T31283] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:04 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000020000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:04 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37320001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:04 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000fc00000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3322.876948][T31275] device .1317 entered promiscuous mode 09:54:04 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x300, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xe2020000}, 0x0) [ 3323.045128][T31295] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:04 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000fc0000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:04 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37330001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:04 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000080fe00000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3323.451498][T31313] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:04 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00fec00000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:04 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000c0fe00000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3323.601288][T31289] device .1127 entered promiscuous mode 09:54:04 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37340001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3323.675491][T31305] device .1318 entered promiscuous mode 09:54:04 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xad410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:04 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x314, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:04 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00fec00000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xe2030000}, 0x0) [ 3323.835431][T31328] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:05 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000ff00000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3323.880472][T31331] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:05 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37350001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:05 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000c0fe000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:05 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000007fffffff00000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:05 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000ff00000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:05 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37360001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3324.479716][T31334] device .1128 entered promiscuous mode 09:54:05 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000400100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:05 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37370001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:05 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xae410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3324.580877][T31338] device .1319 entered promiscuous mode 09:54:05 executing program 3: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0xf0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:05 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x31a, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xe2f70a00}, 0x0) 09:54:06 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37380001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:06 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000001100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3324.906003][T31376] validate_nla: 43 callbacks suppressed [ 3324.906046][T31376] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3324.917132][T31377] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 09:54:06 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000002100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3325.027813][T31382] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3325.055479][T31384] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:54:06 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37390001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:06 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000a100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3325.305753][T31392] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3325.356970][T31394] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3325.372064][T31371] device .1129 entered promiscuous mode 09:54:06 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000fc100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3325.446360][T31397] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3325.457918][T31377] device .1320 entered promiscuous mode 09:54:06 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec={0x0, 0x0, 0x0, 0xfe80}, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:06 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xaf410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:06 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e373a0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xe3f70a00}, 0x0) 09:54:06 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x324, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3325.690835][T31411] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3325.691978][T31410] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 09:54:06 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000080fe100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:06 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec={0x0, 0x0, 0x0, 0xa00}, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3325.737927][T31412] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 09:54:07 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e373b0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3325.846773][T31413] device .1321 entered promiscuous mode 09:54:07 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000c0fe100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:07 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec={0x0, 0x0, 0x0, 0xfc}, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xe4f70a00}, 0x0) 09:54:07 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e373c0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:07 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec={0x0, 0x0, 0x0, 0xfc}, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3326.358356][T31410] device .1130 entered promiscuous mode 09:54:07 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xb0410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:07 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000ff100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:07 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e373d0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3326.638989][T31451] __nla_validate_parse: 16 callbacks suppressed [ 3326.639020][T31451] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3326.711582][T31453] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3326.846313][T31437] device .1322 entered promiscuous mode 09:54:08 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x32c, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:08 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec={0x0, 0x0, 0x2}, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:08 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000007fffffff100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:08 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e373e0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xe4ffffff}, 0x0) [ 3327.005805][T31461] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:08 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000002000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:08 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37410001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:08 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x7, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0x3, 0x3}, 0x0, 0x0, &(0x7f0000000500)={0x1, 0x0, 0x2, 0x40}, &(0x7f0000000540)=0x1ff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={&(0x7f0000000340), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400, 0x0, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000480)="7093a0", &(0x7f0000000280), 0x7, r2}, 0x38) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000000040)={0x0, &(0x7f0000000200)=""/163, &(0x7f00000002c0), &(0x7f0000000080), 0x3, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="95000000000000009dab66fff0ffffff850800009c00000018340000020000000300000000000000"], &(0x7f00000000c0)='GPL\x00', 0xff, 0x53, &(0x7f0000000180)=""/83, 0x41100, 0x3, [], 0x0, 0x18, r2, 0x8, &(0x7f00000002c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000006c0)={0x5, 0x1, 0x7f2, 0x9}, 0x10, 0x0, r0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000400)={0x0, r3}, 0x10) close(r2) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r5 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r5, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r5, r4}) recvmsg(r5, &(0x7f0000001dc0)={&(0x7f0000001580)=@can, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001600)=""/76, 0x4c}, {&(0x7f0000001680)=""/174, 0xae}, {&(0x7f0000001740)=""/143, 0x8f}, {&(0x7f0000001800)=""/177, 0xb1}, {&(0x7f00000018c0)=""/105, 0x69}, {&(0x7f0000001940)=""/200, 0xc8}, {&(0x7f0000001a40)}, {&(0x7f0000001a80)=""/194, 0xc2}, {&(0x7f0000001b80)=""/127, 0x7f}], 0x9, &(0x7f0000001cc0)=""/244, 0xf4}, 0x10002) sendmsg$kcm(r5, &(0x7f0000000b80)={&(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x20, 0x0}}}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000800)="6e58867197832fc73bad8bb05e8423b19499833ee78638e98fbeed9b90df5c635808088e19927e4fbb5d3590b06c810c76b7f8b75e32c0decc589d63a0561e9b2c47e78ac7b2aaee1c", 0x49}], 0x1, &(0x7f00000008c0)=[{0xc8, 0x108, 0x69f, "274378f1928037ab381697911f155e47c4ecc8bfe2a25c18640404b35889ef2f4acf1265d86c65e2ec41922a9b0d812fbc3f7779ec24e9bfdb831f9d89d715ad0053239b8dc5d217c6a4ff34a705a0cf681f2b8642b8b89555ccb81b4338ed8e43b8e93113aa796fbbbc1cb975cdd9d4e3f8cd6879f20cd11e108c720715e908e7f2533298de771526b0fd9adf55a3065b89380f4dc46b81f1b185c975ab3c5bc870d981a0ab18ae9229fbedb09d492a0b"}, {0xf0, 0x114, 0xc27d, "9febdcb40f3798780401d41f8cf5e74994fadcddd9e67023f6837236afa3c3ff60daba6b4fdf79bb9d1b535b6280e20e4cd04f2b4ced79f8c934d70f0e752e63ca7ee65de56596c5dbffbda5e31528ff7df3a38fef31462f082d66bd09e0404e5510be5abd9c5bdf619b0bf3ce4c96a1ec9af788fec70d2e6b993847921fa9319a9b2ad6f85dccb42d45418be9b80de9aa2fd20e297d6c1866abbb35f8cce705e6d17766226df2ccd0ead4886090cb32ee11005782b2a7ca91d011e4d8767e8ceb70cd7b07fe32b859d2aecf0a2bf4f487db8e80bd9b5e20a3e28f"}, {0x18, 0x29, 0x6a, "790ca8205338616b"}, {0xc8, 0x117, 0x6, "1ef173732d0326b28307d8ced279eb7abfde843ff77e9da7877af0f0a7caa2e43a3ad64060c8b00a09b5efd91bb7a8afd7445d86081431e22bb194dfebbb277f379821b80973f6ec7dbb36395936e8504fa56e933d3d6910562e44e209162b5f5e3ea42b1cfeb7be6b8e336f4c959f3811bc80508830fbac8aa06fc63fa9d2965a536a268e2a62fa89fe98df1c623a75522300f93c0dc6d77b8faff726acb0fb2bcd8b4d3422bf11eea7c3a0a9b418507c424c550e"}], 0x298}, 0x20004) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8940, &(0x7f0000000040)=0x2) [ 3327.333831][T31476] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3327.394388][T31479] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3327.422292][T31450] device .1131 entered promiscuous mode 09:54:08 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000004000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3327.841225][T31471] device .1323 entered promiscuous mode [ 3327.895977][T31452] device .1132 entered promiscuous mode 09:54:09 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xb1410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:09 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37420001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:09 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000a000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xe5f70a00}, 0x0) 09:54:09 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x32e, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3328.162215][T31509] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:09 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000fc000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3328.285031][T31510] device .1324 entered promiscuous mode 09:54:09 executing program 3: socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x4000080}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4ac106b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc72876ef3834293812e927c01c7da1322da44c7f2ed1084a12f56d1cb398dff1db3df9858837458a4ca037605000000b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a20819e02cc22e6be45574d4ed88b37ab8d7674c644dca2f1b4d745fd95c41f9dfc1adafd1e5a3e7f2e898961cb43e438c4e41ae43ea118e14ffffffffe4b8b99bffffb1ac006c67767b03b95151aeb89e6d4a43c625aa6285b6e4afd8c1cc3eb215ba22f43115f4d39dc7beedb130d9f2be90133a4500000058b8c9370634060105baa664953514605fba3973aa021945b985a8a66e9cfa9d9e57033815717b4fdbe55b37cb8d7f41aacfbd4089ea1bd22440f64909a09b5a759a703e71f358e11ac8e13db15d792e604a4f279b3bd6621bdf2c17bc0400000000000000ff8dc4006200607a9a76e5d9656a7154c75773902a1bdf399df3925130312d095e9c1f973d091c198c1a11edb695cc425fe203d2f2655a76865c2c34e2470fcfb1248c0add5431a7fbcb0ef4f66a09af93a09fab1daae4b518d7a5d95a017864487367d6d7ee7bb0749cacf56cf27409c60fca2e0004000000000000a9cb6fca7844f9dab530388eb1f43d4abbfc59d6d1b18fe380df4bf024f120bd715d82033f2fb7d8fc9e0d77b294e097e293db58992c0024ab2fd8e5e7fb178f047ba32548b4d32972cba6f49051cec1bf6f16231bbb90a2d201e5a47811a2278a03bf7700b06fa191ebd3a0c2ef0058ffebd7ccde2480ae40d6156edc4ef81f74a7cdac01d998c24f34a5ba9a4a2039d0416e3f81074192c48c63384f52b8eeb70571e5bbb3e6d2b5eba51aee6f48968981811f832d064048c0e0bbe46984f1f0d0504255c22ee8674053d0e160e525536edf56a9550a7a6f0889f4ee8964875fea6ff57ba6ae25c5e8ca4f78d5a01308243b08f1caa46be5244d64f8e875858e083144c642f71cdc8e5634c1360c056430f677ee7ed7ac1f9743786b2fb8d0fcfcc3d36c93230b7b059bc295aa0e38b1c3edc3492b96e73d2060acfd8145e4a5851bc4d6fdc5ad939d7795f3879baa88bd0c84892c97c80987e5c7954e9f3694d116b01ce0b8ef953de70e7ce0311c8b018956f8a42ca26ab295f1ecf607a8dc38e525f415a1bd46b38845ebca04061bacbf627f798c7f520078fee48f83b5989543729e36a9e1d686bc86cd51704f309130f5347413776a7b7bea3c46c0c4c4b7c27c45057d95ac85ac1cdcee8e6fa31fc02137ed1fb4b21c13b9a2c5e3f7c9ef9c45a314a6f0b9352be92986d63263b1aa5264cb4a82cf080de1f87808d0711dd76f2977ca7f2684bfa5c14a0cd6f1f561d34e4e9851e81d4a355abf43d917c16a2bb0cfb284fcfde901576954ef59e4a658ca431be123b9ee2c8ff10e934847604d930f62924d0562ce17f6dadf5053ed8f33092a41bb463c407f87dafd6199f9ddd1f62da58ca7d3297d6a1bfc5a9aa38a05e70591d5cdab1c268ef3c1984c7c51566cfc2ab6e6fbc99ec206a54fb49056a555414178ef00d8b873c59f01eb5d83415994efcc6ec4b3c275cd6b1b5ff82ef7d7abb1d218e7a1d0afa285706841aac9ccc89df41c39dd58dd70569dde45f8ad62edc65828fbb6e279f745d2872f0c08635e465ca443a6a64c7803760880af23fb3f438a5d11fffc96dd1cb951642f1433f65b4e170a62a5f7a8d0f9d5cef0d17289c43d4aee2127f7a343899434594cc23e1c864164e130754b337e520f285dc670a31241bfb43ac62fc7f985586168483427072a535f2cac81ec261c8af540b0201634"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac141442e6", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x4341e) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x48000, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000100)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'geneve1\x00'}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000600)={0x0, 0x0}) close(0xffffffffffffffff) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r2, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[{0x10, 0x84, 0x1}], 0x10}, 0x0) 09:54:09 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37430001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:09 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x33c, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xe6f70a00}, 0x0) [ 3328.596262][T31526] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:09 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000a0000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3328.757236][T31512] device .1133 entered promiscuous mode 09:54:09 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37440001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3328.809982][T31535] device .1325 entered promiscuous mode 09:54:10 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xb2410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x29, 0x0, &(0x7f0000000040)="b90102600040f000009e0ff008001fffffe100094000633a77fbac141434e0000001be3e7d0d182fff", 0x0, 0x104, 0x6000000000000000, 0x163, 0x0, &(0x7f0000000940)="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"}, 0x48) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) 09:54:10 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x33e, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xe7f70a00}, 0x0) 09:54:10 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000fe800000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3328.990803][T31546] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3329.049723][T31551] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:10 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x342, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000100)=0x15d3) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xc, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0x12) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) r4 = getpid() perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1414, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x48540}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)) perf_event_open(0x0, r4, 0xb, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 09:54:10 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37450001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:10 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000fec00000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3329.442274][T31571] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:10 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37460001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3329.651528][T31553] device .1134 entered promiscuous mode [ 3329.690803][ T34] audit: type=1804 audit(1607680450.852:217): pid=31570 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir334762343/syzkaller.t2YCSM/4309/memory.events" dev="sda1" ino=16364 res=1 errno=0 [ 3329.702603][T31555] device .1326 entered promiscuous mode 09:54:10 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xb3410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:10 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000fc0000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:11 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37470001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3329.901374][ T34] audit: type=1804 audit(1607680451.062:218): pid=31570 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir334762343/syzkaller.t2YCSM/4309/memory.events" dev="sda1" ino=16364 res=1 errno=0 09:54:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xe8f70a00}, 0x0) 09:54:11 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x344, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000100)={[{0x2b, 'pids'}, {0x0, 'pids'}]}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000018c0)=ANY=[], 0x33) bpf$ITER_CREATE(0x21, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) [ 3330.034366][T31588] validate_nla: 38 callbacks suppressed [ 3330.034405][T31588] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3330.063925][ T34] audit: type=1800 audit(1607680451.062:219): pid=31570 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="memory.events" dev="sda1" ino=16364 res=0 errno=0 [ 3330.087016][T31595] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:54:11 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000080fe0000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3330.136081][T31597] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3330.208419][ T34] audit: type=1804 audit(1607680451.102:220): pid=31567 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir334762343/syzkaller.t2YCSM/4309/memory.events" dev="sda1" ino=16364 res=1 errno=0 [ 3330.250324][T31601] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 09:54:11 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37480001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3330.432086][T31608] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:54:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000100)={[{0x2b, 'pids'}, {0x0, 'pids'}]}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000018c0)=ANY=[], 0x33) bpf$ITER_CREATE(0x21, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) [ 3330.489774][T31612] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:54:11 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000c0fe0000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3330.620219][T31588] device .1135 entered promiscuous mode 09:54:11 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37490001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3330.679419][T31597] device .1327 entered promiscuous mode 09:54:11 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xb4410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3330.731759][T31619] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 09:54:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xe9f70a00}, 0x0) 09:54:12 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x346, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3330.899830][T31626] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3330.913168][T31627] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 09:54:12 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000ff0000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:12 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0xe9, 0x4, 0x1, 0x6, 0x0, 0x8, 0x22014, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0xcb, 0x8}, 0x9406, 0x4, 0x0, 0x0, 0x800, 0x40000000}, 0xffffffffffffffff, 0xd, r0, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x5, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f0000000300)=0x443000033) 09:54:12 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e374a0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3331.046486][T31635] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 09:54:12 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000400000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:12 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e374b0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:12 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000001000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3331.659868][T31657] __nla_validate_parse: 9 callbacks suppressed [ 3331.659880][T31657] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3331.683367][T31627] device .1136 entered promiscuous mode 09:54:13 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000002000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3331.807596][T31630] device .1137 entered promiscuous mode 09:54:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, r0, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r3, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r3, r2}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000003240)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001340)={&(0x7f00000000c0)='i2c_reply\x00', r0}, 0x10) r7 = openat$cgroup(r0, &(0x7f00000013c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r7, &(0x7f0000001400)='cgroup.procs\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000001380)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r4, r5, 0x25}, 0x10) getpid() 09:54:13 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x34c, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3331.938950][T31635] device .1328 entered promiscuous mode 09:54:13 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xb5410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xeaf70a00}, 0x0) 09:54:13 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e374c0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:13 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000a000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3332.274098][T31684] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3b, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x6) write$cgroup_int(r1, &(0x7f0000000200), 0x400c00) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f00000004c0)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r4 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r4, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000040)={r4, r3}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r3}, 0x10) 09:54:13 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e374d0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:13 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000fc000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3332.578242][T31695] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:13 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x35c, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:13 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdffd, 0x0, @perf_config_ext={0x2, 0x800}}, 0x0, 0xf, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) close(r0) socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xbb}}, 0x10, 0x0, 0x800000000000000, 0x0, 0x0, 0x300}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.memory_spread_page\x00', 0x2, 0x0) close(r0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000480)={&(0x7f0000000280)="01e11c742af70b3afa51051b050f4cbc3bda715e2677d57d3932e4eaacf3732630cf1aa450811403b72acf27cc163f51d7e70d73495c022d4841bd90f577295130a2236a9ca23f43e8a75ac002593a1a980c1efa79313c783bdef984825d0aa440b79d3e584c070703f47347268a165400be00000000000000", &(0x7f00000003c0)=""/181, &(0x7f0000000640)="c87c9499a2d343efdef2a191c892c1e7d80e253728c2c58a0c3fe825309ea405352d1290f449a847753bc72183f8da5486188440eaa65cb542d25ddbdf92659c52e85e92bf4a46cef29a2885ad52499c5d4733b27a9feec62a561141da9d1ac570473a3c75cdb8c55afa42c22fd6003bfb3f27366b6db6e131d49451fbd938bf07c825d8e593be83490dd55b5bf89769827f34cea43374e89f67fb6468cbfb18d233395e84f108ee94419022c5df33674ca24312e19d2430ce6e460abb1b552590a0e799a647", &(0x7f00000000c0)="891c77c85f03ff5009657868bd03fe227a0dc3f3e1825617b7a9dc856e1597712b627e02a9b33361a246d8c16f099fc9bd4dd379fe67eaec", 0x3, 0xffffffffffffffff, 0x4}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0}, 0x10) gettid() syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/time\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r1}, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x6611, &(0x7f0000000240)=0x9) 09:54:14 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e374e0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:14 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000080fe000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3333.062890][T31683] device .1138 entered promiscuous mode [ 3333.106770][T31714] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:14 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000c0fe000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3333.149857][T31688] device .1329 entered promiscuous mode [ 3333.177032][T31719] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3333.309971][T31687] device .1139 entered promiscuous mode 09:54:14 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x364, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xebf70a00}, 0x0) 09:54:14 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e374f0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:14 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xb6410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:14 executing program 3: socket$kcm(0x29, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001040)=ANY=[@ANYBLOB="b702000006000000bfa300000000000007030000007effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca7ebfcd0cd00006ed3d09a6175037958e271b60dedf8937f02008b5e5a076d83923dd29c034055d47dafe6c8dc3d5d64c07f34e4d5b3185b310efd4989147a00000000f110026e6d2ef831ab7ea0c34f17e3adeef3bb622003b538dfd8e012e795780f4580d760551b5b0a3404671d24b90000bdb2ca76050000003a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132c18555cf476619f28d9961b626c57c2691208171656d60a17e3c1c4b751ca532e6ea09c346dfebd31a08b32808b80200000000000000334d83239d0c2e9ff10ff2d27080e71113610e10d858e8327e7050b6c86adac12233f9a1fb9c2aec61ce63a38d316ef49b66d6e42fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a5f3d74ca891c4594e8a4399e01eadd3964663e88535c133f7130856f75643619f567d2e24f29e5dad9326edb697a6ea0182babc18cae2ed4b4390af9a9ceefd07e002cab5ebfcaad34732181feb215139f15eadddcb0c7cbe31fbae7c32f5ac5e7e64c21add9191eadd6e1795ad6a0f7f8cd3fccbdc3dec04b25dfc17975238345d4f71af35910b158e56657b7218baaa7cbf781c0a99bd50499ccff0f000000000000c7beba3da8223fe5308e4e65eebaace04f4087c4f0da0d9a88f9dbb593ddebf70132a4d0175b889b8eccf707882042e716df9b57b290c661d4e85031086e97bcc5ca0e221a0e34323c129102b7b7a643e82e88a1940b3c02ed9c92d6f64b1282dc519b00159830d7617001154c46bd3ca96318c570f0721fc7aa2a58090000000000000094f22cdf550ef091a78098534f0d973058594119d06d5ea9a8d085734000000000000000c12346e47ad97f4ead7cf754a52e4b2d0f22d428bd705414888700a30e2366c6a06b3367a389ca39059787790017b0689a1f3db9c24db65c1e00015c1d573dab18fd0600885f1ea8f2fd299fc3cdafda323e9c7080397bc49d70c060d57bc88fbe09baa058b040360ab9261503d2f363fb099408885afc2bf9a4f8c35070669e889f5e4be1b8e0d634ebc1057b7e98186fc5141bd670dba6f43279f73d9ab0fd96b069ef6d2857b6bf955012cf7fe50d133da86e0477e4a6cc999dc21c3ef408e633dfa35f14d6e734837d365e63845f3c1092f8dd4fc7eac9e8af3904ea0f3698cd9492794b82649b83ed4fa0f873339c4cad4ead1348474250eda2c8067ab730c1d82a5687f2ed690000522a0b7426000000000000000000000000000000000000000093fc7a82b98f99d9dedf7ba17f5f0b6d15e552fbd21f7eecff10241f43af03eea84c4304a5d3f93c3fc74c00000000000043e1ed82b9aa0ae92a499984a082776eb0937523f5292d12659906005cde64f903c3415c458a32c2318f0858f19c6def80e1481e8e1c0098fc3f38b7a57211adb15d824cfdcf229628c0de49860a44286fe0e257cfa4ce50f3d10763d442824414a7da26cc86d7e18631c2061b1c8a8e3c06837fe08de62f8710ca977960b74d0000ce73da6022a8671d1a3575b4e18c28c73203bf134686dd65808452cb6b76fcb134252c78de9b240de7b4cd015a77f76bb6470c05fc980b3d8f3f964f432a4bf6cddd6222c2da006b6fdb9c8468ae1d986a893b9519444d16a6dfa92c04331a6698507048fab5ae402acd05fe621f22712dfd09ea4770b4278fa14547d8ce3c21188e5e4e2baacd98e8e451d6aaaff80153636ed1d99346c2468dd95292ed87b44afef10bc3ce3a75595d78e9583bf4ea5de36099e3cddcb24ebb6eddb9e87c9ece87a42c0000abe1c6ea55887dfa18d0aea1b6eca5a883702b0bf3aeebb225895db90e237157a34e9f447237ea5b391bddd1290f7ce987a0e36b8e71b1779bbe95ffa9c3c0f6ba66e4d48e75253e49d21836e4b3220616aafbe7a3a18375ae593eb58fd500426286472466823cb8e1800aaaa0d9463c0c4ea5541a55df6eeffec0b66482228816cdfccb98374c644eea45de7867a0efbad0ab2bc33b350440a90b791b2b33f74a112a3b91b40bed8db2df8633207f8387e04ca52ab0f3f7b058b13523b896800b992972d9609551c27a5916ea16069c5bf55b98d926d3c27e7945b29996e5cefbc9f857bc1332d200194f658b930780603134ae6b7f29eabda6e3219821e21b790c475b14b7fe4fe002dffd651faa79bb0cee0cdac2bc3218f2ddaa6f7ba04b696a30d313bed30ba8f35569a9b07ee7308da09c01a4b827aa1784d927aca9b8540534c5c49a0300cfbc2213fc1572b0204dd456b11a454d1f3214179974aae624ea59500f5e048b2780666d7f49af25be909984aea1b81f33426f86b4b941c08dfe2bc8ec246ec1aae120d32405e428923f3a83d9ba5c373f5e6ef2120b451e2806370f1ed60c9fd5d9af4d16cb0f413c324da52d4bd2e01d3ac2d578d72e4663322dfc9245ce3e3a097fb82f4e3b61a570b96f8274f72f1c55ee3d325c7496afc2f10cfea516ae436751227378f00ca0f1f6c1dc700dd90b96a330f92bff736c83ca53e7f02b734d1a9292896f5d7f244bfab4946c7042e88206f641eafcc5b4ba7a7880533cdeac995d1caf6936f356ecf07a0084e7adc2dc12417997b03087c7b3b44b06f6158a2a18ce0e56ffbeb22f40521dd9972583d413098aa80db98ef324a2bfb6961c07b47521973cf0bb6f5530f6216b047b35d6e06b72b22b29de42bb1bc8ce0a0e3500000000000000000000000000b92eb197e4149627920000008000000000801792756f90b37f0858efc387f5592024314a4b0ed750fa72e5948ac30f5921c14ef578d413e7b2a9e2f87f7b44949fe14c00000000000047030c09f62d444b4981db81799776eeb4448278de519705fa8b56779bc8cc927b308c8e50817996c09121caf47f76158362c74904f89cbc588aae84567a83571ff72bb65c082b5a8dedc05a3167d84205d5af86553c21e1f023a51c0e179fccfbc20198233ddcaa45613899d19082453b180ca0c525b8d3cfaf7d0bcddeb5d5c7166038f276a92941393ba5e51f77172822bd903d9f8b436656771774ed88daab0d0cfdd1bf4d30ab566e1a4cb3ad66d830e10f7c1de13218ef613204c2b7c1ad48b01c208f4032e9b3bba7d6ceca38d3e96db049b92fc32ee34fe7a3419c8fbf03d61c159dc58668e1b1b1a2c55b614d622b8de97f4ae45681ed3e73db3c78ca18c9f08d1c47edf1a4d7298109f31b6078711ee72eacab61213bf50000000000000000000000000000001217887d0452aa6d26e4614d511710abeec84b78c027c160ba375dfa55a4b3fad5fa3e499b832ce4dfb91122193d514ed992c07f8cd6d897b314907e15642da228dbc03429e6e0e7ac118ed351c3b0c44bf5d8b58be573f8333aa8cc2ec5b5e305b3dee2562d415b4b9e700441bc65822959e6edd530797f55f9fe8510423409629a20c8da58cf55f3dd9a35d9ca93e4b4591679547b8de8af1782451f7b8e1de508f1e9e525210d62bc850f8035040ad9e562be58797515b737bfb21d35ac560f99dbd18dad5e6345a464955e8141d75b6177e4fa176a2446de98078543606e76f0294fee7d19a0f327f8796d77b6e24b8df4bb438b527d10e657d49b844198ea9f93c4fd6fd2daa9bd87fd1e02ecc8075dca1280c201043257e9bd3c9a7aa150eb171163e9faca03b24fa300ef90e22329d1d70a2c93508cbfe4ad364256937796f941c2faad94785f48777941f0cd3dba54ab6a5d5e91e90ac9ae994c3d4108b2fe7eca9413ac9bc138c74800487eb19c48db3f79be964808d409b5e36fc7fdd41def361427b6b9c118e5c9a0a1d5ca24886eb8a78796540635ac3530b9025d8bad0533a7f81b2188ec75a5fc9302e3695bdcc9ab11201ef940569c995c21eeaefe2e8fc02e0433dc7371d1f72124bad23e554c30fdd7cd8c2da1e8706417da9ad8916551a1182fac08603dfc2f2279ba161c13984cd753b54a85e6f3018c7d48c4b6c2f6910975e9ff51318b09fa13e2d38ce013aab41524c298c3719e31bcb1f102eaeee69a19e006bcdb1acc2664efa949a1a07bb3d7848d5e1381fbe63c5220537c28aead799f82517a12bf84e0e196a00833f464dd2f6547f14ebf137fce33efeb813211f31ff24d7dbb00f2574ccda59b3ea068fc2a18c37ee579f5a9ec8d5c0570d39980e619e7257222c6d47215c0f1b4d9c523b78438931a25a867549a342d1047c2c4553eef42e75d662735600f7fad9a7f7fd3173d615cd8eb91cda285f5f93673b3357afc27773d677b04e926aa73500289f5cac66afeec93b542f47137efcb66d62589ca890d972aef3c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x20, 0x0, 0xfff, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000140)="b9ff0307600d698cff9e14f008004de7f9c764362ae28eff07000000000100a08b7944080594e5d04e0d44187933b474b67b2b4b777b5c15d51e3e7b1263afc0bac3", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 09:54:14 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000ff000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3333.517054][T31736] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3333.574020][T31743] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3333.599991][T31735] device .1330 entered promiscuous mode 09:54:14 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)="6610a8b9e551574d500b50830fa10f100f", 0x11}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x6e0b00, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000009000)={&(0x7f0000006b40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000008ec0)=[{&(0x7f0000006bc0)=""/246, 0xf6}, {&(0x7f0000006cc0)=""/4096, 0x1000}, {&(0x7f0000007cc0)=""/58, 0x3a}, {&(0x7f0000007d00)=""/154, 0x9a}, {&(0x7f0000007dc0)=""/136, 0x88}, {&(0x7f0000007e80)=""/4096, 0x1000}, {&(0x7f0000008e80)=""/59, 0x3b}], 0x7, &(0x7f0000008f40)=""/152, 0x98}, 0x2021) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup(r5, &(0x7f0000000180)='syz0\x00', 0x1ff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000091c0)={r3, 0x10, &(0x7f0000009180)={&(0x7f00000090c0)=""/134, 0x86, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000009200)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000080)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xfffffc00}], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, [], r4, 0x1b, r5, 0x8, &(0x7f0000009040)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000009080)={0x1, 0xc, 0x0, 0x4}, 0x10, r6}, 0x78) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x7, 0x7, &(0x7f0000000200)=@raw=[@map_val={0x18, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, @exit, @generic={0x7, 0x4, 0xc, 0xfffe, 0xf21}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @exit], &(0x7f0000000280)='syzkaller\x00', 0x6, 0xce, &(0x7f0000000300)=""/206, 0x41000, 0x8, [], 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x6, 0x6f19, 0xc0000}, 0x10, 0xffffffffffffffff}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xe, 0x9, &(0x7f0000000080)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0xfff}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}], &(0x7f0000000100)='GPL\x00', 0x1, 0x26, &(0x7f0000000140)=""/38, 0x41000, 0x6, [], r4, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x5, 0x101, 0x9}, 0x10, 0x0, r7}, 0x78) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'batadv0\x00'}) 09:54:14 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000007fffffff000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:14 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37500001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xecf70a00}, 0x0) 09:54:15 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000020000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3334.006270][T31758] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:15 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37510001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3334.169991][T31744] device .1140 entered promiscuous mode [ 3334.286173][T31773] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3334.317371][T31763] device .1331 entered promiscuous mode 09:54:15 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x36c, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:15 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xb7410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3334.347092][T31774] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:15 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000040000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:15 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37520001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xedf70a00}, 0x0) 09:54:15 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x6, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="b700000012edfffebfa30000000000000703000028feffff620af0fff8ffffff61a4f0ff000000003e040000000000007f000000000000005504000014ed0a001600000017ffffffbc44000000000000630a00fe000000006e04000000000000c6000000000000009500000000000000023bc065b7a379d17cf9333379fc9e84af69912435f1b6a693002e7f3be361917adef6ee1c8a2b4f8ef1e50b91f32050e436fe275daf51efd601b6482a0800000098efefb202ee010400006e7a1de4a21f379dbf01de00b1b564fef3bef70548aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd8dff0c710e4000000000000009fbe4b61a615c6c57a2b649dc74a1a610643b08d9ec21ead2ed51b104d4d91af25b8123deda8a3658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31a76e42f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d99edc3a6138d5f728d236619074d6ebdf098bc908f50ad228a40f9411fe7226a4040b96e37c4f46010400000000000029faf75ddd1aa96960bca97af13382cb881cc1f62c0f8f8f0e8d76b86f9c45636614786f5a2cb77230a874640dcbe0b20bb77c022d4cab080078fce8c5c81b7037181fc2f18f781aaa6e2957d7e39cc1baddcb7ec6667e699f24e41697ee7ea23e4b29a8b6cc9a1f5a7bb2b1ed81d2cf370ee4a2a00ebeb476ea3caae05f13792292cb949b3aab06b1e042ff2164d80c605532b18ab1c156b97e5889685a96949e4cb4f8f67b8bb84b0e733a63784ccc214d930cbb7e090d63fcd7071b53ac29df826f8ae6d6e18c1eacf5bf870768d5217e9bb5a05d9e22ce67f1231bd236486727d970acc546087acbf30f2f8165b47ba56dfadd14b306e98931485747292c6fe6e188750cf4f87cce2aa7d67c7133a9f05954cde298a35ea6d715ba80aee6335eb811a085ca14a7989f9777f600000000000000000000000000000000000000000000000000000000000386000000b854adb4f8080064e8407c6bdb37f4b0ac6f2128668279eb6fc144344e2d461c9a1be8fa0061ea9d55ee4716bea8e1cebf9ed39325ab4c5530dd6ee9fffc00000000000000d7c5af73c683625aaad5eda5004a76c9f8975ed4c5e4eb3e77e9885f69754932609f19e2f615a01cb6d17fbf5cb539403cb0572534f054d5514ad8264f7b029b2bdf2ca4958a62a6e744f9a4c1e646e1dd2ca19583f0f8b0dc53debd7d44f334e6ed7445a9580f970e483b307c4b3c018bc194b23d37e6a2e52d8288e5aab6fec586d52386e8c07a88c88e8faec5f1b16b2014f6952ce7d6be12c6bdb9651ca6fc907061be311d1354e6295698594a73136237bee068d3819400e43544830a3f74b7942f22336953b78a5b2032da4238cc61162c04c1297395b73e18c9387615a2bc87d9e2445f3d323d3fac347932a4bac694c55fe9d145906d410f58f1951405d10504efe402cae085afef5dbd617e87ddbd239e4a50d7eb8e327fb5db12cbd6a9ef547fd6ee9760d784cb1138e8e671c4f251cabdfe3400a670d14b9b3cd8d86e492997a0168c022ef3536bd1dc731f4f9f8cb6c3857f78b2414aa962a055034cb8aaaa95024f8da775f72950212b84fc6133ae14d1429cd4905dabb52e43af7e65acf97b4951fa1e967d16a5ed642efc855a4a46b85cd079934ad3188276efae9387eaa232697526e24b5d4fded86c3811ccd00520150b16000080122965558074956da5e4c3bbefcb64aa8be4456ed2caf0f467b6bbf3aa4371f5e76ab3f60afea80bb066aafb7517f787b090f419a20278a3c779e03afd9a6af6fd518e5dce030f88ec5a5cb7601a161da0f8089322d84ac523040d13e1f1300c2c6555bce60d95dd3288e53435713f03add23f14c8db5555c62de4f626483632a2ab547f88dd6eedc73a2655ba3a3463a0fb9ed379af0271a19ca3aa860aa4dcaeeb9bd91a0cb429efae2a5fcc08b3a572c921ac1476027772c87d1767e38ba49e3e57fafea83e495a6a1d1a4ebf83434986a51f9c47f5d7a45906d1dc26c0091dd66ffe3ffed0c39552a312e2db596d9c827e02f6fc13c8ddbb50bfd7dd8aa2f35f259fc83e007fe1a292dd3b856faa4b7e66e1b64505f65900839df71a97d4d07d37f7ecf8ed9a22da26ae674bba16c204f6b2f8f74fc56b7126d7c11ece6e88ec41192aaee75415c58d264a2b6adae02c6d1b62428902aad499825ab85a348638384cd12e61dbde5c47056f0a20b4e2a2328d5db5cfe56557a129e6be231acf5f57995c60d9fca5f63a0dfd18054717120bde466d04774b53208ad8b022719ca77a4e0a66b4708f791d849a5e2aaa0074a9560ede2600df5a5c41392fe9460080fcb1e65233fb8dbeec4c86dbcf6a0673e38d2d3615e5bfbde44afe0fa7564231fff7e7f1f3ad68492dd2ccb16490cfdc73d02719fa0aa7fadecb15b5d7d3e37e8b7d28921c4b9280979521173f322df408d9818b6cc400098abb869921911480a876fbba698801937e8b4264eb6f5137bdaa075f1488d22230592a7900"/1864], &(0x7f00000001c0)='GPL\x00'}, 0x48) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000080)={'team_slave_0\x00', @link_local}) bpf$PROG_LOAD(0x5, 0x0, 0x0) 09:54:15 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x372, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3334.699757][T31786] device .1332 entered promiscuous mode 09:54:15 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000a0000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:15 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37530001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xeef70a00}, 0x0) 09:54:16 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000fc0000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3335.042431][T31804] validate_nla: 33 callbacks suppressed [ 3335.042442][T31804] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3335.075251][T31805] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3335.130381][T31808] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:54:16 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37540001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:16 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000a00000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3335.351404][T31784] device .1141 entered promiscuous mode [ 3335.352714][T31790] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3335.429080][T31815] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3335.459451][T31816] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3335.493762][T31819] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3335.499612][T31804] device .1333 entered promiscuous mode [ 3335.761807][T31790] device .1142 entered promiscuous mode 09:54:16 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xb8000000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:16 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='afs_make_fs_call\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x248800) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x2, &(0x7f0000000080)=@raw=[@ldst={0x2, 0x3, 0x0, 0x4, 0x8, 0x0, 0xfffffffffffffffc}, @ldst={0x1, 0x0, 0x0, 0x7, 0x6, 0xfffffffffffffff0}], &(0x7f00000001c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x10, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000280)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0xd, 0xffff5ef5}, 0x10}, 0x78) r4 = socket$kcm(0x29, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r6 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r6, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000040)={r6, r5}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000003c0)={@map=0x1, r3, 0x29, 0x5, r5}, 0x14) 09:54:17 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000fe8000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:17 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37550001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xeff70a00}, 0x0) 09:54:17 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x374, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3335.903222][T31834] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3335.913870][T31837] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3335.951077][T31838] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 09:54:17 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37560001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3336.059387][T31837] device .1334 entered promiscuous mode 09:54:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xf0f70a00}, 0x0) 09:54:17 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000fec000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:17 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='afs_make_fs_call\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x248800) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x2, &(0x7f0000000080)=@raw=[@ldst={0x2, 0x3, 0x0, 0x4, 0x8, 0x0, 0xfffffffffffffffc}, @ldst={0x1, 0x0, 0x0, 0x7, 0x6, 0xfffffffffffffff0}], &(0x7f00000001c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x10, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000280)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0xd, 0xffff5ef5}, 0x10}, 0x78) r4 = socket$kcm(0x29, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000300000000000c00095000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321af3cf1a54f26fb0b71d0e6adfefcf1d8f7faf75e0f226bd917487960717142fa9ea4318123751c0a0e168c1886d0d4d94f2f4e345c652fbc16ee988e6e0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b32a83438810720a159cda903634e369a9e152ddca64057ff3c4744aeaccd3641110bec4e9027a0c8055bbfc3a96d2e8910c2c39e4b3449abe802f5ab3e89cf6c662ed4048d3b3e22278d00031e5388ee5c867ddd58211d6ece1ccb0cd2b6d3cffd963218ce740068725c37074e468ee207d2f73902ebcfcf49822775985bf31b715f5888b24efa0000000000000000000000000000000000000000ddffffff020000000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab3323aa9fdfb52faf9cb09c3bfd09000000b91ab219efdebb7b3de8f67581cf796a1d4223b9ff7ffcad3f6c962b9f03000000000000001cf41ab11f12fb1e0a494034127de7c6592df1a6c64d8f20a67745409e011f1264d43e153b3d34899f40159e800ea2474b540500a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a74e04bde740750fa4d9aaa705989b8e673e3296e52d337c56abf112874ec309baed0495f06d058a73651d6fe048ba6866adebab53168770a71ad901ace383e41d277b103923a9d971f7a2591dbe4a912ffaf6f658f3f9cd16286744f83a83f138f8f92efd92239eafce5c1b3f97a297c9e49a0c3300ef7b7fb5f09e0c8a868a353409e34d3e82279637599f35ad380a447483cac394c7bbdcd0e3b1c39b6e00916de48a4e70f03cc4146a77af02c1d4cefd4a2b94c0aed8477dfa8ceefb467f05c6977c78cdbf37704ec73755539280b064bdaba71f897144910fe050038ec9e47de89298b7bf4d769ccc18eede00e8ca5457870eb30d211e23ccc8e06dddeb61799257ab55ff413c86ba9affb12ec757c7234c270246c878d01160e6c07bf6cf8809c3a0d062357b22515567230ad1e1f4933545fc3c741374211663f6b63b1dd044dd0a2768e825972ea3b77641467c89fa0f82e8440105051e5510a33dcda5e143fbf221fff161c12ca389cbe4c51b3fa00675cc175067d2a214f8c9d9b2ecf63b66c5fd9c26a54d43fa050b88d1d43a8645bd9109b7e7131421c0f39113be7664e08bdd7115c61afcb718cf3c4680b2f6c7a8400e378a9b15bc20f49e298727340e87cdefb40e56e9cfad973347d0de7ba4754ff231a1b933d8f931ba3552b2c7c503f3d0e7ab0e958adb862822e40009995ae166deb9856291a43a6f7eb2e32cefbf46306f2af79b8d4c2bf0f7a2cb032dad13007b82e6044f643fc8cd47ae636a5dbe9864a117d27326850a7c3b570863f532c218b10af13d7be94987005088a83880ccab9c9920c2d2af8c5e13d52c83ac3fa7c3ae6c08384865b66d2b4dcb5dd9cba16b64ebbbf8702ae12c77e6e34991af603e3856a346cf7f9fe0bc9f2a1a7506d35e5eb7088aeda890cf8a4a6f31ba6d9b8cb098f935bdcbb29fd0f1a342c010000000000000048a9dea00000b91d2309dc7ae49e4d5f7e50b652053a39e7307c09ff3ac3e820b01c57dd74d4aafc4c383a17bc1de5347bb71ca165cbbbaa2935f602327484386b21b96492ae662082b56cf666e63a757c0ef3ea7af6881513be94b362e15ffca8ec453b3a2a67aedc0264273d82e3c4c67a"], &(0x7f0000000140)='GPL\x00'}, 0x48) r6 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r6, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000040)={r6, r5}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000003c0)={@map=0x1, r3, 0x29, 0x5, r5}, 0x14) 09:54:17 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000fc00000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:17 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37570001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3336.691893][T31868] __nla_validate_parse: 9 callbacks suppressed [ 3336.691927][T31868] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3336.736863][T31842] device .1143 entered promiscuous mode [ 3336.941649][T31853] device .1335 entered promiscuous mode [ 3337.064461][T31843] device .1144 entered promiscuous mode 09:54:18 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37580001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:18 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000080fe00000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:18 executing program 3: sendmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x20148, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x4000, 0x0, 0x0, 0x0, 0x8, 0x0, 0xc3db}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xaf\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x88\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 09:54:18 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xb8020000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:18 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x37c, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3337.126971][T31853] device .1336 entered promiscuous mode 09:54:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) [ 3337.246934][T31890] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:18 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000c0fe00000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:18 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x38c, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:18 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37590001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3337.665557][T31913] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3337.713107][T31915] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:18 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000ff00000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:19 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e375a0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3337.825204][T31898] device .1145 entered promiscuous mode [ 3337.872691][T31887] device syzkaller1 entered promiscuous mode 09:54:19 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xb8410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3338.032418][T31922] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:19 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000004000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3338.089280][T31923] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:19 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e375b0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3338.173974][T31905] device .1337 entered promiscuous mode [ 3338.324783][T31934] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:21 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000010000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:21 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e375c0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3340.167845][T31928] device .1146 entered promiscuous mode [ 3340.193613][T31905] device .1338 entered promiscuous mode 09:54:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000001880)=""/96, 0x60}, {&(0x7f0000000240)}, {&(0x7f0000001700)=""/74, 0x4a}, {&(0x7f0000001900)=""/218, 0xda}], 0x4, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x4d8b90}], 0x8, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x0, 0x3f00}, 0x0) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0xfa70, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r2, 0x0, 0x5}, 0x40) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2120) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000340)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000540)=[{&(0x7f00000003c0)="17457b5a9a5bd6ff0c4fd9c6afa38dac66751f347e980b003d3276e420b9799000afac9bf758235ccf849da9df2ce64e2db038be804aaba3e075da877cc47087284b2dcf025cdb1545fa05f3f90a35286e82bd4c5e13f90902c1e17bde98bf446f90d1", 0x63}, {&(0x7f0000000500)="f494b5", 0x3}], 0x2, &(0x7f0000000580)=[{0x1008, 0x3a, 0x9, "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"}, {0x60, 0x10b, 0x4, "708680254c1b752d66fb4fd06f75dff20c16384f6c07923ee5e472039ab8484f869782c22404391fed691b7cfac6372bdd2c25d52159df025d60733f15810e3250aca561d95afc9a95d42ec0e3556d"}, {0x18, 0x108, 0x0, 'W'}], 0x1080}, 0x0) [ 3340.259468][T31932] device .1147 entered promiscuous mode [ 3340.293675][T31955] validate_nla: 23 callbacks suppressed [ 3340.293687][T31955] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:54:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xf1f70a00}, 0x0) 09:54:21 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:21 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000020000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3340.357545][T31955] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:21 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xb9410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:21 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e375d0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3340.476287][T31964] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3340.485303][T31963] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3340.579629][T31970] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 09:54:21 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000a0000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3340.653337][T31978] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3340.654791][T31964] device .1339 entered promiscuous mode [ 3340.662491][T31978] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3340.732822][T31980] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 09:54:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xf2f70a00}, 0x0) 09:54:22 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e375e0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3340.946065][T31987] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 09:54:22 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000fc0000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3341.064978][T31991] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3341.120003][T31991] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3341.185849][T31993] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3341.202995][T31970] device .1148 entered promiscuous mode 09:54:22 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000080fe0000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:22 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x394, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3341.262956][T31970] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 09:54:22 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0xffffffffffffffff, 0x3f, 0x8}, 0xc) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={&(0x7f0000000080)="ba5c94b718d4e7fa16fcd7d71712132831cf45b2ef17cf23add162be52a13495aceaa388d90fb10f6a15ebdb2e1d4c158edd25950998a51c7b62a8586a2359c3506d7ed72d2157b2443e168f95", &(0x7f0000000300)=""/48, &(0x7f0000000100)="5f7e64b1971fc94b33e532c2e733f6050ac178168b21e6a2d692b836aaf94b241412c815918b5598881da2c976beaa8495548cc5c747127b8ef88d2e8ad81f75f12031dca8c05251cf5e37edaddefc45eb510ffeb4295962428b51fda4edcd25ee55d5c8ecfbf36bf3ae9a854ad29b8360430b01a3bcd073dc63964fe613032c7bc5e6177d8ea5c8ceac1d57d7ca49680d93f121333f4171c6915b171ed978aa94f9c96168a2ee3948b7521cd515596055b914962ed0c8a7dca487f362f4b845c1808872cc6d70fbfdd96456cd8d3c82013ca90f02f69f32908f11ec42b6918ba6602987cea20748edf521797d", &(0x7f0000000340)="77f76190bfa2c92146f0589b6c51428e7b4e4b0cb14301006a124007c9c47f6eb366bdc1916472a935cbc3824e480ca630a4ffac0662a93f7061808132312ce464b937abd57bb86491ab412b73ac8eb347bc7f376563ddcb", 0x3, r0}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x1f, 0x4, 0x1, 0x10}, 0x40) sendmsg$sock(0xffffffffffffffff, 0xffffffffffffffff, 0x1) 09:54:22 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e375f0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:22 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000c0fe0000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3341.515938][T31987] device .1340 entered promiscuous mode 09:54:22 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5620, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000003c0), 0xa}, 0x1090, 0x0, 0x0, 0x9, 0x9, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000080)='net_prio.prioidx\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xe, r5, 0xa) openat$cgroup_int(r2, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000001640), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x70, 0x9, 0x8, 0x80, 0xff, 0x0, 0xffff, 0x408, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280), 0x4}, 0x8100, 0x9, 0x22e, 0x0, 0x40, 0x1, 0x65}, r3, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f0000000300)=0x443000033) [ 3341.813147][T31970] device .1149 entered promiscuous mode 09:54:23 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37600001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xf3f70a00}, 0x0) 09:54:23 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xba410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:23 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000ff0000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:23 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x39c, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3342.047398][T32029] device .1341 entered promiscuous mode [ 3342.064560][ T34] audit: type=1800 audit(1607680463.233:221): pid=32028 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="memory.events" dev="sda1" ino=15921 res=0 errno=0 [ 3342.067474][T32032] __nla_validate_parse: 2 callbacks suppressed [ 3342.067504][T32032] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:23 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000007fffffff0000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x70, 0x6, 0x6, 0x0, 0x3, 0x0, 0xffffffff, 0x200, 0xe, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x32, 0x2, @perf_bp={&(0x7f0000000300), 0x4}, 0x80, 0x81, 0xffff, 0x9, 0x8, 0x9, 0x8}, r0, 0xa, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000340)=r0, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='cpuset.sched_load_balance\x00', 0x2, 0x0) close(r4) sendmsg(r2, &(0x7f0000000100)={&(0x7f0000000280)=@generic={0x6, "efd98348cb6b825fa897ed70c2e36015d5a44a121989a591d2ed6604ae62c666f94a0273f89045b86ae9dd31a3bc18ac746e063d7cac3a833c3ed64b9d57abc21567a740d8a0d2e838c057cb6e2fc59fa2f42f56270b0c620fb6b7d8c0e9213c64dac1b3b1b07348092c6ec0305ae7413971800149d0e39b98b71b7b6d19"}, 0x80, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000500)="ab7dc9a4b41c515e258cc1a6c9321cf47c87c0703ef96c0a7deb641d3f0a048cc3cf03d7a69fb4f175f2ce9b09a8fc77c3c5512360817707798f31667760a4203a70d52a14cdd04e29859928e9f2e3b8ab7eefebd84a30a776336c10355b930b6d1f64645f325c0bfc5f5872db70b8ffe632715cff704a21c0b571b87c929052a6", 0x81}], 0x2, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x2a7}, 0x20004810) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="74d2525b480a"], 0xda00) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000005c0)='cgroup.subtree_control\x00', 0x2, 0x0) 09:54:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xf4f70a00}, 0x0) 09:54:23 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37610001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:23 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000200000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3342.514044][T32055] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3342.624394][T32042] device .1150 entered promiscuous mode [ 3342.687373][ T34] audit: type=1804 audit(1607680463.853:222): pid=32058 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir334762343/syzkaller.t2YCSM/4325/memory.events" dev="sda1" ino=16033 res=1 errno=0 09:54:23 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37620001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3342.745566][T32051] device .1342 entered promiscuous mode 09:54:24 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xbb410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000006000000bfa300000000000007030000007effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca7ebfcd0cd00006ed3d09a6175037958e271b60dedf8937f02008b5e5a076d83923dd29c034055d47dafe6c8dc3d5d78c07f34e4d5b3185b310efd4989147a00000000f110026e6d2ef831ab7ea0c34f17e3adeef3bb622003b538dfd8e012e795780f4580d760551b5b0a341a2d7cbdb90000bdb2ca8e050000003a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b626c57c2691208171656d60a17e3c1c4b751c51160fbcbb58e23f3ee6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239d0c2e9ff10ff2d27080e71113610e10d858e803000000b6c86adac12233f9a1fb9c2aec61ce63a38d316ef49b66d6e42fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a5f3d74ca891c4594e8a4399e01eadd3964663e88535c133f7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390af9a9ceefd07e002cab5ebf8aad34732181feb215139f15ea7e8cb0c7cbe31fbae7c34d5ac5e7e64c21add9191eadd6e1795ad6a0f7f8cd3fccbdc3dec04b25dfc17975238345d4f71af35910b158e56657b7218baaa7cbf781c0a99bd50499ccc421ace5e85efb17c7beba3da8223fe5308e4e65eebaace04f4087c4f0da0d9a88f9dbb593ddebf70132a4d0175b889b8eccf707882042e716df9b57b290c661d4e85031086e97bcc5ca0e221a0e34323c129102b7b7a643e82e88a1940b3c02ed9c92d6f64b1282dc519b00159830d7617001154c46bd3ca96318c570f0721fc7aa2a58090000000000000094f22cdf550ef091a78098534f0d973058594119d06d5ea9a8d0857382ec6e2a071474cfc12346e47ad97f4ead7cf754a52e4b2d0f22d428bd705414888700a30e2366c6a06b3367a389ca39059787790017b0689a173db9c24db65c1e00015c1d573dab18fd0600885f1ea8f2453dcb6a2bfd299fc3cdafda323e9c7080397bc49d70c060d57bc88fbe09baa058b040360ab9261503def363fb099408885afc2bf9a4f8c35070669e889f5e4be1b8e0d634ebc10d697e98186fc5141bd670dba6f43279f73db9dec75070cd9ab0fd96b069ef6d2857b6bf955012cf7fe50d133da86e0477e4a6cc999dc21c3ef408e633dfa35f14d6e734837d365e63845f3c1092f8dd4fc7eac9e8af39044b82649b83ed4fa0f873339c4cad4ead1348474250eda2c8067ab730c1d82a5687f2ed690000522a0b7426000000000000000000000000000000000000000093fc7a82b98f99d9dedf7ba17f5f0b6d15e552fbd21f7eecff10241f43af03eea84c4304a5d3f93c3fc74c00000000000043e1ed82b9aa0ae92a499984a082776eb0937523f5292d12659906005cde64f903c3415c618a32c2318f0858f19c6def80e1481e8e1c0098fc3f38b7a57211adb15d824cfdcf229628c0de49860a442863d6e257cfa4ce50f3d163d442824414a7da26cc86d7e18631c2061b1c8a8e3c06837fe08de62f8710ca977960b74d0000ce73da6022a8671d1a3575b4e18c28c73203bf134686dd65808452cb6b76fcb134252c78de9b240de7b4cd015a77f76bb6470c05fc980b3d8f3f964f432a4bf6cddd6222c2da006b6fdb9c8468ae1d986a893b9519444d16a6dfa92c04331a6698507048fab5ae402acd05fe621f22712dfd09ea4770b4278fa14547d8ce3c21188e5e4e2baacd98e8e451d6aaaff80153636ed1d99346c2468dd952595d78e9583bf4ea5de36099e3cddcb24ebb6eddb9a42c0000abe1c6ea55887dfa18d0aea1b6eca5a883702b0bf3aeebb225895db90e237157a34e9f447237ea5b391bddd1290f7ce987a0e36b8e71b1779bbe95ffa9c3c0f6ba66e4d48e75253e49d21836e4b3220616aafbe7a3a18375ae593eb58fd500426286472466823cb8e1800aaaa0d9463c0c4ea5541a55df6eeffec0b66482228816cdfccb98374c644eea45de7867a0efbad0ab2bc33b350440a90b791b2b33f74a112a3b91b40bed8db2df8633207f83874ca52ab0f3f7b058b13523b896800b992972d9609551c27a5916ea16069c5bf55b98d926d3c27e7945b29996e5cefbc9f857bc1332d200194f658b930780603134ae6b7f29eabda6e3219821e21b790c475b14b7fe4fe002dffd651faa79bb0cee0cdac2bc3218f2ddaa6f7ba04b696a30d313bed30ba88da09c01a4b827aa1784d927aca9b8540534c5c49a0300cfbc2213fc1572b0204dd456b11a454d1f32fb169974aae624ea59500f5e048b2780666d7f49af25be909984aea1bc1f33426f86b4b941c08dfe2bc8ec246ec1aae120d32405e428923f3a83d9ba5c8ff226ebf2120b451e2806370f1ed60c9fd5d9af4d16cb0f413c324da52d4bd2e01d3ac2d578d72e4663322dfc9245ce3e3a097fb82f4e3b61a570b96f8274f72f1c55ee3d325c7496afc2f10cfea516ae436751227378f00ca0f1f6c1dc700dd90b96a330f92bff736c83ca53e7f02b734d1a9292896f5d7f244bfab4942c7042e88206f641eafcc5b4ba7a7880533cdeac995d7a0084e7adc2dc12417997b03087c7b3b44b06f6158a2a18ce0e56ffbeb22f40521dd9972583d413098aa80db98ef324a2bfb6961c07b47521973cf0bb6f5530f6216b047b35d6e06b72b22b29de42bb1bc8ce0a0e3500000000000000000000000000b92eb197e414962792dab2414689a540d2801792756f90b37f0858efc387f5592024314a4b0ed750fa72e5948ac30f5921c14ef578d413e7b2a9e2f87f7b44949fe14c00000000000047030c09f62d444b4981db81799776eeb4448278de519705fa8b56779bc8cc927b308c8e50817996c09121caf47f76158362c74904f89cbc588aae84567a83571ff72bb65c082b5a8dedc05a3167d84205d5af86553c21e1f023a51c0e179fccfbc20198233ddcaa45613899d19082453b180ca0c525b8d3cfaf7d0bcddeb5d5c7166038f676a92941393ba5e51f77172822bd903d9f8b436656771774ed88daab0d0cfdd1bf4d301a4cb3ad66d830e10f7c1de13218ef613204c2b7c1ad48b01c208f4032e9b3bba7d6ceca38d3e96db049b92fc32ee34fe7a3419c8fbf03d61c159dc58668e1b1b1a2c55b614d622b8de97f4ae45681ed3e73db3c78ca18c9706302a648cd3d8f829d82090a6e3af08d1c47edf1a4d7298109f31b6078711ee72eacab61213bf5e2259b66e4364f6936fc1111f21e857edbdce9e4465f1e2b7887931f530ea14cc36bf61cfd3a80cc73ca809e544b14029b51a6a21deccfa526291c0751dd2f7f99e712fe6b15f03f8968a3eba2646a21f991bc189c7b0fdd841e7b27a89f6fc1bc23ebaa8d263872824a2d8771c97245fe858d90418629b4d5cc8b75d3d5bf3dad92407ba3acb6e66183f1afb62a5e43ede08eb144f737fc6a83d3be3c67367700"/2607], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x42, 0x20000000, &(0x7f00000000c0)="b9ff0300600d698cff9e14f008004de7f9c764362ae28eff070003e0000000a08b7944080894e5d04e0d86187933b474b67b2b4b777b5c15d51e3e7b1263afc0bac3", 0x0, 0x200, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) [ 3342.815293][ T34] audit: type=1804 audit(1607680463.903:223): pid=32065 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir334762343/syzkaller.t2YCSM/4325/memory.events" dev="sda1" ino=16033 res=1 errno=0 09:54:24 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000400000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:24 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x39e, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xf5f70a00}, 0x0) [ 3342.884152][T32068] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3342.934305][T32071] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3342.947539][ T34] audit: type=1800 audit(1607680463.903:224): pid=32065 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="memory.events" dev="sda1" ino=16033 res=0 errno=0 09:54:24 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37630001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:24 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000a00000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1ab, &(0x7f00000003c0)='bdev!)-%+wlan\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;YE\xec\x8c;\xf7\xcc\xa7\x8b6\n\xbe\x01\x01\xae\xb6\f4\x87\xd9j\xd8\x0e\xc2\x10\xb1\x7f\x95\x01fE\xaea\x10\x8f\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xd6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d\xaa\b\xe4\"\x1c\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8by}/\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj,q[\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k\x8c\x1dTi\xafq\xde\x06/ \x93O.\xe5<0\xfa\b\x82\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\n\xb5\xb6\xffBQ\x80\xe6\xe6\xaf\xc8\x15_>\xe6\xfc\xb9R\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xdf5\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\xc5#\x92\xa32)2\xd3\xa02q\xdb\xe4\xe3\x97\x9d\xbc\xc9\xf8G'}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x5080, 0x0, 0x1, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) recvmsg$kcm(r2, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x40001061) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x4, 0x2, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0}, 0x2004c885) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r3 = perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x80, 0x10, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext, 0x0, 0xe1, 0x1, 0x8, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$kcm(r4, &(0x7f0000002240)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000240)="ead7863603fb9516800e0f8e1d9ed6d70a9c", 0x12}, {&(0x7f0000000380)="5ea96cd2ee528a0837243b2f", 0xc}], 0x2, &(0x7f0000001100)=[{0x28, 0x119, 0x6, "65ddef55791627887deee37c08532e6b0d68d11bfc9a16b8"}, {0x10, 0x117}], 0x38}, 0x20044055) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='memory.events\x00') ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 3343.238821][T32086] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3343.284986][T32089] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:24 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37640001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3343.585408][T32074] device .1151 entered promiscuous mode 09:54:24 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000fc00000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:24 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xbc410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3343.673193][T32084] device .1343 entered promiscuous mode 09:54:24 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000000)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)="afa7929ab6193fb9187cd8accfc42e3b07fb5f20470196", 0x17}], 0x1, &(0x7f0000000300)=[{0x28, 0x0, 0x8001, "ebb44f5ec1eb298c7d06408638a7a096fd9d11ac"}, {0x1010, 0x119, 0x7, "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"}], 0x1038}, 0x4000) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000002c0)="2e00000013008105e00f80ecdbc0b5f207c804a01e000000302e20000000a3030e000cc009000a00aacc2b2043b2", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r4 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r4, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000040)={r4, r3}) recvmsg(r4, &(0x7f0000001dc0)={&(0x7f0000001580)=@can, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001600)=""/76, 0x4c}, {&(0x7f0000001680)=""/174, 0xae}, {&(0x7f0000001740)=""/143, 0x8f}, {&(0x7f0000001800)=""/177, 0xb1}, {&(0x7f00000018c0)=""/105, 0x69}, {&(0x7f0000001940)=""/200, 0xc8}, {&(0x7f0000001a40)}, {&(0x7f0000001a80)=""/194, 0xc2}, {&(0x7f0000001b80)=""/127, 0x7f}], 0x9, &(0x7f0000001cc0)=""/244, 0xf4}, 0x10002) r5 = socket$kcm(0x10, 0x2, 0x0) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) sendmsg$kcm(r5, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000200)="1cabe474d91b", 0x6}, {&(0x7f0000001e00)="743fd8b448df40e241c1738620630084895a1fc7baa64d2bfca8840180d8aa2e8a1db34ecaa6c890b8ed7ffd656a6cc1f2a2d2810daf53cfd9abafd8b793db4dd27b8f741857410bd8a103aa2dea76ad1239cc264f9accdcdbe0a86f8c498ee5542e159b8f", 0x65}], 0x2, &(0x7f0000002400)=ANY=[@ANYBLOB="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"], 0x340}, 0x4040004) recvmsg$kcm(r5, &(0x7f0000009000)={&(0x7f0000006b40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000008ec0)=[{&(0x7f0000006bc0)=""/246, 0xf6}, {&(0x7f0000006cc0)=""/4096, 0x1000}, {&(0x7f0000007cc0)=""/58, 0x3a}, {&(0x7f0000007d00)=""/154, 0x9a}, {&(0x7f0000007dc0)=""/136, 0x88}, {&(0x7f0000007e80)=""/4096, 0x1000}, {&(0x7f0000008e80)=""/59, 0x3b}], 0x7, &(0x7f0000008f40)=""/152, 0x98}, 0x2021) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup(r8, &(0x7f0000000180)='syz0\x00', 0x1ff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000091c0)={r6, 0x10, &(0x7f0000009180)={&(0x7f00000090c0)=""/134, 0x86, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000009200)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000080)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xfffffc00}], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, [], r7, 0x1b, r8, 0x8, &(0x7f0000009040)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000009080)={0x1, 0xc, 0x0, 0x4}, 0x10, r9}, 0x78) sendmsg$kcm(r4, &(0x7f0000001500)={&(0x7f0000000140)=@xdp={0x2c, 0x4, r7, 0x1a}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000001340)="b4da07f5b4551739ed6d8cbe7fe5af96b38b8666eac76bfc67d812cefd51ecb9655ae308416bd3623394be9f2630ae835a727599dc3a15913e07f5bd7959e12ee669e591463f8a3e449ddd8011eb13c19c13a562505fa74966419586bc14df3288f626440cbec20bf9663f5a7100215b11f68ef296f47e81684a413e75796d94add47c2cb55f92105da98edc55ef", 0x8e}, {&(0x7f0000001400)="1a0adb5f59a1869e9e490eee3fdff77d6570233f66d148484fe97a59fa71ab1b6eef43f95eeb75cf6530d14d9b424ac3e81b0fdf87eff60f7c6ab360b37c26e455b53c2aedbe19b4359cd7515f5571baff16c20b0a6347c968965a7935b7c5f9a812baf2cdb79499852016ca0928d64f3f68882c2471197aee6b242d3e40c2a7506a9f8e9fdba6c1b39b065a2117de68e667993033eea98d383acca5ce924411237ffcaebcc5f1274575efc3257e034b8e340187750cc44c436677a83f40982441c45d876c51196c55cdbe467358463349ab", 0xd2}], 0x2, &(0x7f0000000200)}, 0x0) [ 3343.733471][T32103] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:24 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3a2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xf6f70a00}, 0x0) [ 3343.808580][T32106] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:25 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000a000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:25 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37650001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:25 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000fe80000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3344.150851][T32125] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:25 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37660001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3344.332651][T32110] device .1152 entered promiscuous mode 09:54:25 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000fec0000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:25 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xbd410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3344.429169][T32117] device .1344 entered promiscuous mode [ 3344.492364][T32137] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xf7f70a00}, 0x0) 09:54:25 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000fc000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:25 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37670001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:26 executing program 3: perf_event_open$cgroup(&(0x7f0000000440)={0x3, 0x70, 0x0, 0xa2, 0x8, 0x80, 0x0, 0x9, 0x40085, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x0, @perf_bp={&(0x7f0000000400), 0x3}, 0x4101, 0xfff, 0x8, 0x7, 0xffffffffffffffc0, 0x3ff}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x8) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="364b9fd7e38d4089d4e083565a1e6664b693a45ae8694fc7f3131d85df227d18fb67a47b4f1e2ddb4b7762c74b47c8097fabd9d626a85bed1a1180c3bea1c9b8bd94587c3f758f0b3e566222c597cb16ff3ec631e762a46426d545ad9dc7b9b8eaf133c7295e2b5b1878a877095630bd2f39817566d36409ab3c5db3a9e6532283d893cf2fb8908e2c022f5def93d04e145e1cfad8f217b15e936846275f8324fcdd92bd9768", 0xa6}], 0x1, &(0x7f0000000140)=[{0x38, 0x100, 0x1, "95ef695859182b39a81fb51f93c6562761ded500efadbc4ffd767af1d6852504d429"}, {0xb8, 0x119, 0x10001, "d1354b02db0afe8488c24a75b0a540480c6c6b3cfb479ec3a367ced2becd6e29c9429fd4c66b829e54217c747d636e2d9ca1557bd95c653fb8aa2a32af6acd097c4f1ec5f00190e5828d29e8179062185603ce4a728fe8820c7865bd920ee031532d43b17b3549d5ba9612930c4085dcba57d9736c59fb4c2167f225bba93f42534241374a80c127c081911b9345052e02111e512d20c46f247021cfb48cd9e563f763038e21"}, {0x70, 0x108, 0x3ff, "39b077a96c182188543d5c4c473a31fd21fd785cfb078d88242fb7039beff4bf289650b291645a9365dbbeea2a83bcc7a032a5206d1e801aefa32e1da6a23c2b7a3e58b863bb32ddf5e9cb7daab50b8d304fcbcd7e21bee75f"}, {0x80, 0x102, 0x91d, "8908dd7da440f444eca0f865d27da92119214ea5084c7f424baed5172509d188d9806fe6a7d43c91d300f78517bb97a16f104436aa81cee93fd60ccbdb72fee4fb28ba3699576fc3d63877ef4c2da90d4e0149f9769a5a71ce6d3a76f31e597e0570deb8c958e05cbf48976248"}], 0x1e0}, 0x410) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000003c0)="14000000150085010000000000000500160000e2", 0x14}], 0x1, 0x0, 0x0, 0xa00}, 0x0) [ 3345.045255][T32140] device .1153 entered promiscuous mode 09:54:26 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000080fe000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:26 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3a8, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:26 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37680001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:26 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37690001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:26 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5c, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, 0x0, 0xc, 0xffffffffffffffff, 0x11) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)) r2 = socket$kcm(0x21, 0x2, 0x2) r3 = getpid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000840)={[{0x2b, 'cpu'}, {0x2d, 'rdma'}]}, 0xb) perf_event_open(&(0x7f00000007c0)={0x1, 0x70, 0x8, 0x0, 0x7, 0x9, 0x0, 0x9, 0xc1801, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000780), 0x2}, 0x210, 0x80, 0x6, 0x2, 0x8, 0x3, 0x7f}, r3, 0x0, 0xffffffffffffffff, 0x9) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1a, 0xa, &(0x7f0000000200)=ANY=[@ANYBLOB="5d2a0600fcffffff0384400006000000851610000800000085ae00011000000085000000800000008500000065000000950000000000000018220000", @ANYRES32=r0, @ANYRES64], &(0x7f0000000100)='syzkaller\x00', 0xffff, 0xfe, &(0x7f0000000280)=""/254, 0x41100, 0x2, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xb, 0x7, 0x1}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'wlan0\x00'}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000700)={r4, 0x0, 0xea, 0x2e, &(0x7f0000000480)="9fb2596bdb74937dea62e7006b2023b7519402bd6651c49e6941a4a3be865f4535206ce0520c18904966ccbd7369ed2165885588b7f4b8deb11829f4a51cbc41af9218014c117c5e5d8b76d3e11045bded58404c3c7aaf1812beec0227c26495a8a45556cb3ef4c3ada3382a0bc346f1087df7626871b302249ef11a20830dac8b647385b567cbafc88877681d91bd60339e7bc142d56d25fa400a8aba6000a74823b044c718b0fab5e5082631b1227adfea38ec904684e5f8443c0d256c2bee6f74a3cf8008936555e0832aba53cf6919a726aa8e86fdb0b00f70fc0b3c38eabea55d2e113b94e041eb", &(0x7f0000000580)=""/46, 0xa, 0x0, 0x8e, 0x6a, &(0x7f00000005c0)="c200ad0f411cfee54e25a4c663bac8e5b80113127ff6fe6acd713797b8261acfc752af039c984349df22a58b0cf07f1dea5c23a3ae7ebe810a79e92a313b06e1427d4388666c85a4f7e7a092390afa8e063185385660fc07c23d6a51fc798d64b9b78e82be3a96ea02af1deaf19e2fb4578679b322a30351ceca7160b4e64ebc1918ab41e634b488c341a4207e36", &(0x7f0000000680)="8301c033ada424473589c1e30e8fbd9ba5b2301feaf4b6b81e75aa4597194babada22ee862c23ef0aa26f69d682aa61c1f41ded33b7b1328e43e845094ca806d20cb4727a3165a994195d2365f55afd9eecc5641a927aa3a8ddc55d0235b2341bd96653ce0683a558832", 0x0, 0x4}, 0x48) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x500) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000001c0)={0xffffffffffffffff, r6}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x43408) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r7}, 0x8) 09:54:26 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000c0fe000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3345.374225][T32149] device .1345 entered promiscuous mode [ 3345.416065][T32178] validate_nla: 36 callbacks suppressed [ 3345.416143][T32178] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3345.467167][T32140] device .1154 entered promiscuous mode [ 3345.481793][T32184] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:54:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xf8f70a00}, 0x0) 09:54:26 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xbe010000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:26 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000ff000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3345.569803][T32189] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 09:54:26 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e376a0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3345.686407][T32197] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3345.744530][T32203] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3345.786933][T32205] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:54:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)={'b', ' *:* ', 'rw\x00'}, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x70, 0x80, 0x1f, 0x2, 0x5, 0x0, 0x5, 0x200, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext, 0x0, 0x5, 0xac, 0x0, 0x8, 0x1, 0x100}, r3, 0xd, r4, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) unlink(0x0) close(0xffffffffffffffff) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) 09:54:27 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3aa, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:27 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000040000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3345.840263][T32209] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3345.854960][T32197] device .1346 entered promiscuous mode 09:54:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xf9f70a00}, 0x0) 09:54:27 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e376b0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3346.047737][T32217] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3346.167892][T32222] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3346.191177][T32223] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:54:27 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000100100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:27 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e376c0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3346.558010][T32203] device .1155 entered promiscuous mode 09:54:27 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000200100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:27 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e376d0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3346.841108][T32222] device .1347 entered promiscuous mode 09:54:28 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xbe410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:28 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r1}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r2, &(0x7f00000000c0), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0xa, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x23}, @btf_id={0x18, 0xf, 0x3, 0x0, 0x2}, @alu={0x7, 0x0, 0x9, 0x5, 0x3, 0xc, 0xffffffffffffffea}, @ldst={0x0, 0x1, 0x3, 0xa, 0x1, 0x50, 0xfffffffffffffffc}, @map={0x18, 0x3, 0x1, 0x0, r2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @ldst={0x3, 0x2, 0x0, 0x0, 0xb, 0xffffffffffffffe0, 0x8}, @exit], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 09:54:28 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e376e0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:28 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000a00100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3346.907760][T32206] device .1156 entered promiscuous mode 09:54:28 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3ac, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xfa030000}, 0x0) 09:54:28 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000003}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000000)=@rc={0x1f, @none, 0x20}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="71d2730cc6afd8aee979461d09a00273", 0x10}, {&(0x7f00000001c0)="0feb2d2f86b506b8378a7999be543edea645a80b0cc9e94db3b637cf11ba13acc55cb62d6e13008c55164ff9652d3e71ef2f251f341be3b8318f4f421ee9aab5e39a0df4054129472beb441e7c9a5ee7fe92284c8307879c2f0ebdb6851bef68f93570e137601771dc7583c18d1b952ee41361fac3c7ea9f62ecae76bfb1ca0d3e4673d411a7dd6763d04815f16848a59fe437b5a970013fd11ea4073b359515d44691a7781ce3158a10e4a3b54989a49f588d369de006096e7fddd72aaaf5af7d76236dc97633c615e245b81fe02a8a2ad5382f6446abae32531d1c9cbf55ec894788d36dd2e06e", 0xe8}, {&(0x7f0000000780)="6744d05385c889a907416984c7cbfd8d700a71a11f4c15364d00077792fd8517c0f9b5251ac1ed329719dede604a4ff85919401daa4b0a1f2bdb386f36326eb5f2ac0ae343b9e5348b7394ca3802ca42351b91e76346b54bb4f18f1bdba6329091c70f1fc51dc7142006ea12b5e118d82e4ab0c77433a0df1172583ff3319c6d24d2f50dce520e3ca729bf49c1a9ee305b2a189e3286f23656bf170d5e6dcd8e10f29cb8f68b69e0ec83c56efcf314a0c478a4122d6bc9443e57408a36204b7f6bbed9d1504b6819064ae2d995157b45fda3979d91c557c1a3845110e426940c8c2d1808b7e90c43ab6fb3d817c15753f5d94f913225888d0747f49c6c805544d51223026432819b65a79535b613dd4bda5af20eaec2f9b18dc0daa00400c75ef87caeedad35c52655b194e1842ae155b340a45645c634b489b85c80ef1af264a0a6101a6a2089ebd1a383dbf48479a39a280caf759ccad12bd275d14ec1d23653a6ee04f329f68ef99e6ad539e5463403354af82fb04bf79bd50da349405ab19683888f6ebadbacecda5ba6f2aa686b7fdfe6a2d22b093baabb2a4c9ed8f9e8958869898d62ab116a72a3d03eeebd10acf99d529b90985ee52dad0c9ae838321c5fd68c10bf9316c846dfdcba45dd020486ad42cb86bc4a51666253b50a993dd31939c682a42751856a6ff172d1d50bcb3ef72647fe5ce055524c1b3ce7096c455e22f430175d3e377748346d8b245c800ba839d6abc42813818baac0c7f7810023e496ad07502f4f6ec6e40e84dd9f89a2725d6a235833efcbe55af7666f9975946b2e811aff6419cf640bb242380f005ffcfca4b2a85c58a484f1d9580fe0e86b7c9178ff45d21394563c9d4c4e4240c4480d500960448e0115fcd3bffd072eb95a65ba1de2e21079b36eed9838b3cad7a033da78d90688244992d8615f5b1889c3295cb75f94af3f85624e691b2e042770cdd043ad5f02f98d7f76717f4fd7bc19627063a5b964cf4063edb2c0677dcc274abfb19fa5882085d20d57b302d5fa937c94d9c2637311b024fda43af467ebb76b4c74da7d109d77cd5e405fe6fd68f6edb1b1de49641ac1490e5087cee4e9704f60fa5b9b9577027f54b90a8f1a5addf8843fc5ca73f65b20c03c0df42498c1755c05c9f3b4a07faa0aa2906acda1ab2a46776703a2a3a4fd1b4eb96473c4259d540aa806ab0d6bd18b08870e212462612f254d0e04eeda3b04b7a4e93bda792a5471b0d393ed355b3d65ab46bfeeb1f542162fb5f522e39a26b414b048d20f9f2befd16b9b6dfaa388e0fdd95adbf10b536463abaa0bff3e165205f983243939c526888a672411d42321a06ed5f22b64f6c6d1a7fd6ccfc764bda5828422b44813bb5a408f727289a3486356ea055b95049a5d8b7fe4c6787c76c332e2bb9c66a79e146d1f9e5d4ffdf68dd07dd17445cdf88545f0b36eb6bc1c500bdf9bba927e4a0fc47612265b314783a42ebb76800ff31023e27453bcc531bb0f16c89ca87f40891631d649102b5979e00d5d5f431a83564e5d2391f17be0ad5ca8c4c7f228a357bc56efbee0e425bbfec295b856b5b148df7df341d95caf640819c95d380df34d61908f999a03fc38a50c20712731a4a1ff4159d143df1b0534e9314c1c199b491f81db7dda00954d8945b30191ba2a53ea3b0078ade6c1effe3957d795bdfcc1bc502ffcd8972533ed6500b5b1380bf99b1fbd61ae217263e0321d007c6d570a60a81368a28662c4d33bde876f66f69e6bb943e06022dcfc2e2e8a39360ddea1e5b0c8769fd9dbd1dbbca6e5f81d0632c4ada400acb9182592f7ee9e45887a57873e7e32e5273b6b28c7f9fe2bf523037494b675140df1ae007055053531ae9899436846601478349009aa44318141a4fd27e1fa47b5664de1cbc5c9abb7f40167ecd5f1f031dbc6abc49eb278a307edbcd61838cc316cf4a0e833e51851104ddd5680729593673f7e62f6c2e277d2bdc057ebb059d610f05c3dcd95cd2dfa9755a0c104dce66f85d2d5945b9393809fecc226d89929bafac04d6b51559b6330fef7a7d104b56ecf11229bb906ba0b0ac5aa2a6a018f3b0e6fc7df2a0923e9de8c8954199e14ccb923cfe41343939d0d00828cae8f569b120ca64b7eb25e37623ad9b4e6684120b556091f968c9a718a4bf1af078df2ded555fff5dfab1fa6919ae9be7924cd5986fa842352950b592255f40e4597a3cdbeef4a7c4211e6506393e60640195c71489906ccea0acf8f3a187d0ae0c3d6d7ab164ca610eccf96afc39b8531f73d4236cbb2400a97a33d39f11b5a8bad0c82e6a6477f3030c3b2cb64cefd736a14b410225b5eb3f50c61333051aa3d37c74e765646ff9f412201e8ee96a1fcdcb24ff0feba9c11af518449f47932b280bc94cb2d969d868437eb3cf5db8107bdbee4b9bd5606c10607e343aef239802eb41976e9da7fd4c6fa086c9b5543c46dfdc8e01b8f39075cadc4e820e65b98f8b91900a2551b002cdeddbc8fdc0066af25a32458c0a7dc39ddb2229d3a5261cd2a301eeeaee1b553885b2eda7bed889eb225cc3a55b4a718b61942b0584a6d9a96313ab918849fbfec16baca695db0cbf967a0faced2eca80885bb1dd6c66763f5589f77233f03f8e97175eae1f3a9ba9ea8b267bc329f2df3025a5c689c31ea0f62d42eb950859212fbc578704e40b2e978aaae9f45aa2654c7265f1b4412815cc2b481776194e5a3a5fb7798980b51b0fbdf80008b302183c7ff10d091e8b1420030bbc48348c8a453eb36c96a22e45b823f8fcc48162a8b24a8130d144e382ab284a2f03b1e131655c09a2f64ce1495f398d9e09c624b99b7c9c486069d9b7eee241ee925063456451a89e1eb387e673febd636b1ae94ad7dc97fb5b5998f691f6472c311fd779c0eb01a450c56173bfa42418a68e8705f9321d904e5ef18dac19593197fbeca0195a6cc0571e981664f54099d2bc7325cfa173d5717ec06670c7446454c844ae06abf95d2bd2fa883abafa896b9cb9d6a73bd669ae8809b9974fdb15c9cddbed3849c441be1c0fe44965d59510be591ec3451b986b5e5e37fa767f42be2579176b75a0d665b5d6ef2a55bba4e626b6475debd7881785ce1285b112c26107700b7338b9a95028926f479cce3fcce1aec06de45079155182f664229870ffd79d9dd57887611817f62ec3bd5e001a4302b754a8512446c9c95620c49dfd97fde854d81a6606582e250eb6eeddfbbfad558b8a03a93bb936cf512336c8273bc35e57fea73a501bc72577423ddba788517045bdfbda253c63b0a30b2e31cc15e2fe278cc2e761cc953ede0bbdc24cc20db6c8ee9b58d279d69a39b67f1a9259e58a60f1989f43dbdc611aa8b6434ee228562fc0308fae7338a59d9a2995e8a4b0d54f9984d3854238733c165ae526604b494d71635f48e887b56307e5075def1cad2a8a6ffba163781df4b20a136c6178a5f1632d531d3cdbf53c7911c7ffa515a55d5eac89f6c2b32fa89dac2ce5ec53e6a02128ff437c6ec9888c8a7853381612de7cb57b555d10802a711f1c8ccb923cda004b7a3ba2302db25a0bd4c419589d4d070c11dab4fbd4c91428c4a6a09a0614c4c9277f14e3424501c2ab16203c379aba3d603fedd78c87852c339cb8ae7c10a27fd81b94ff49c0af9c5cdf597982d591c79ec0721dad1fec98bc4b923aac89a4290b57cba64d1dc05d9c64ad35432b1a8739678601bd1e2873d285bd4320624d9993ea9d64d30310efe2845eb9a2270ad1d4e073d4ac6531be324c772bb6ce81a71521e443b61f557f9c8d225ceb5297ee23a65780ae2a68488eea1a52427ccc0e456d1023de8ecbf67e7824b626bcad6c7a7ee027642fe763ab239c6efc4c892516287ecc7cb6e878c1f6b3c8412ef9e56abd5f7c5302fe622f89119134d613984de6a3bb488aa0f051caa244b9984fb111dff1891f580805b0baeadf9feb28ee843950731e6a8a36eb35ae20a5894d8e727797a74289e1dff26807defc958f1aa6759170ddf0ba1d9d2364463c418929e0e0238b1e0d8dfd9c67226c30d77de2fbd58a3b73ddd48a8654398a8f74a40a2f6375e0a4f40cae494c01f2c0cd3eb3c2e2ae5552e044f09b1e590bab2f0977e9afb1b2ec2530ec877ad5cf0f5012d4f701442477b783738a582f654343816908e1b71311c1cd17bc6e8ae915c9fdf0b09d7cf1ca549982ead8cfa4c344056b421149814e87451f4560908ae5e6ed3d0aedb795c4fe497d5c5fe471ae85d16cba6850e2088311dd9f3231fd15c282493e534514ef5af7f5b00ea5cecbcf460f39b15ec1affa84b45cc34358462cb5a2ce4ebbe6b59879c00555c0902cfe97b2d546ec802bbc16a71cd78984c0c6b24cc1eee6513fdf145a233a8e1aad795afa600396119b5f0fc69a68c591104c8cf3659320514d681952c1a5cfbfa937d39fbdb0d16f0487f6a92136fe4f9f543dcb794446c835b6c6a7b47988399d8b0a9ef3a0ca3adcd80c888d43bcc52c4daee1938e9efb839bb19dcbe0f458a4a127b1a5792ee13464404fbf1c82cbfee76c9cb0d487f430e21f697c6993de042051276836af3a0ff2d87c08981bf00700dda945df862c845f672793a41a42a1e0c8b21d7eb263faf6bc8bb9c37bab40202ce69e9eac17015df2ae5ac18f1d4fbda0a5ef85e3e33f47a376dfda60e83b87cd8b6c59d53d407bf1033c81896a04f3892021be6620169d0c14f3a1b4ccdcb623addb541359471424d8adc0afcaa3cabc2d0a215b49643e3133e344cbc2f0c10198e113beee9c3c4f61914cad7f396ffd9ed3572c4fa9557dca0dac856faac22667d91e23efc99ebee1decf5793d8ecd2a04300fb99421786b90fbc5874df1c95b1148521982b86e599abe199f906a5679fd1c719bd0901994e04ee4d2530228413972fb4a2bf08eed693f897123092f19bf036b52cf83d8068a58e5c64ab32e4140a168bf21a54e3638a51a3b72f1088c748f7927241b53bfe92796329a2c4c5bfc351a33a1b7e6a36e3e928ceeed19935c845b1bdd8de75bf0ce5aaa4e73dae51436c87ae47d8ca9e4faf8f242c40e30faca5db13b4858b3663dd0c6f50e220941dd9442b2e501a5864e8136342ae22de063c462bec58f1c41adfcdb59d2603ea704f363aa46c33f1428903878236c04b4a3fd56ed920f0ac34d4a4e39bef02cbdd9f3dd1d81315732fde4cb25e32750baec5ae5f9bd035dbb95854285a8b39a48f39623b686671b9e38dd705fe2a1705c4aaa6bcf72b4d8ff26182aa4583a8dd22f218571522545af3c4adf66d13c241c4689eb93aa5a2100d823836767e6e7ad0470efae3bed544e23dc7e9efb5d1d7c4c44168ca26dd70b74716cff4cdf21c45e7f3161df342f7df86d217caca766b38f242d79e6bbe295376a527b65b6e5a0a5049f2aff837f218a0b3aec538651697e29687911044c3266baf963509ea38ef32c26f632bbd1eea8e1fbe5019a44e12c04d3f21daebd42be08353936f94b17cb2534779ef074c85a9fd0d633ddbf3706432758257d313dba3713f1f4fc23c952f6d25dada243d2dbe3ea9d7251f347a43bf447ed4381914e49b296881e0505fc22ee573c0b8e3ac592307e306a833d5ea72d669a9aa54febf40c7c70fc2f819738942f9369cdeccafe0bc0a43128c244f31c1ac82ec6207793448b8837b9b6ff8485847e99770df65161123492eb18bdbd041126a77e5014ab297068566f66ce66c6cefbfb0896241401d756c5dc3d36f94fc27a73147d62", 0x1000}, {&(0x7f00000002c0)="a5eee0d9aed94f1e08d424211ea88e5caa7f76e90cf8d42302060ed7065156ee1a94c6", 0x23}, {&(0x7f0000000300)="4b0dc8483df24da12cea6bdc1233071a51414af1a5f884da7b27325d967afb60a58ad9c01cfbd54af72253ca56cf73e603c25ffae1432204ed44b119f1", 0x3d}, {&(0x7f0000000340)="27a5e4ce622b35ad79d80025f7ee2704321bb5610880a3a2d9f9c07b93d1dbe7edda4893cacf12847ddd78b5ff69c95ee0b4e6584d3c36a1ec03df6f128830c1527329daaecee0246d2fe974b0d37fee26263f9e2c1b361837cab1d0ef02b622109d4c2061c30442b828b3d9f2a510e57e4388dc540d9338d70ac6cfdbdeafe074", 0x81}], 0x6, &(0x7f0000001780)=[{0x1010, 0x3a, 0x3, "103a353983d3fb2eae4fb85a12e3980b5fbc6aa1e7bf2351c741319160ca0a2662996cfa7929d4fd45a20ff642912d7a59fca60f11565531b385ef514c38101336e8caed7b9f54b263b9a179ca8ca170b2397b3076796f9e65a65728cf9810269e29d98c46bb55546627c55dd9386afbd412110345de1b6b4f5df141cb02826f1f68fa39a93101c8e52e10c976a4b4ea1b4dfa64d6874fb1629e88da94045dbfd5afd90b8906d588d848bdb4d6c3cdca8ffed67fa45b21a7db07771fe09ea719cb581a77f15b176905f415612c0c3e03ca514bd4c9827107ff21b5aa1ca418933dab69fee1ceb2af0db6d94147b9deeec7ff3cba4f17161aa0c3b708754a0c3986dc460f251e9130ac39017a08415a4af3a469c9a251c0c52dba0f5d8b3aa6ddfe7bd633d0aedf9ae40ccdbac819810aabe81eeb93f137cb4ea6b444892ea9ea385e0dccb68fa669dcddf557a8bb9edf7afcb7c5e9833679c66591f73fa6cad86902fbf6a48bf7d26926cafd16af72beffed48e2606bdc74fcf58370dc4f2276f3a835130954b622bca54c0cd691f454ad6b76c381e7234e6912187ca689d7bb056c8f45567c80d48bdec6ba372b7e591f7b3ab2cba602aad3cf6b107e2c9340b192c03579859e44abc94b2938d194a69af2fdfe4653874c167ecc168723fa6507fc6d0136d20314aad81b7625af75f37a2b86b291ac9dc5338b9352f74623a84da8b323139c534cbb8cc6967788d23dfbd85070e9d4ec71551969ebefb914d9381acba867ce6cf7de6484c02d7a3c5dff0f1923543271e4dd9d348193bbbf91f02a2ca7c7e8ffca0425b07b14640c58caadea860efc46d3eee7e907305b75ae19b0363a99e5b2e4c87fbfa3dbd7b22994d4a4e3b5c7ddbf139bb72ac721d6d5586be8c10b356821160cecc6010aca7c7299b846695f856aa8acf79844e7a52a3d7758f163d69987080a8be20848f98af4819c06bec51ae67ae306955348511d82f907806e21fa69d2992c4449e9276752c295061395f1eda19d0b162bbb41b30f952ca730471b6c7a274842ba3b0e15b302604489858365b332b2af7a836f4aa2533610b96634760df1406a16c411b2a62328577e34432e5333aca6341ea19d96155041cb003df1656a7b95f72dbcde2b84ee952bd9d66b19940fa065450e7a08680dfaf106e17f9bb7de7b3a72a987902de57bbedd029f8ebb2d25c5209e933511bc0fa49f2df20df062f2498aa569538279d88c59aadf9fd7dc4bdd82b4b1a46b0875919562c2cbe1558044492c82bd77577bb34200b6c8cb5175f4abf403db80666fd610c862479d049f54e3c62027f43d4274994f60ec9902ca89d320638cf0774092b697840c45e01d45c506500acadb67eb4a96f75f550909936c601b1088d59f5ac9b7ae93eea9e1a82010ee1e8558ad8f5496857f93a3efcb92f713824247b6c0095a0f437aeceadaf9dc8ec5dc0602b6bb1108457801bf96a904c2446758a1dd1d78eff89f5ce578c8c53c9094149695524d5470318102b9f292c4db998524672eed8044340a344fda3988a68e1b9ea68fcb150a2e09d5c25e1af7304450f817112abe2c5452a5ae975e996c8682a6e39110820c76db51ab5e64de831f2be1a7f850894423980ac51adfb3c1be8e5ca7037a405f0062e83c03da1cacea1f1e64b20d04dc784665d90104bfb0c506746b1ce4b74a31a534faca91dfd05d2fd627277e17dfab3ddea23cfcb43831d42c086f76ab1fc46fa83f1c9a5fbcf38ce79d546cad034b1c0b135ee8d3b5c8ce3ffee033605b8a86eec84e4b4d667777bb8428db9f900a76ac37c51cec951e49067cdbf0d5f34a0f3f332c165e88cd5d7424b124e3a172bd4ba8be115785da6d6c36cf0b1a8c03b688a0b97cd4d1bc3b45deb0bfc87cb9743b3ec80845c63bdd0eaaeb93a1b2f7e484b7be25dcdcdc9ed405db06d9064a981f9ad310c11a589bcf2d5b407ef2d8fb87c34f35f4afbdc74ea7218376ed870cd27f683d8f6272b456ba7d646a1d53c4fd4fd395e71cceb98062898215f73e7c9d5ae68a6b499265ddfc67529bc00a9e0c8678953ad16dd5aa14990ff1a7ac23eebea033e5624936bb2fd2061defbcf71b6056eda11f40a666c26a32428c7445b4f16b9e58d6136f3f2a9d0a347854c010b70861c4531b37a450c7427bfe5f2adbd18e6e7242a3b9ec54d388c83992d5007f5829a8dc0c5fdbbc145ffd1ad46855043a7c2129643549bfbaa88339aa7b51b708da22df5b79c835ee7d9e0836e55fa8b1a79b59296aca9975363f5b1fa940cd35dc8a880ef29d1804fad71b9ee1bf7d944debb9e3df558f17e34b5108092fc99f96552873f979eca64a391e4ebe734f888bc688c4535da1f475f3a76e8ac6c5112c1828e7961b85a8fda89e278813d8895c3b76386d5f102e9e8d4400143efb75ddbbaf9a8b7def27257ef012af4ca3e41201c05313b93c251b1c6882fecf4c237eb6048d2bddb3805b4a4087c6bc353f0aae5fae9d4d6a3caa9242ee5d82b7cc874b42f532d3f137a2e7acbfb99a12bbc711895a8fa3c1347e8daca39424a5636e3ed07179e113d2eb68747670773c7c0c61d9b139674b33c07ec28a7ca7719f993914b54bd29d2b67accf55b68fafa0dc8feaae9b78a8694fd8298f24adadf3fe0e13d0e4eef37514c64ad1cce105ea2171a9d1146f7809d9ee222bde15eb93f2d6b816580306b4fa85be0f54b1eedbf61b2f96df3048f7c1d73cd5d75e2dcc5d5d83c409320d61bcf1ad1caac88ecd57f25406f641071949af9f83ac40d2fd653817150c723b1607a5d7dd20ae120b36f8134b69b8d830a61757ec99729cd9d9c1be88a2bbdabf9b09a374557d3789b3e128b8e4e65a18ea789e04851590cb27277d182fffd7ec51a2d0bf8cb8684237d1dea7d32e3a43d362f14bcb4013a7f6997f5f05a33cd126253ad09253c5d848d088062ca9b319f0db246b91d1ce2a1d2ca28017fbd27d754cf2083e6e1310f7704c83f4756fa85fe00090656d9710642faa2253eb3febe44d38536af53c1c6641b1ccbc39c27c3d4d581fd14c392f93fe7d08add184d706f4c28b80e24f67b41b3aed5f17beaf38333039600bbac8fdd677a95e141fc696ca0d21348010d567b686ed8fa2a744a01811575c78fe6a58e00047a30f4501f1644e81422ad420e91e1cf76a9c891f6259aee00ce94da8615f6b0dc4555f2269c4661560e9fb28a0628512e543b050b243772d3a1a8f63a2dcc8bfd46a8e58c189a026185d9eed069d5fea783f2e767996a3e5fe872d45fde76b6925c3565fc2c475a0986f2425a8b6ed931841c857ed8ea7389fdf76438f4d5eb4e4e02a0e643162ea28c710d9d97dda3fce81387d0fb83b508af63b9a5c3a657f56e6ad118f0ca0ba2b78295f22ee8a3ac51520bd7891f1cc770f59aa5b36b22badd00cade4b1c4c9970ec846916cb0b670f8044456c87e3f32f282e8a1c9d186c0fd43265b0889e6c90fac9657e7841221077e6e9ebf5932cfe2740fe37a876bdc8318bb0aeaeade38626220db01b115b61c181ff0138f2c962dbdc6f7a13574fa715184a420680292fbc544c490f64a3e0d4d21faa6993d748db6588523268f44f3a46c41605f22f6c9e8e756f6e2bf00db83d708600c4c66eb5b04261eb36b5db456351b5173c3931093643d1132d522fdf3fc7719b00e133549fde6673e8f4ef20064609103fdb6d6692924b806439a3ef915870235e800b89237005695093fa56e8a1fe077c708f238726c3be239ad9129807480586cfa3e1f1ff9a14d8fdd01e747e3b261831f3de8a17ae43ddfd461e9fc88091d559b6638e67333edc7b24276799049d0bcad45037958ee4cc5fc2fa5a3065c98ef54611f10c6010ad8fe60f262bbd712c4280bfeda50944744a49eff5509630abc2a7291f51e59095ee63af41e13b29f100fe59572e2318f948bb9218ab8d55ac80e4dc3c21a3b3a555f5dd3e3eb07c8cebe84621e0f0b11b632ec37458553b7bb9af53340c7573d86cf46dd743c56e24e773a0c442242151e08e7d3b88eca327fade1b9f4c4a81ef72a82205dc0dd2e10f80e5de95f6c7924d3fe42b3a7d8bf3e17453a0b05ed77dbad2897ba9e28284e459fa698d560410e496d1be820c2c5754e3638365ad8a407fd04f0eb44e921f1dc1f63c8d6e63465d0a659d5d68beb0163958177efd89821bffe6f4e2debf3451dab3f11644d73bb49eabf8532cc995ab3e8e060b4be6da3aba94135b0a717c3677ec041ff503ccfed1e1e6bf4aca38ad481b65a1102bff514b14ce307cd2da2caf3b82262ce0f7a57eb7e4ae791f1d10391ce363bb3b84f92cfdf7c9241bc23d7bae41baa9f4d5b5cddcc72a2453a98b0329345999677ed394aa741306f31f01efd150f42796cf4a2e765cd88cc83797c340003e657b6108f596c78d9f7ccc47b72267d84baf35c0478a31a045a1ba29dae66e30d86fbbe17786b841306fab608ff2d9002e7ad78b630009f1bab758e3aa0a3ccb688cc9fc29fa3373a93865986e29b75488dadc604f0006805f5f83426251d4a2f15768358d00aba66d988a1d8ccbfa62ff51b3360b814f75063d4f3feb0e34068f957b361b875df66a993a24dec5b4d9b96f71b34d52ab6b508131201869eb9e34cdf19d0d565011d5630c3c7bc23303e4ee29456feadd5ec2423c80803da2c564f96c2bccd650f93b84e9f17060b26248878b47f3772e6d92b301084f7cbaa1db4774bbc4f408749b50962a3af0ce3dae0db1c8c38a0b0a53a2b5c62aff234684cd8532f9606798027dd925e11a7e33575ec42c9b0e3244e33bfda123e3540b9bf1052bad85c8e22cc29d92600cc76ef1e3d2daa4fbdf0d8cbc295ab3b40f4e73f6d7cbf94a43df6fdfaecc847e5c60ecca6d486955832016c13343b3fd65f1e6684d849254ec1463305f042840f7db6a93949819a83b29226189fe712d8c493a7d0c95cf772b32079b21992a449b9a1aa08a1217ca195a12b1fe2d98522b5253f9df41f25c16f9fd7f9ef31654f74a017b2b0c02aaa3b8d0957935848341209d770a293c64cdbc1e069407348153e79ca0be0ad7c5397db2d130187f866bfe4912b245ec16c228df0ee978e4539cafb5984656adbba3434ed3fdee4590a1ee69ad6efcdd91ca77dd2dcf6501bd2550378c62f3eaee0ee0b71f9e0242c48e396eec57e11a82d76660a579795f659dfdf071a6c2f864affd45c65d90cba45650c660c76785290ed6009bce192c04b836d5334106424622d0a79767621c94bcb1dc4dc362ef30e3129ce308ea761bc5b1a11c38950ec40531c62d5a39ea9671c03b26751c1ec1f97b98ddc209f14a2daac412087f95d978d5e9507ecba367000426d49ca41c4b4db292885a5c474fb6a42d306a2e51f8dc664970b20154eaf7e8a169a0a80cbe4111515aa2f6018ee6408250ad05aa7be9c3e95d467f057897d38d17d6c98225bb9406fcf60ede3450155dcad60f98877222ba102f01e2dff1c16db73553ad0ddd88a65b0079b078a486cc82e2ded7baf09cca19ae5f92b4729a5993a83fda3bd74a6591111e62f536c6c0fa245b6838f06a1961adc8f60a177945753d7bc700e94b4debf0889199d2046e78299af180236288c661f9185f4b4cf45a663a66a9ee254e70cd588c9ad80410a06a5e712175c65e9a842cddca1761a2a647d61ad7b6220453cfca36b1f563b40e012a07eddf7637c22875ce0098a1a1abedf1b9e9a8d8b5982d0339ffc7ecce942cf6099f7b6473d5dc0e49bd319d1c7"}, {0x38, 0x1, 0xb1, "cb6528c35f1ca5047d76372eb5924138dc820cd9ee67c8cd5ade16f1af670c39112a274073"}, {0xb0, 0x1, 0x40, "6b41f3d1cc85bbf817f9259134556da1a034c98b337fe40c6ae1e2f90950d01a9420dc6ac1f3395670e936e10e2d0e69c1f3b07ae8ff503b99a1ba5b99094def37fe9734010622a61df7902ea922c82a9dd018bcbdb277a54381f4bca362933784ba1dd74f73cbbf80080483b73a63dbf72c9575e5118759a9544ec83002d0ac436f0689174e15887e66bc803e3927bc817d35979403acac4f"}], 0x10f8}, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 3347.070228][T32261] __nla_validate_parse: 14 callbacks suppressed [ 3347.070240][T32261] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:28 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000fc00100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:28 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e376f0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3347.203697][T32262] device .1348 entered promiscuous mode [ 3347.301299][T32277] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xfa210000}, 0x0) 09:54:28 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000080fe00100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3347.372678][T32278] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:28 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37700001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3347.609879][T32286] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3347.675222][T32263] device .1157 entered promiscuous mode [ 3347.782563][T32281] device .1349 entered promiscuous mode [ 3347.824149][T32263] device .1158 entered promiscuous mode 09:54:29 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xbf410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:29 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000c0fe00100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:29 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37710001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xfaf70a00}, 0x0) 09:54:29 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3b4, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:29 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, &(0x7f0000000080)='GPL\x00', 0xeffffffc, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 3348.034339][T32307] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:29 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3c4, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3348.104991][T32311] device .1350 entered promiscuous mode 09:54:29 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000ff00100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:29 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37720001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xfbf70a00}, 0x0) 09:54:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x7a05, 0x1700) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0xee) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x4, &(0x7f0000001880)=ANY=[@ANYBLOB="23770400080000000502100000000000183300000300000000000082804049700c82128272c5112eee1e272dd1f18ee3e63222bb5a48d86f0e4235582e3c8baf4c1ad635d7ba05993774bf66d57a95f78a42ff26a07906e3c6ffe305171de17bdc3eee07b595a19ad69f68c9bbdfa17322884d545dd829a0a492d4023229dce16d8c1babcbe3355b44fedbb0e9057faf368cc344f084c2be8a86ed"], &(0x7f0000000200)='syzkaller\x00', 0x93, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xe, 0x6}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r1, 0x0, 0xec0, 0xe5, &(0x7f0000000380)="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", &(0x7f0000001380)=""/229, 0x5, 0x0, 0x0, 0x74, 0x0, &(0x7f00000014c0)="83e9616c17d844bf660c67453302a7ee3216255ab8bf63640bef61c7cbf118366a42f528ea2cb22ab3cab153ac51f6f97744268025536ae79c0b71c9d9f6210465dba7c0186ebeceef376cb946a0795fc85426c794d328d6cc0f20e35e13ed133d29bb4fb3264f97cdf9e7ff9073abb46d0a3dfb", 0x0, 0x401}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 09:54:29 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000007fffffff00100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3348.387216][T32330] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3348.425655][T32331] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3348.768163][T32318] device .1159 entered promiscuous mode 09:54:30 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xc0410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:30 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37730001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:30 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000002000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:30 executing program 3: perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000009000)={&(0x7f0000006b40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000008ec0)=[{&(0x7f0000006bc0)=""/246, 0xf6}, {&(0x7f0000006cc0)=""/4096, 0x1000}, {&(0x7f0000007cc0)=""/58, 0x3a}, {&(0x7f0000007d00)=""/154, 0x9a}, {&(0x7f0000007dc0)=""/136, 0x88}, {&(0x7f0000007e80)=""/4096, 0x1000}, {&(0x7f0000008e80)=""/59, 0x3b}], 0x7, &(0x7f0000008f40)=""/152, 0x98}, 0x2021) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup(r4, &(0x7f0000000180)='syz0\x00', 0x1ff) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000091c0)={r2, 0x10, &(0x7f0000009180)={&(0x7f00000090c0)=""/134, 0x86, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000009200)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000080)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xfffffc00}], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, [], r3, 0x1b, r4, 0x8, &(0x7f0000009040)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000009080)={0x1, 0xc, 0x0, 0x4}, 0x10, r5}, 0x78) r6 = socket$kcm(0x29, 0x2, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r8 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r8, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000040)={r8, r7}) recvmsg$kcm(r6, &(0x7f0000002cc0)={&(0x7f0000000ac0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000002c00)=[{&(0x7f0000000b40)=""/35, 0x23}, {&(0x7f0000000b80)=""/116, 0x74}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000001c00)=""/4096, 0x1000}], 0x4, &(0x7f0000002c40)=""/104, 0x68}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1e, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8001}, [@jmp={0x5, 0x1, 0x1, 0x2, 0xb, 0x100, 0xffffffffffffffff}, @generic={0x3f, 0xf, 0x6, 0x6, 0x7}, @jmp={0x5, 0x1, 0x1, 0x4, 0x0, 0x20}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0x4c, &(0x7f0000000980)=""/76, 0x41000, 0xb, [], r3, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000a00)={0x5, 0x0, 0xe5, 0x7}, 0x10, 0xffffffffffffffff, r0}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe80, 0xfffffe6f, &(0x7f0000000100)="280e003f4305607e5bc5795e6558000800ffffffba0e7200ffff81", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) [ 3348.829103][T32329] device .1351 entered promiscuous mode 09:54:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xfc030000}, 0x0) 09:54:30 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3d2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3348.974319][T32349] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:30 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000004000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3349.085475][T32351] batman_adv: batadv0: adding TT local entry ba:0e:72:00:ff:ff to non-existent VLAN 1024 [ 3349.124925][T32351] batman_adv: batadv0: adding TT local entry ba:0e:72:00:ff:ff to non-existent VLAN 1024 09:54:30 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37740001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3349.144441][T32358] device .1352 entered promiscuous mode [ 3349.172368][T32351] batman_adv: batadv0: adding TT local entry ba:0e:72:00:ff:ff to non-existent VLAN 1024 [ 3349.276843][T32351] batman_adv: batadv0: adding TT local entry ba:0e:72:00:ff:ff to non-existent VLAN 1024 [ 3349.294236][T32367] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xfcf70a00}, 0x0) [ 3349.346462][T32351] batman_adv: batadv0: adding TT local entry ba:0e:72:00:ff:ff to non-existent VLAN 1024 [ 3349.408008][T32351] batman_adv: batadv0: adding TT local entry ba:0e:72:00:ff:ff to non-existent VLAN 1024 09:54:30 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37750001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:30 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000a000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3349.467412][T32351] batman_adv: batadv0: adding TT local entry ba:0e:72:00:ff:ff to non-existent VLAN 1024 [ 3349.524369][T32351] batman_adv: batadv0: adding TT local entry ba:0e:72:00:ff:ff to non-existent VLAN 1024 [ 3349.581554][T32351] batman_adv: batadv0: adding TT local entry ba:0e:72:00:ff:ff to non-existent VLAN 1024 [ 3349.632436][T32355] device .1160 entered promiscuous mode [ 3349.665730][T32351] batman_adv: batadv0: adding TT local entry ba:0e:72:00:ff:ff to non-existent VLAN 1024 09:54:30 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xc1410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3349.693982][T32379] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:31 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000fc000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:31 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37760001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x11, 0x20000000000000a, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="1800000000000000000000000000000073014300000000009500000000000000671078b8fbc84a9f4f406be66f20292df536167aca4f42efbc0acf3305aacef290e6552795a3c342727f95da6391beaf5a247bc3af16c04e6a69d05427851fa176728ca6349e64b23ac5b39a2aa25a7633539618ba4fc83f2fb97290b59534fbd225cd6b7b64c86e0caf1ed575cd7187ba78659c8477c15cf1db56f05b06da68b81913284542ca905aa8bcf83143ffa3"], &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r2, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r4, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r5 = socket$kcm(0x2b, 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0303600d698cb89e14f043051fffffff00004002630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108098da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 3349.913155][T32375] device .1353 entered promiscuous mode 09:54:31 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3d4, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xfcffffff}, 0x0) 09:54:31 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37770001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:31 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000a0000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:31 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37780001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3350.432956][T32414] validate_nla: 43 callbacks suppressed [ 3350.432969][T32414] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:54:31 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37790001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:31 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000fe800000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:31 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000a0000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3350.621412][T32387] device .1161 entered promiscuous mode [ 3350.637601][T32419] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:54:31 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xc2410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:31 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e377a0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3350.775919][T32425] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3350.823027][T32407] device .1354 entered promiscuous mode 09:54:32 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000fec00000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xfdf70a00}, 0x0) [ 3350.945598][T32433] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3350.990214][T32434] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3351.013562][T32436] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3351.094414][T32442] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 09:54:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)=0x3ff, 0x12) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000300)='qgroup_meta_reserve\x00', r0}, 0x10) write$cgroup_subtree(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="361e80a012242a66780237f5c0f68d28c620b5aecd8aa48f9e6f29445cb7cf515a7f062327d33749216936bf150322ceb48dd0cb9324de"], 0xda00) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="005cdb4bf0a1bfa8c22a0f6b7a7727f69b6d656d6f72792000637075202b72646d6120e3a4656d6f727920adf9f9051a8db155cb8fb7c6d0c8a7d91147a7fd8a966cbb801364dc5b93519823178e0a8dfb916729e856"], 0x1b) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x18000000000002a0, 0x42, 0x0, &(0x7f00000000c0)="b9ff0300600d698cff9e14f008004de7f9c764362ae28eff07000300000000a08b7907080494e5d04e0d5e9f7933b474b67b2b4b777b5c15d51e3e7b1263afc0bac3", 0x0, 0x200, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 09:54:32 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e377b0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:32 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000fc0000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:32 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3da, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3351.349130][T32447] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3351.437359][T32455] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 09:54:32 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000080fe0000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:32 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e377c0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3351.520117][ T34] audit: type=1804 audit(1607680472.684:225): pid=32448 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir334762343/syzkaller.t2YCSM/4339/memory.events" dev="sda1" ino=16378 res=1 errno=0 [ 3351.709096][ T34] audit: type=1804 audit(1607680472.804:226): pid=32448 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir334762343/syzkaller.t2YCSM/4339/memory.events" dev="sda1" ino=16378 res=1 errno=0 [ 3351.725766][T32462] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3351.755078][T32434] device .1162 entered promiscuous mode 09:54:32 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r3, &(0x7f0000000600)=ANY=[], 0x32600) socket$kcm(0x29, 0x7, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xf8, 0x1, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000d8}, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1b) 09:54:32 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e377d0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3351.846835][T32442] device .1355 entered promiscuous mode [ 3351.929862][T32437] device .1163 entered promiscuous mode 09:54:33 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xc3410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:33 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e377e0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:33 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000c0fe0000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xfef70a00}, 0x0) 09:54:33 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3dc, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3352.128532][T32492] __nla_validate_parse: 14 callbacks suppressed [ 3352.128544][T32492] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:33 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, r2, 0x0, 0x3, &(0x7f0000000200)='-(\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\x06ArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r3 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x7f, 0xff, 0x80, 0x81, 0x0, 0x1, 0x40280, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x800, 0x709, 0x80000001, 0x1, 0x9, 0x6, 0x9e95}, 0xffffffffffffffff, 0x2, r0, 0x4) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000140)={0x1}, 0x8) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) close(r4) bpf$MAP_CREATE(0x2, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x24041, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x7, 0x6, 0x1f, 0x1, 0x0, 0x9, 0x40, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1f, 0x0, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10, 0x1ff, 0x1000, 0x1, 0x4, 0xd7060000, 0xfff7}, r5, 0xd, 0xffffffffffffffff, 0x8) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x23) [ 3352.176924][T32494] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:33 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37820001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:33 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000ff0000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3352.248277][T32489] device .1356 entered promiscuous mode [ 3352.466054][T32507] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:33 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000400100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:33 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37830001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3352.692099][T32497] device .1164 entered promiscuous mode [ 3352.709959][T32504] device wlan1 left promiscuous mode 09:54:33 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xc4000000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:34 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000001100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3352.844032][T32520] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:34 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37840001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:34 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000002100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3353.103178][T32531] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:34 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37850001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3353.146142][T32533] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3353.238062][T32508] device wlan1 entered promiscuous mode [ 3353.284500][T32489] device .1357 entered promiscuous mode [ 3353.296430][T32542] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3353.311435][T32515] device wlan1 left promiscuous mode [ 3353.333876][T32543] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xfeff0000}, 0x0) 09:54:34 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3e2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000300)="2e0000001d00810e000f80ecdb4cb902020000000100000e81003cfb12000100200fda1b40d819a906000500000f", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r4 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r4, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000040)={r4, r3}) recvmsg(r4, &(0x7f0000001dc0)={&(0x7f0000001580)=@can, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001600)=""/76, 0x4c}, {&(0x7f0000001680)=""/174, 0xae}, {&(0x7f0000001740)=""/143, 0x8f}, {&(0x7f0000001800)=""/177, 0xb1}, {&(0x7f00000018c0)=""/105, 0x69}, {&(0x7f0000001940)=""/200, 0xc8}, {&(0x7f0000001a40)}, {&(0x7f0000001a80)=""/194, 0xc2}, {&(0x7f0000000740)=""/127, 0x7f}], 0x9, &(0x7f0000001cc0)=""/244, 0xf4}, 0x10002) sendmsg$kcm(r4, &(0x7f0000000700)={&(0x7f00000004c0)=@l2tp6={0xa, 0x0, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xd8, 0x2}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000140)="32e96ff5af57f3c5f87557241b", 0xd}, {&(0x7f0000000540)="9958693ca42b0dc10666edf67622dee2c3945d", 0x13}, {&(0x7f0000000580)="8e429335fa8583e69afaa699ec7eb1e23227852f49339e75d355269140d20ce7f7986dfd54fd1b0809bee10008e39c09b92b48fcc299ac667a5c638f1d63d81ea6d78c4c00163efda8c99665aacdd5147a2457d337d19c3c793971944da334370732e42f1d927151873a86d0639f76dd31a030dc699df6683cc809553f684e4f84a36f45d1768326b6", 0x89}], 0x3, &(0x7f0000000680)=[{0x80, 0x103, 0x2, "3ba5300c877452d04fdc2cbe812bd1cb69660d5ab6b4f611b87d17c234935879872d32a85a39bb3fa5571bcf343755ce9c886f5d935285850d695c2a87daa3d6805fad5d9db1f42de4b7a91dc43fa6ec42e0838c55c12330b462e3b09a24807559bc0c2a55ad052c358222ea0d"}], 0x80}, 0x10000) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000300000000000c00095000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321af3cf1a54f26fb0b71d0e6adfefcf1d8f7faf75e0f226bd917487960717142fa9ea4318123751c0a0e168c1886d0d4d94f2f4e345c652fbc16ee988e6e0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b32a83438810720a159cda903634e369a9e152ddca64057ff3c4744aeaccd3641110bec4e9027a0c8055bbfc3a96d2e8910c2c39e4b3449abe802f5ab3e89cf6c662ed4048d3b3e22278d00031e5388ee5c867ddd58211d6ece1ccb0cd2b6d3cffd963218ce740068725c37074e468ee207d2f73902ebcfcf49822775985bf31b715f5888b24efa0000000000000000000000000000000000000000ddffffff020000000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab3323aa9fdfb52faf9cb09c3bfd09000000b91ab219efdebb7b3de8f67581cf796a1d4223b9ff7ffcad3f6c962b9f03000000000000001cf41ab11f12fb1e0a494034127de7c6592df1a6c64d8f20a67745409e011f1264d43e153b3d34899f40159e800ea2474b540500a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a74e04bde740750fa4d9aaa705989b8e673e3296e52d337c56abf112874ec309baed0495f06d058a73651d6fe048ba6866adebab53168770a71ad901ace383e41d277b103923a9d971f7a2591dbe4a912ffaf6f658f3f9cd16286744f83a83f138f8f92efd92239eafce5c1b3f97a297c9e49a0c3300ef7b7fb5f09e0c8a868a353409e34d3e82279637599f35ad380a447483cac394c7bbdcd0e3b1c39b6e00916de48a4e70f03cc4146a77af02c1d4cefd4a2b94c0aed8477dfa8ceefb467f05c6977c78cdbf37704ec73755539280b064bdaba71f897144910fe050038ec9e47de89298b7bf4d769ccc18eede00e8ca5457870eb30d211e23ccc8e06dddeb61799257ab55ff413c86ba9affb12ec757c7234c270246c878d01160e6c07bf6cf8809c3a0d062357b22515567230ad1e1f4933545fc3c741374211663f6b63b1dd044dd0a2768e825972ea3b77641467c89fa0f82e8440105051e5510a33dcda5e143fbf221fff161c12ca389cbe4c51b3fa00675cc175067d2a214f8c9d9b2ecf63b66c5fd9c26a54d43fa050b88d1d43a8645bd9109b7e7131421c0f39113be7664e08bdd7115c61afcb718cf3c4680b2f6c7a8400e378a9b15bc20f49e298727340e87cdefb40e56e9cfad973347d0de7ba4754ff231a1b933d8f931ba3552b2c7c503f3d0e7ab0e958adb862822e40009995ae166deb9856291a43a6f7eb2e32cefbf46306f2af79b8d4c2bf0f7a2cb032dad13007b82e6044f643fc8cd47ae636a5dbe9864a117d27326850a7c3b570863f532c218b10af13d7be94987005088a83880ccab9c9920c2d2af8c5e13d52c83ac3fa7c3ae6c08384865b66d2b4dcb5dd9cba16b64ebbbf8702ae12c77e6e34991af603e3856a346cf7f9fe0bc9f2a1a7506d35e5eb7088aeda890cf8a4a6f31ba6d9b8cb098f935bdcbb29fd0f1a342c010000000000000048a9dea00000b91d2309dc7ae49e4d5f7e50b652053a39e7307c09ff3ac3e820b01c57dd74d4aafc4c383a17bc1de5347bb71ca165cbbbaa2935f602327484386b21b96492ae662082b56cf666e63a757c0ef3ea7af6881513be94b362e15ffca8ec453b3a2a67aedc0264273d82e3c4c67a"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r6 = socket$kcm(0x2, 0x200000000000001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r5, 0x0, 0xa8, 0xa0, &(0x7f0000000180)="d0cf4f1cfd8810c5fdaa8b4649ba64e0f64a5324909843a76b9873f9665eebd75f30bc07ed2c0403795c7e58299ca8cf9dbfccee6b15cdd02ec2e7fb73624204c090ccacd7c32d3d041dc4129c58d709e5279d12574d7292b9826957932b119aa3c1ccc61151621778428b627581ea310f27edd018f8fd2577cce161d249e921de6e0f211d8a0994e53aee4993055e9c823887e7d73dd93d14993bff9ebd38c1d64ff08313ddd0ac", &(0x7f0000000240)=""/160, 0xffffffff, 0x0, 0x1000, 0xdf, &(0x7f0000001e00)="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", &(0x7f0000000340)="acdffbc7035b22b60558aebcbe71383d38997f7ccb0b8466014a10ead6a141459847ad46efe9789dafbbcffcf86c5a3c925c7533d2d052bd835d39ca2139896925169f378fe78561506201428fdfad5acd1e6a440839e6230cf983278cc14afb6748d44034a379520793420bfca6de51ea3e199148b5e8f6f37eb8d055b6a3724ad426a2e011f21c9ae41f8a877bac656ef2c21b3b1f16d507caf42ce6cb673758fbee7c1932d27f5504e67e7bac12c438f912afe1502f3bb4a716f36f855afa393b4a13748a2ad299f8456a2a5d541fb2841f826d74b7f4ff4c1fc3e86d4e", 0x1, 0xffff0000}, 0x48) sendmsg$inet(r6, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r6, r5}) recvmsg(r6, &(0x7f0000001dc0)={&(0x7f0000001580)=@can, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001600)=""/76, 0x4c}, {&(0x7f0000001680)=""/174, 0xae}, {&(0x7f0000001740)=""/143, 0x8f}, {&(0x7f0000001800)=""/177, 0xb1}, {&(0x7f00000018c0)=""/105, 0x69}, {&(0x7f0000001940)=""/200, 0xc8}, {&(0x7f0000001a40)}, {&(0x7f0000001a80)=""/194, 0xc2}, {&(0x7f0000001b80)=""/127, 0x7f}], 0x9, &(0x7f0000001cc0)=""/244, 0xf4}, 0x10002) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000000)={r0}) 09:54:34 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000a100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:34 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37860001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3353.652009][T32553] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3353.695014][T32555] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:34 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37870001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:35 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000fc100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3353.779052][T32524] device .1165 entered promiscuous mode [ 3353.876312][T32548] device .1358 entered promiscuous mode [ 3353.947086][T32528] device .1166 entered promiscuous mode 09:54:35 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xc4410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xfeffffff}, 0x0) 09:54:35 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37880001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:35 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000080fe100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:35 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3e4, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:35 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37890001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3354.243217][T32583] device .1359 entered promiscuous mode 09:54:35 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000c0fe100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3354.825078][T32587] device .1167 entered promiscuous mode 09:54:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x70, 0x4, 0x3, 0x6, 0x8, 0x0, 0xa72, 0x10808, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x1, 0x9}, 0x1100, 0x1, 0x9, 0x1, 0x7ff, 0xfff, 0x101}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2eb400f22b000524ff6d92d779cb008000f0d1358ed61f77e55297bf765cda5f0d1b1ee21700d1bd", 0x28}], 0x1}, 0x5a040064) 09:54:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xff7f0000}, 0x0) 09:54:36 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e378a0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:36 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000ff100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:36 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xc5410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:36 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000007fffffff100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:36 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e378b0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:36 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000ff100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:36 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3e6, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3355.126960][T32612] device .1360 entered promiscuous mode 09:54:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xfff70a00}, 0x0) 09:54:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b70000000000000095000000000000001c26e59bb842889c95ef1ba79618689974e60000010000000000ce9427b8fe59cc6bf6d3d8e0d9a32d8767c40d1b714293becbb64f52c8197a991a5ad5b2b132abe5a4ff9e3d04d77ee508b4f79ce77748c4d0f7074eb8fc284872b4dcc8c365d98548b4fc3d8640f90c2c6bf1d70f387095945cffe2c634228ec80a060f2a67d98f03848c8e3868229bba8647ca373da549ae6c972806fc7de1d287ed25f937d95275fbd100dd1046e9b0febe762635bd20f62a827bc127fd8969a01c5a6deca9cedd561e7d955df8a6cda5047fbead5de7e76d4b870024b8c4676333c1fc3b5179c4fb0b7773bc90cb99ed505030f6b384ee396f80910953a83327277c3727ab0f1373f4effda7e880eb5e807e180dd7b2b87fbfd1e00100000000000000f31b60e7197f04403a03820200000000000000507120b34820000000004b4cc097a2a902d050f439ac6122d2f6170fc1205339ee2fa21394026993e4d3ff01ad7237dc02ff6f1d3c298a63ff02cda419bb23a5c860182e1800000000000000000000000000004b6bc28339da0ac7380466ef8cf8b4eb79d30e129ceeaabf81d08525d23ad503d9a6b5edde39eea9ec40151c750267d8d20e87b33d05bce4f76f23947becfb71a119f066add94a1a149ceaf7eaebc5926331f63f8411dae73bf40a3dd50600a1706b8b03713f4cb6b8eadeb89e1898efbb83a0376b976dac01800000007384b15d48c97dcfde6a7959994dd5ed1122378b1f5b6c73c053189f5af13f9d94dc698c85309c21805addda039a6871d0f60adf512710bd35c0a8bf626ae78ee5395518061dab6d96b7ce944540c351ae12c4759e69cc2b672947bb3800da5ae1648603fad0989c3d8f207b015b2baccc23eec0e9588431e3a05df9c1843fc28752f2defba049f56a35ac3a519db959e9f6f874f2d731929bd701529406c850f8eb274e760a85634d36493a20e68b604ccb673f6f35c99d30ca6071baf42a286aacce8be8f99bb90c1564af8fc59cbeef159cf65c3ded8cc49bd27a1d6ceccb2df206000000000000003627c79cabb83b8b050000007a000000ec8ac2cc81473c24873829a6219c392486cc2f4c9386974750488855e97fa736ab8a7954f2a319ad801a10f7fac9b101800000a3aac69a24c03e003acd0e246a7df86ee4ce255a03a91143736d08584d3c2765e8f44bb02aebd8e5a933cb62d5a85ea117583307897e21446c16eea5b275a4f3e94e411bacd673df3d9fa8043e4db96c91e188ba71530ac12522688379541c207f24ef719f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x374}, 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=ANY=[@ANYBLOB="02060000ce32dbad25d613680000009500000100000000"], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffff}, 0x10, 0x0, r0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001780)={r0, 0xc0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=0x2, 0x0, 0x0, 0x0, &(0x7f00000015c0)={0x3, 0x2}, 0x0, 0x0, &(0x7f0000001600)={0x2, 0x1, 0x7ff}, &(0x7f0000001640)=0x8001, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=0x2800000000000000}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001900)=@bpf_lsm={0x1d, 0x6, &(0x7f00000017c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@jmp={0x5, 0x0, 0xa, 0x0, 0x6, 0xfffffffffffffffc, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @jmp={0x5, 0x1, 0x9, 0x2, 0x0, 0xffffffffffffffe2, 0x4}]}, &(0x7f0000001800)='syzkaller\x00', 0x80, 0x21, &(0x7f0000001840)=""/33, 0x41100, 0x14, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000001880)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000018c0)={0x3, 0x3ff, 0x800, 0x7ff}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001980)={0xf, 0x9, &(0x7f0000001400)=@raw=[@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0x9b}, @call={0x85, 0x0, 0x0, 0x2f}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf23}, @exit, @exit, @ldst={0x3, 0x3, 0x0, 0x7, 0x5, 0x40, 0xffffffffffffffff}], &(0x7f00000008c0)='GPL\x00', 0x3, 0x5b, &(0x7f0000001480)=""/91, 0x100, 0xd, [], 0x0, 0x1a, r1, 0x8, &(0x7f0000001500)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000001540)={0x3, 0xa, 0x800, 0x8001}, 0x10, r2, r3}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xa, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x9}, 0x4080}, 0x0, 0x5, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x60000000, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fbac141410e949eb4be1977d48", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000009200)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000080)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xfffffc00}], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000009040)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000009080)={0x1, 0xc, 0x0, 0x4}, 0x10}, 0x78) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001b80)='freezer.parent_freezing\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c40)={0x18, 0x4, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000100000000000000ea8f0000019e0300a70a00009500000000000000"], &(0x7f0000001a40)='syzkaller\x00', 0xfffff666, 0xef, &(0x7f0000001a80)=""/239, 0x41100, 0x5, [], 0x0, 0x0, r4, 0x8, &(0x7f0000001bc0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000001c00)={0x8, 0xa, 0xfca, 0x32ac}, 0x10}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x18, 0x0, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x99c2, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, 0x0}, 0x78) sendmsg$kcm(r5, &(0x7f0000000300)={&(0x7f0000000040)=@generic={0x26, "9abe8f2babb25a1986072ff8df625e1f817c54a7cf410c1bee6b11970b0c8c673244d987ec087471280978e6f35cec16aaf1fdeec21fcfc9dd7583e5a7bbd3d79aa5f912524856d0f621ee3c2ff98b1943af9abe060d72ed4ca5400f1c72d10aaa081c65f7ee015190ae46ace5e4562d1d8e876799e06135cdd9b35e401d"}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="bf4c618272a7238ccdbc7a8a165582213cdb968ac175eb980eb43bfb980ec495d9185edb92c0d2376e428b23a9a43c7a6f4b92d08b01338cf225eed91b65a3ca8c64fd4f806a", 0x46}, {&(0x7f0000000280)="af1bb5af471f247b7f29f08d06363015d355dfd1704478cb21ae9837bba673e34569992fad2a521e63f78d3baf7eb843ea4dbc80341e53ab0bc4b4260fce628b72104b26259e91f9ced4829c95f367c1453179e9df64d6d7e6ffa2aeaf3e", 0x5e}, {&(0x7f00000003c0)="c9886384d7d67b1f29ebb06ad569fc434c0c8eae7937c35763512f64d4e3779cbc7829c8cfe870a4627a1e96a0b1ccf7e03537f7675826540b277691e73acbe8f652b775f64ff4cde1a2b8f928c476da7a637560a2ea99ddac09e0a8fa03576fe3240ff47f555c6dc21ee8213efb6989a186e4e27700bf51358fab7d779eaeb5360b61ddf35cd77ccc3c95ab880172", 0x8f}, {&(0x7f0000000480)="0b44caf5d7432c9d860fab11c505febe89eccb3420e380f76ee0023711feb894c61c7892db5b30dc8f7933348ad8a4bfbb7888a84b5c1aac9f5430377c968c66ae8c78a20a21da4491e68291cfe18c71ebc72978ef3595d31cb3da360b95a21e6db69f4fcadecd60e2", 0x69}], 0x4, &(0x7f0000000540)=[{0x18, 0x10f, 0x3, "efc4"}, {0x88, 0x11, 0x7, "7219a596f1d8633a05b60187d289eb4ed9b8cf10f98a53f39f412f9df40213e757fb9422ff7c0026c599902f5500b6b34b0f2767612615e1a37e45d7745d85fb4f7d3cfc4152cbc2720fb8d2c7900e665d91acb9ac75e7562cdfab1243babfb5ee91a7a4c39214090f7b2b6315baca937c3506"}, {0x98, 0x10c, 0x9, "40b669fa5853c67d1dcd43f135e656fdd9879acc328fb7a5626b60c30a51e2c871b2b9328a808265f29f916cd0f48b89ceea493eb56e71e6f2517b1242e8c5d43ccd800d61c0a937ad6c728b9e7a07ba350beb06e7ee9cf16546c47275b6bdbba8d78f91b5dded85163d1a6c39e6274a52668cdb1bcef3ce5a67182b8a0b3ada3b7f21ee80a8dc"}, {0x20, 0x17, 0x9c2, "a284c394c520992156"}], 0x158}, 0x20000040) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r5, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000800)="df563f87", 0x4}], 0x1, &(0x7f0000000d40)=[{0xf8, 0xe4, 0x1, "29b5badc720b994cb231eba38912f439b4c38a896eb1733eb6acb9ee2534693616f508680f60b973392a84650f3bc1860a65631a7a3407d865310f8ff743a14e14de8dd65a95116db1614afe06a300916fc819c1f71ed1351ac1dce5de8ce6cd59f573fd462571c67ad6e0de2b1a3a7874f2d6387bb57b4494a2c3b2985de4f3f740517d389ebb116fde1fb677ffcf5ed49a4cb663b0f996b308c939dcc3883a7ab048ea8c350c466805a6d0b256e1b5130973c22a2ec12f1ae78292b95967e1d3745862c0565e55d1c700422f97c98697862c738248d186b594a3b825e5eb740ae8"}, {0xa0, 0x110, 0xffff, "3e4b2cc2572cf6248ecba418406d31e29a5ecf7afc694070699e53da8b328035861f09ef4f4b0cc80c5000fd40130bea390a1b5741d060e30ff83a0529f5eb668734f88904c13bd6f1c7da97bc311fbcb0a8dc36440f2dbdefc78e53c3b634bbd5b5572459b93a6f50dc012e9650cbcac7dce22d4ed3e27f5e879f151930ab5ca9b3114a2a595444fff96046086f"}, {0x110, 0x10b, 0x8, "c72c4435fe50848564114608c16da65aad938d285df120d9e7dc357c37ecc716c16a8ae31470f5ac064fc2f2466b17326fed946da3bc287a857f2980e5d698beac9c5f7f3f70a5fb3fae3e890aa8c4e2ade2cf36fef2309fc21138ad5d8451a8a4154b94c00c6c8577de5f0c86977c3d11e5f21584bbc52d1f0bf87b3a784cd5479c0302f702338026a5b0aa298b9150cc2b559a25d0971496762d0db608eb6c8b20363a16fa0f5d46454fdfc0bcf1550cd0c65bd25844d423f757c61a2d304e78b8a5412b988b6417dac076b92971572cb1f8c0539efe6b1201ccc4d3bc020decd12063c0047b9f6db6bd8455bd153458033e641492c0a919b33ab90db7"}, {0x68, 0x0, 0x3, "860b3c52765d221c8c5f0d572487d64d6462133a6bdb1a2f1f07a4ab9a3129ef61e9f3a8d4534d6c0788f3a64816c9e2c9ea1f0496e8640ce5ed124d18aea81b311b50befadffc2a6b3a815e35bd643367e64dbce6dd"}, {0x70, 0x115, 0x4, "c6caeb7974e8a7f4375972ddf10e1dfb871dcd626a9518cd0082e4e19749f739cecfa0e235273d69923357da565d69d8d5a8d9896606087e5c59510f5aec64ac681e4109f976df3cbe800f43461c258a04f814ac340bcefa0845cb8530"}, {0xe8, 0x109, 0x80000001, "498ee6ea87db8a680561801a31e0587d4be25e322d4673a7edba5e0d95d123bd004e00dc0b9cca1fd2e13d16a1934ef81a5e4eeea5ec498b49addbee11abd491cfe017ccd45b0033bc4f4b80344ceaaae022c48be05d8ba589bccc75da2cf6304d9ef57764f805d18e37c68a53b2d50b1ca22352a5c07df314157958dae75d6d2cf682e3e82a4df4691778d93e062a283367c693340ee8b8cbf793c5a74beb76c5378e8cb7c12737aea620f5abd56f0af9c3fcc0067f13a78d6d9054b1002fff706f784f3b0520b3544fca621bfdd5283ecf"}, {0xc0, 0x10a, 0x400, "cd60093b204659de944b2a2f7ab757fa30e562955ad8072892107cd774b9bba34b371a2bbe9ab5105f4ba41224cc28f4a1ba19e692e8e18a0f0a8eab112b44bc71a84a7737f958fede873e64e86cc49dbd8f4821853af206ac286518311dd65e84a304ea24a9c1fe301eaf4104a1083edb230a888558f76ce6644a9610c1395ebd41d7921b85df7f5cf7b78a889048972f041c1ebe58386873a53e44f54be010c70a6420e187673781260dc74f3366"}, {0x40, 0x119, 0x8001, "bb8ed5fb5a938a358a8c4d6981734bcb06626fe0d66af31b71d1c0b5a622102a567b744318dcf7fd9f0c138ae849fdc7"}, {0x38, 0x116, 0xfffffffc, "f757363b031249a95e45690faa9d0575bec935f522d23cf6588dc770616e95f04cb6a55f37a4a3"}, {0x108, 0x104, 0x4, "02afafddde4109d289a3ce1cfcc30791eedf2feb86484c099186d512f43cf052ba60b8e418111733c219caf959d2245e0466fcc9485e5e4b005c3d9e8c67a15f7d0aa43d124c3cebd167ca6f891b7a43df83374aff2f80f5ee1024b2f0730d3481d5ecc5cbb141a291dc092336c549cb522749b116971d626b552f521cfbcaf4038746867b5b97df2e08e268b20f8673b0c3cad4e8b660de3b23ef626aa5e3883b736ea87b3cc222e50573adfa156caaf526fc07987b3d9cd707b89111e835b9bb78b048f1e1ce271923f89a20f2b1d408dc5e1340ebdd60162b121394a27152454b9f537ceb87b0896e9c7770313983a78200ecb6"}], 0x6a8}, 0x1) 09:54:36 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e378c0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:36 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000ffff00000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3355.494504][T32638] validate_nla: 42 callbacks suppressed [ 3355.494515][T32638] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3355.628548][T32645] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:54:36 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000020000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:37 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e378d0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3355.885223][T32624] device .1168 entered promiscuous mode [ 3355.928583][T32627] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 09:54:37 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000040000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3356.038426][T32659] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3356.089439][T32660] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3356.124961][T32663] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3356.179746][T32638] device .1361 entered promiscuous mode [ 3356.252301][T32627] device .1169 entered promiscuous mode 09:54:37 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xc6410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:37 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x800000, 0x0, 0x81}, 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r2}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r3, &(0x7f00000000c0), 0x0}, 0x20) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={@map=r3, r4, 0x4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9fe03c6630d698cb89e0bf088ca1f1500ff0e0000000b8477fbac141424e0", 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000040)) 09:54:37 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e378e0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xffff0300}, 0x0) 09:54:37 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000a0000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:37 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3ea, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3356.450919][T32678] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3356.474086][T32679] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3356.489329][T32680] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:54:37 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000fc0000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:37 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x800000, 0x0, 0x81}, 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r2}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r3, &(0x7f00000000c0), 0x0}, 0x20) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={@map=r3, r4, 0x4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9fe03c6630d698cb89e0bf088ca1f1500ff0e0000000b8477fbac141424e0", 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000040)) 09:54:37 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e378f0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3356.563272][T32687] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3356.587744][T32678] device .1362 entered promiscuous mode 09:54:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 09:54:38 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000a00100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0x80000000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@map=r1, r3, 0x11, 0x2, r0}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x34f, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0xffffffffffffffc0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x43408) openat$cgroup_procs(r4, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) [ 3357.125091][T32687] device .1170 entered promiscuous mode 09:54:38 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xc7410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:38 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37900001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:38 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000fe8000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:38 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3ec, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3357.211286][T32702] device .1363 entered promiscuous mode [ 3357.353436][T32721] __nla_validate_parse: 16 callbacks suppressed [ 3357.353449][T32721] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 09:54:38 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000fec000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:38 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37910001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x20008004) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000180)=0x3f) [ 3357.888387][T32723] device .1171 entered promiscuous mode [ 3357.901742][T32740] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:39 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000fc00100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:39 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37920001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3357.946929][T32744] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3357.973510][T32729] device .1364 entered promiscuous mode [ 3358.043980][T32723] device .1172 entered promiscuous mode [ 3358.072962][T32751] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) [ 3358.129830][T32755] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3358.168466][T32756] BPF:Unsupported section found 09:54:39 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000080fe00100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:39 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xc8410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:39 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37930001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:39 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3f2, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3358.383771][T32760] device .1365 entered promiscuous mode [ 3358.461888][T32750] BPF:Unsupported section found [ 3358.507570][ T302] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xffffffc3}, 0x0) 09:54:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x2b, 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000100)='FROZEN\x00', 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x2, 0x0) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x8) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000007780)={&(0x7f0000000000)=@caif=@at={0x25, 0x8}, 0x80, 0x0}, 0x0) 09:54:39 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000c0fe00100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:39 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37940001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:40 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000ff00100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3358.918113][ T318] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3358.998214][ T319] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:40 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37950001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3359.204502][ T303] device .1173 entered promiscuous mode 09:54:40 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000ffff0000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3359.290974][ T332] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3359.304975][ T333] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3359.306716][ T311] device .1366 entered promiscuous mode 09:54:40 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37960001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:40 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = gettid() syz_open_procfs$namespace(r0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x8008743f, 0x790006) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0xb9, 0x20, 0x8, 0x7, 0x0, 0x6, 0x20, 0x9, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000040), 0xd}, 0x2800, 0x0, 0x1, 0x0, 0x6, 0x2, 0x7fff}, r0, 0x6, r1, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x20000000000000, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x2, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) openat$cgroup_ro(r3, &(0x7f0000000240)='pids.current\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) sendmsg(r2, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x9, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x16567}], 0x1, 0x0, 0x0, 0x80040200}, 0x60) close(r2) [ 3359.659121][ T303] device .1174 entered promiscuous mode 09:54:40 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37970001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:40 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000200100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:40 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000080)='net_prio.prioidx\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) write$cgroup_subtree(r5, 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000001640), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0xc0000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000033) [ 3359.740903][ T311] device .1367 entered promiscuous mode 09:54:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xffffffe4}, 0x0) 09:54:41 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xc9410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:41 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3f4, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:41 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000400100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:41 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37980001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:41 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x4, &(0x7f0000000780)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x51, 0x10, 0x0}, 0x78) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001bfc0)={&(0x7f000001bbc0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000001bf00)=[{&(0x7f000001bc40)=""/152, 0x98}, {&(0x7f000001bd00)=""/6, 0x6}, {&(0x7f000001bd40)=""/141, 0x8d}, {&(0x7f000001be00)=""/52, 0x34}, {&(0x7f000001be40)=""/134, 0x86}], 0x5, &(0x7f000001bf80)=""/10, 0xa}, 0x100) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000000), 0x1, 0x10, &(0x7f0000000000), 0xa}, 0x70) bpf$MAP_CREATE(0x0, &(0x7f000001c000)={0x16, 0x3e37, 0x800, 0x100, 0x308, r1, 0xc5, [], r2, r3, 0x5, 0x0, 0x5}, 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000180)='inet_sock_set_state\x00', r0}, 0x10) r4 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r4, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x200408c4) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r6 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x11, 0xb0}, [@ldst={0x7, 0x3, 0x5, 0x0, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe0c, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup=r5, r0, 0x4}, 0x10) 09:54:41 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37990001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:41 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000a00100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:41 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e379a0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:41 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000fc00100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3360.540491][ T360] device .1175 entered promiscuous mode [ 3360.603318][ T387] validate_nla: 37 callbacks suppressed [ 3360.603329][ T387] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3360.651281][ T390] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3360.668551][ T391] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 09:54:41 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xca410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3360.704149][ T367] device .1368 entered promiscuous mode 09:54:41 executing program 3: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000280)='freezer.self_freezing\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000540)=0x4, 0x2bf70) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x3, 0x0, 0x4, 0x0, 0x0, 0x100, 0x45000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x0, 0x4, 0xfffffffd, 0x7, 0x2000000, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x400000000) r5 = socket$kcm(0x2, 0x200000000000001, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x33a) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x103) setsockopt$sock_attach_bpf(r5, 0x1, 0x8, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x80, 0x2, 0x1, 0x7f, 0x0, 0x2, 0x4d00, 0xd, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x801, 0x4, @perf_bp={&(0x7f0000000040)}, 0x2000, 0xffffffffffff433d, 0x10000, 0x8, 0x4, 0x1, 0x5}, 0x0, 0x10, 0xffffffffffffffff, 0x2) 09:54:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 09:54:42 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000a100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3360.900293][ T401] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 09:54:42 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3f6, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:42 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e379b0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3360.967145][ T407] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 09:54:42 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000fe80100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3361.055109][ T409] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3361.131279][ T414] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 09:54:42 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e379c0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:42 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000a100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3361.369835][ T422] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:54:42 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000fec0100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:42 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e379d0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3361.593214][ T401] device .1176 entered promiscuous mode 09:54:42 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x8}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r5 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r5, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000040)={r5, r4}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r4, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x5, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x4, 0x0, 0x8, 0x81}, &(0x7f0000000100)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)={r6}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r6}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYRESDEC=r6], 0x4ea00) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 09:54:42 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xcb410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3361.657409][ T407] device .1369 entered promiscuous mode 09:54:42 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000fc100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3361.714822][ T437] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3361.732156][ T436] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:54:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xfffffffc}, 0x0) 09:54:43 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e379e0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:43 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3fa, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:43 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000080fe100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:43 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e379f0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:43 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='memory.events\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x7, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x2, 0x40, &(0x7f00000005c0)=""/64, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x0, 0x9, 0x10001}, 0x10}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000000)='freezer.state\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0xf7, 0xb0, 0x1, 0x0, 0x0, 0xa000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x2, 0x3}, 0x0, 0xfffffff000000000, 0x0, 0x0, 0x80000001, 0x2, 0x7}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"/334], &(0x7f0000000300)='GPL\x00', 0x7ff, 0x25, &(0x7f0000000340)=""/37, 0x40f00, 0x14, [], 0x0, 0x1b, r2, 0x8, &(0x7f0000000380)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x0, 0x3, 0x7f}, 0x10}, 0x78) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) openat$cgroup_ro(r4, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r3, 0x4) write$cgroup_int(r2, &(0x7f0000000200)=0x31000000, 0x806000) [ 3362.408975][ T464] __nla_validate_parse: 15 callbacks suppressed [ 3362.408988][ T464] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:43 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000c0fe100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3362.600544][ T444] device .1177 entered promiscuous mode 09:54:43 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37a00001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:43 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xcc410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3362.722662][ T448] device .1370 entered promiscuous mode 09:54:44 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000ff100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xfffffffe}, 0x0) [ 3362.896858][ T482] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r2}, 0x8) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x4, 0x3, 0x9, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000, 0x0, 0x7, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r1, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0x36, 0x43408) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 09:54:44 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37a10001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:44 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000002100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:44 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3fc, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3363.252792][ T500] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:44 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000a100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:44 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xb0040, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000900)='wlan1\x00\xff\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/97, 0x61}, 0x10160) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_all\x00', 0x0, 0x0) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000004c0)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0xfa, 0x6, 0xf1, 0x0, 0x101, 0x2, 0xf, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0xc283, 0x80000000}, 0x2026, 0x2, 0x1000, 0x4, 0x7, 0x10001, 0x80}, 0x0, 0x9, 0xffffffffffffffff, 0x9) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x9, 0x1, 0x2, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) close(0xffffffffffffffff) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f00000000c0)="2e0000001400051f140187aeb4cceda926f8f94bfafb98e67ad1940d0124fc60", 0x20}, {&(0x7f0000000180)="8449c2ea75b3dc34e117899dee8c", 0xe}], 0x2}, 0x0) [ 3363.318745][ T503] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:44 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37a20001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:44 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000fc100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3363.637300][ T481] device .1178 entered promiscuous mode [ 3363.661653][ T492] device .1371 entered promiscuous mode [ 3363.667739][ T514] device wlan1 entered promiscuous mode [ 3363.685804][ T519] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) [ 3363.738946][ T522] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3363.877105][ T511] device wlan1 left promiscuous mode [ 3364.065257][ T514] device wlan1 entered promiscuous mode [ 3364.098244][ T481] device .1179 entered promiscuous mode 09:54:45 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xcd410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:45 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37a30001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:45 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100200000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000100)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0x28, &(0x7f0000000240)}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000040)=ANY=[@ANYRESOCT=r0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="282002001000000090030600ffffffff8510040007000000238b010004000000"], &(0x7f0000000300)='syzkaller\x00', 0x200, 0xd2, &(0x7f0000000340)=""/210, 0x41000, 0x5, [], 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x6, 0x5}, 0x10, 0x247f, r4}, 0x78) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000b00)='$]\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='ext4_mballoc_prealloc\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000440)='\x00') 09:54:45 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3fe, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3364.258152][ T535] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3364.296838][ T528] device .1372 entered promiscuous mode [ 3364.315277][ T541] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x2) 09:54:45 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37a40001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:45 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100400000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:45 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x500, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3364.832310][ T560] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:46 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100a00000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:46 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37a50001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3365.136038][ T548] device .1180 entered promiscuous mode 09:54:46 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4208, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0x2, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000d00)={0x0, 0x300, &(0x7f0000000bc0)=[{&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/4096, 0x1000}], 0x2}, 0x0) socket$kcm(0xa, 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x40101, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001600)="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", 0xcfa}], 0x1}, 0x0) [ 3365.214128][ T555] device .1373 entered promiscuous mode [ 3365.233245][ T573] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:46 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xce410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:46 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010fc00000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x3) 09:54:46 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37a60001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x4) 09:54:46 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x600, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:46 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) r1 = socket$kcm(0x2, 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000940)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x800}, 0x0, 0xffffffffefffffff, 0xffffffffffffffff, 0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000013fc0)={0x0, 0x0, &(0x7f0000013e80)=[{&(0x7f0000000440)=""/137, 0x89}, {0x0}, {0x0}], 0x3, &(0x7f0000013ec0)=""/246, 0xf6}, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000014080)={0x18, 0x9, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000303000000000000000600000018080000060000000000000000000000000000000000000000000000000000000000000000000000000000000000aea19d1a2680fdb187c4c4105acc65c8504cc3749f87e8d710e15506b005cfd8c52d892822083ba54341f9b9f495e3351ab0a65350c22a33"], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000014000)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000014040), 0x10}, 0x78) openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0xd2c40, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r3, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r3}) recvmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001580)=@can, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001600)=""/76, 0x4c}, {&(0x7f0000001680)=""/174, 0xae}, {&(0x7f0000001740)=""/143, 0x8f}, {&(0x7f0000001800)=""/177, 0xb1}, {&(0x7f00000018c0)=""/105, 0x69}, {&(0x7f0000001940)=""/200, 0xc8}, {&(0x7f0000001a40)}, {&(0x7f0000001a80)=""/194, 0xc2}, {&(0x7f0000001b80)=""/127, 0x7f}], 0x9, &(0x7f0000001cc0)=""/244, 0xf4}, 0x10002) recvmsg$kcm(r3, &(0x7f00000001c0)={&(0x7f0000000380)=@nl=@proc, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000500)=""/172, 0xac}, {&(0x7f00000005c0)=""/236, 0xec}], 0x2, &(0x7f0000000800)=""/165, 0xa5}, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x6f92ad17, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0x0, 0x7, 0x2}, 0x10}, 0x78) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f00000007c0)={'geneve1\x00', @link_local}) 09:54:46 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010000a000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3365.653175][ T592] validate_nla: 29 callbacks suppressed [ 3365.653214][ T592] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3365.713184][ T594] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3365.784278][ T600] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 09:54:47 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37a70001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:47 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010fe80000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3366.020133][ T612] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3366.037048][ T581] device .1181 entered promiscuous mode [ 3366.094771][ T616] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3366.110583][ T594] device .1374 entered promiscuous mode 09:54:47 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xcf410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3366.158275][ T618] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 09:54:47 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37a80001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:47 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010fec0000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x5) [ 3366.301813][ T623] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3366.356614][ T628] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:54:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x6) [ 3366.398687][ T630] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:54:47 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37a90001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:47 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001000fc000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3366.544420][ T633] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 09:54:47 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x700, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:47 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14bccedfb718aef932f3889d1fdda5b9134015a860f5878c37ffe36e1165d14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afe403291323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x0) r1 = socket$kcm(0x21, 0x5, 0x2) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000300000000000c00095000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321af3cf1a54f26fb0b71d0e6adfefcf1d8f7faf75e0f226bd917487960717142fa9ea4318123751c0a0e168c1886d0d4d94f2f4e345c652fbc16ee988e6e0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b32a83438810720a159cda903634e369a9e152ddca64057ff3c4744aeaccd3641110bec4e9027a0c8055bbfc3a96d2e8910c2c39e4b3449abe802f5ab3e89cf6c662ed4048d3b3e22278d00031e5388ee5c867ddd58211d6ece1ccb0cd2b6d3cffd963218ce740068725c37074e468ee207d2f73902ebcfcf49822775985bf31b715f5888b24efa0000000000000000000000000000000000000000ddffffff020000000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab3323aa9fdfb52faf9cb09c3bfd09000000b91ab219efdebb7b3de8f67581cf796a1d4223b9ff7ffcad3f6c962b9f03000000000000001cf41ab11f12fb1e0a494034127de7c6592df1a6c64d8f20a67745409e011f1264d43e153b3d34899f40159e800ea2474b540500a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a74e04bde740750fa4d9aaa705989b8e673e3296e52d337c56abf112874ec309baed0495f06d058a73651d6fe048ba6866adebab53168770a71ad901ace383e41d277b103923a9d971f7a2591dbe4a912ffaf6f658f3f9cd16286744f83a83f138f8f92efd92239eafce5c1b3f97a297c9e49a0c3300ef7b7fb5f09e0c8a868a353409e34d3e82279637599f35ad380a447483cac394c7bbdcd0e3b1c39b6e00916de48a4e70f03cc4146a77af02c1d4cefd4a2b94c0aed8477dfa8ceefb467f05c6977c78cdbf37704ec73755539280b064bdaba71f897144910fe050038ec9e47de89298b7bf4d769ccc18eede00e8ca5457870eb30d211e23ccc8e06dddeb61799257ab55ff413c86ba9affb12ec757c7234c270246c878d01160e6c07bf6cf8809c3a0d062357b22515567230ad1e1f4933545fc3c741374211663f6b63b1dd044dd0a2768e825972ea3b77641467c89fa0f82e8440105051e5510a33dcda5e143fbf221fff161c12ca389cbe4c51b3fa00675cc175067d2a214f8c9d9b2ecf63b66c5fd9c26a54d43fa050b88d1d43a8645bd9109b7e7131421c0f39113be7664e08bdd7115c61afcb718cf3c4680b2f6c7a8400e378a9b15bc20f49e298727340e87cdefb40e56e9cfad973347d0de7ba4754ff231a1b933d8f931ba3552b2c7c503f3d0e7ab0e958adb862822e40009995ae166deb9856291a43a6f7eb2e32cefbf46306f2af79b8d4c2bf0f7a2cb032dad13007b82e6044f643fc8cd47ae636a5dbe9864a117d27326850a7c3b570863f532c218b10af13d7be94987005088a83880ccab9c9920c2d2af8c5e13d52c83ac3fa7c3ae6c08384865b66d2b4dcb5dd9cba16b64ebbbf8702ae12c77e6e34991af603e3856a346cf7f9fe0bc9f2a1a7506d35e5eb7088aeda890cf8a4a6f31ba6d9b8cb098f935bdcbb29fd0f1a342c010000000000000048a9dea00000b91d2309dc7ae49e4d5f7e50b652053a39e7307c09ff3ac3e820b01c57dd74d4aafc4c383a17bc1de5347bb71ca165cbbbaa2935f602327484386b21b96492ae662082b56cf666e63a757c0ef3ea7af6881513be94b362e15ffca8ec453b3a2a67aedc0264273d82e3c4c67a"], &(0x7f0000000140)='GPL\x00'}, 0x48) r4 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r4, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000040)={r4, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000001c0)={r0}) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000080)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[], 0x10b8}, 0x0) r5 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x1001, @private}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[], 0x10b8}, 0x0) 09:54:47 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37aa0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:48 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001080fe000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:48 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37ab0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3367.093874][ T623] device .1182 entered promiscuous mode [ 3367.199228][ T633] device .1375 entered promiscuous mode [ 3367.280789][ T627] device .1183 entered promiscuous mode 09:54:48 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xd0020000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:48 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010c0fe000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:48 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37ac0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x7) 09:54:48 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000e00)) [ 3367.450675][ T672] __nla_validate_parse: 15 callbacks suppressed [ 3367.450687][ T672] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:48 executing program 3: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f00000004c0)=@isdn, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000001640), 0xff5f) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x103, 0x9}, 0x60, &(0x7f0000000140)=[{&(0x7f00000027c0)="11840200903c08233e496d5671dc71ff04291b2c1501772502bb867063f70647862a15257781bcf1d1e498104d082833914ee68afc14ac7cb85975751b8c31271948ee303aa2a34be964b8c1b95638607b2e7ec7fda28fea4caada028a39bf259538214e80b9b5c9b58b1cb36a933d64a25324566f7733ea93fc91c98fec268cb1e2148198e2ccf2463d2ae56c61ac436c336b2d421c6b512a600955c6ede3e5820165eabf2dda9e2294300485327a6d28f7913f19d79e5f478626bb6a607c2f5085c68749edc417da6cc4db8c605215575067836f62b0b3e0b49e8c321240c1b1b54babad07a7000c4eb99200b9d016f1554683b7b3323ab37f066b973d584345792feba5b719ec0413d1c37689ce927de538b4ac16687f6595120220e5205f79227e43a8eaa610c8c232bcb811b4a63eab1b87da214700408e830774dcd6318bec9ef28b9171b0492bddb09009a8d26f797713d81548e0c547b8aa7bcd844c2cfa69560deaa6188b576792cccdc09a1f94da4e4c4f05e4d053d6a2fcdb253dce696d6cd85a1aee740c2a84e3d63aa558d3db42531e2303c6e8cfc0b6e31950fcbf3021f708d47c05edcf3fcdd66226d99f1f132d73f698e0820c395f343e0d69042b6b06bf40b45ea6a8f52a32255f3c40d4e9fb93084421a6235116be29125e5afe2d8c418cedb2548db2fcade80c118af8a6be1e650517519721a5920f842662aad37473f2ba60f7ee8466f8dba829c3e17d3e618ef5768b1b0a8991c64f2e592e726bb4636d13fbd04ed71b031e1c1a27fe30325e521a9845ef1abae620cefb216c47a1e3b4db8cb1287006b9fed827fa5a944b8045a3397ba4208c5cb67117393b2f836e4e79196e05ebd7488fa76619ea0521982b9cb76a63bed4f0ffe48ceb4b2bbe4e590dec80eca4740027f855dad06313a2a0188932a2069fc70b8af0e4294a7b51b552ad72ccd5625fd2a971354bad2930eec5f41e0ae271224b8a9160d96965d372c65e4a0adcee1e8bb84406b6a5c5e4d6ed7ff529afdffcdbea58f43e7c39f8aa9845fc92c84aa8bc0eef238d19b2cd3dd0c6d52694c99f2f493b7064076b62d139837eda3d11e43ae52fb771c1585974bcc6e2adb24096fd3d5ac867afb9cfb6ed07cb34e227f00ed5541499d2e7e3b4f3da831a3b9c32de8be0f5b45e8248b5a2811bb452ca6dc7d56d87531347ad316e6e8c6bf887f70f455cdeae8dcfff004b0ed1b8fd63d1d5e55cbdf1541b87821f3c90f7d47e542ec75b132f5285862d3e9fd84f841e4d137e2735d5f23c87108bcaa591a14ab2ab43802ffb176453312420fe0e79af7236850104bc3e925b16fd0a57ee9959ae8ccc13c843365442bb462d86ead8a20c41e064e0ad286f4aa4c69d0046e5012cecf425b0df11c0b458e31804d8ffe98554afc69b475ca03cbe926806b276e19aa47b3e101b95ee2fd32b9f06a3fcf6f078ce694f9ed8fe03425446bcdd0e7c1f4d3e109bbe30020cb81b64bb0cdfd8a0d33e1143c4fbb7fef15d1059e1f20b394f69d482a1da5fd49508808c80c824a843698386b4d3c3885f063aa3c047624f93298040fbc706020d295cf3f363d42f21d327d91d101cc4758c67195a49c3b3002e14cf28a5b8899b7ef08b6713d89c7049ef594361b1d8a0c5838ff30a6a3f1b0f9f947c76d5f1629d3df215975b498bd33ddbc44798a9f76ba0c41e9ad565e44ebf3c333fade1d4306b1042c5e2e855f3e5fdcd64ce7fdf73b09044bec8a2f0cecbb00c6c76c85891478aa4bae6282541cff613f2b461cce115ba0b78c6f50f4593efe5c2ae558f6c0534db14d5b44416b08abe45c6ddf5c749aae8141e427a0a2f42b903ac71caa09e5098cc2c07d79145c7408415d8f937108d6becdbb38a2b3250c0fdf36297375aa3212c9bc8483e8d629c54a79ca55cdda720496753f27fd9e88e203594c1e28514e0d22b9c34c3e1f10253217abed40b09a533fad16c7b9b8e89d7dfd3b27d579bfc813ad2895543ada10f886c7c75010bc70345b727513fa3b7c6aa677a22e037e2bd7731148996f3a8c424075fd12aa8eb9d8f6a8fe7b2eb68934799f5063c58c1816caa4b400bb0914fc7300111c063e5c01910b0b01803a1a348f387542236d82bef6d926ba571ca0e7745e586eddf2334baeafd7b1149502e781ec45299c3f3cd34c3628057def3c012878123224e33828b216022dfebdc6a284e503868a1e4369af819fcfd4124d801386dbb123ce88d54712f6351c77aad6039b2f5ff3d0d1903c74043864fa9f801847ac8446280a31739e0215bce77c08c2477e9079f62225cf179da445e9f220560d995238f17e87dd4ce0f7ebe5f8941d5d130c2d6398e08bb893b5dd8e58701e41e75fd0182d3ebac8920aad7f4777b4e096eb5c5a17e440c0a5b95ca92bbaec63130bbc41d0cbfccb03eb6c1cffc8558bd255c2096a285346dd9600f33554acf62aef19d2776bd5d8a5a9f0a4976022b8ac1400e3f0a7fa227ebc0ad80187939562492154c708739f865a9803512a6213d5026b1febd0a20ce4b3a4d7d90dc5af3f5beaa06b8af1d19556655ac578f9266f5d3b393f24a2d112eee90f749e1f0a6e27ff2469f1cc21d5bcbf355168c62044fd1cc4861544a8175f640ad3c5bb6c81efa331822efb70b57f4110deebe68794211ee4a95c259b4eb519d887b6cfdee178758382f4f63c80b1f0b9f2337dd5a11a5b1fb04c3315ff942cf7f5d7da36c088a65f86529d003c8c9bf74392f9d897b53a422cb3b3f9e09f9936514ac100fecf3c9a573aae041ce3c86cce6dc2884053bc56a510791392bda454aa7dc580a3a7cf71c18dd57bec21c0eb143deb654d8b0fc642bbc7484dc9943c2102169a6aca278f0fd81b1b6b082b355443c8198284e3b01e9fff1c8df1895e9c9593f16438c7f737f2ab56c0f57eadfcd570c5b04b5218fc7d2c0cdca5c7ba5ff428b4fe541d4c8f6fe274d2a3290343f3d6944c918571e350caf2ec3cc9601cd5b71e8f22ff401024c51c592bf476f255b200962e2ed014ce551376235e8d220763f8c9c904570d6b6227c94d62e08b0c9bd3557b96c8ed227685fc54d43e4a05ca5996c4d8e3e5076f394b0c0bc7cdf972f996c45987ffb2d6a138a1772b7ffbeaa66ceddd34839051c61f9d87153f23823f9178b56eb016524ba862cdca9d147b5bda79553ade825d5a1b8ea3acf8c7cad88cd11b68625d367931b9a0296b228fd2c52da32d050d746942fb38dbb3d5e2ad75b7243f7340a8c0d4c7b156e030b6eb154ec6c47c1b6af307ea0e8916e21166572632321f8b4978ecd1f8b4029a6baba4da2dd984d245d1b6dd4a6f2a72acc4d90f480de489826130dd7b2a9ad79938ed6de65c7a56e0515d84302a8a8ee98c20ea32db20b231b9d00e03dd74b804e15c70ce8a6b169ffa79db7e24062b2dd3560502337bb03c8506a25ce77eaa06f9fb54aff0bab9545c32bb9a35a700361f46a3995ef929af7698bf16df9d8965f4d939f5dba6eb238c1089c25617568b29760ecbfef273b8070c3853a652d30da91cb00e0afa1c663589158711984cfe38869974c30e9b51333091cb0f5d72f5ddb0f3bc550b2787ff6fdfe0b90764f8ec319a2674d6e16ca2417b7a2144b5a4ad248fc4b2b8f74ed1957bd4f52f0db0ac4eb8f6dc62c51e16a803bff507359abdbd0ce1ee0fb936a4a060954c1a939b4b197b61311d079ef09e57e60f94fd796c12cf7e62e11bbdc11e04fc79736e42d6d2dcb02e705dc4e8e17addcc0902af4ebbf0a2f57db53cbe99bb0797137c903195de282ed02c37634181936e351f383fb590eb453e539b80c6935185ac40890c1ba70b5e2eb53235f3a983ce4608929d2609354f89fc22f80a0aa9fc0ea9af7f06e46d8b5f5d47dbd2efe1f2d0f4edee09f11b57c257ff5ecfe96ada3c5f37e1d766c5c85490d14f297e1ce65ae34909f04492e7cc955faabb205491a096147d0930ffa70b68055523e360328f26f28ff160cdb8b4785a22110191c9ecfd187267c1a4300e9370a41c73fe224f3a9c54493780b1a4ff96398f0a60f66e48ef4ad7183f71c0c4d6d9d1a57e19a56d9ed426cd4143de82ceb33011988ed079b52ab30300255e066a84959a10676c7b58515ff9bed194c784072af1062734f5d497f2be9b0ea1228f5a981e8d5d78da49da90b040d4e3a93b7f71360b25cf75fca36a4068748e1bc171dd40fa31d6f9c4c926a635f4ea4faf7511146bc5782606966aaab13a30d67cf182751149f678852da30d0f9b6ea5524a1f5ea01e77d7a74ac588ab2251cdbc9f4f8aa2cf367f0ad2178e66fbd7ab447aae12a7bc6cf3925fe99dcdf8ec95cf4576520b781dc12fe6d310978315d2e3d7dbc49c9be2fa40788ebd5fc02c6c7f566a64b7f4af7a96353265dc9e4c74c909b9a385966f4d7312fdcdfa8f5d0632c6db4a19ce696416a04e937d4a994e757eae59c07e5d3228254b35003eba32ed448516e9aa77b5b92c9ce7fff06a8f4f652d27971a46c621a6b2ee3c1adaf60d5cdfb381a4e4ac9ab7d7d72fcb2d6aa7e104255345f1e15dec8299c9c75735a01338d20f72d8b359803becef76d9ca6da029d0a795e6d4a652bf3880efeee074c81774b2971da03eff6d9516ac8a0c34b686aa1afbcb2befc79618a3dbb2bcd53da0075cdba0ddd975fd4e833291005f0fbf7b167922dc85b109e1381431e0fdc50f80b8592edd57f50f9dd950205e1a21cd3026cb30abe6d06dbec6c7cdb76d90c0e85a69aa1522281bcb3f4fc54ee443e76c7d9bf82e313f2dc3e277c699e079a847635780a5b724aca0ede72febba648de12fd14e3a78b29e9df82a19f4ed9c712e5b313c05e6908f6d4601d076afda5cf77eab4ea7c44c9d40f463fe8cde79f18170de9b087b113cfc7d467bd164564c2a8a99e4566d6f9eb1a8d5393700158fe84c109735cfe0ab45d9eb6fe61619d8538512730e015ffac07279973126e9087b209144c8797dd6b65381e616256a9cbf7771222c41618eb82d3539e7750ef0614acb4c901f88f31589d9d6d87c4b2a5361ad44155bf5476f2bc42cd2e758d478a1bcaf27c6c5607f025c8ff75913cb95eb631a690e3e6201204e616a4482a6eae323dadc0a9c22a7de1567ec3f45380bbde304cc76efd4bb0ac9f28475534eb973fc02f3f5dc73a862052f82f6d40c0821012589925ce3f2274ff2a8097b8464b44068c1505b967679bcc6b5d7e7ece9bd1880fc32531fe5d7bac9c5262a709239e477ecf44915a70aa7f984ec1bed047f3ec92a55714403c7c7503a3ac87cec792e072eefa623c56b6b33beb5ae7f5066a952cf6b0b25ab74841e5d2a9b20b1fe0cd83c3aae37eac0dd08d6a65410af956767766f2c6c12d13e87f363052e1e645c2dccd42948be835a9fe1c8892453b73cbcaa7c9222ccece11f86fba52d29d64a609da597e226e5f59e9a8301297c1e9881557a860df15ee14cf4bf70988e2cf90359587bc378adba5aa610db3cc1d6ae5fba9390b4c", 0x5}, {&(0x7f0000000840)="e6", 0xc9ed}], 0x2, 0x0, 0x0, 0x1a0}, 0x80) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 09:54:48 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37ad0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:48 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x900, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x8) 09:54:48 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001000ff000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3367.819357][ T689] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x7}, {0xc}, {}, {0x1, 0x5}]}, @union]}}, &(0x7f0000000080)=""/239, 0x5a, 0xef, 0x1}, 0x20) 09:54:49 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37ae0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3368.103123][ T679] device .1184 entered promiscuous mode [ 3368.165969][ T696] device .1376 entered promiscuous mode [ 3368.218380][ T707] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:49 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xd0410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:49 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000040000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:49 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x17, 0x0, 0x0) 09:54:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x9) 09:54:49 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37af0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3368.414696][ T679] device .1185 entered promiscuous mode 09:54:49 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0xa00, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3368.545206][ T721] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:49 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r1}, 0x10) socketpair(0xc0f33046877cbf4e, 0x0, 0x0, &(0x7f00000001c0)) 09:54:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0xa) 09:54:49 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000100"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:49 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37b00001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:50 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000200"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3368.959102][ T741] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:50 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37b10001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3369.221263][ T727] device .1186 entered promiscuous mode [ 3369.302864][ T738] device .1377 entered promiscuous mode [ 3369.310597][ T755] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:50 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xd1410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:50 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000a00"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:50 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0xe00, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0xe) [ 3369.378497][ T756] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:50 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000140)=@framed={{}, [@initr0, @btf_id, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}]}, &(0x7f00000001c0)='GPL\x00', 0xd93e, 0xfd, &(0x7f0000000200)=""/253, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:54:50 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37b20001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:50 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010000000fc00"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:50 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000003d80)='ns/pid\x00') [ 3369.702874][ T771] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3369.770568][ T773] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:51 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010000080fe00"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:51 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37b30001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:51 executing program 3: socketpair(0x11, 0xa, 0x80000001, 0x0) [ 3370.039808][ T763] device .1187 entered promiscuous mode 09:54:51 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xd2410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:51 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000c0fe00"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3370.149613][ T786] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:51 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) [ 3370.325682][ T768] device .1378 entered promiscuous mode [ 3370.747259][ T793] device .1188 entered promiscuous mode 09:54:52 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0xf00, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:52 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37b40001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:52 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010000000ff00"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0xf) 09:54:52 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) sendmsg$sock(r1, &(0x7f00000001c0)={&(0x7f0000000040)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x80, 0x0, 0x0, &(0x7f00000002c0)=[@mark={{0x14, 0x1, 0x25, 0x300}}], 0x18}, 0x0) 09:54:52 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xd3410b00}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3370.934501][ T816] validate_nla: 34 callbacks suppressed [ 3370.934540][ T816] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3370.970538][ T818] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 09:54:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x12) 09:54:52 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000107fffffff00"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3370.992222][ T819] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 09:54:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x4}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 09:54:52 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37b50001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3371.141238][ T826] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 09:54:52 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3371.297665][ T834] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:54:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x4d8b90}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) [ 3371.353172][ T835] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3371.616024][ T818] device .1189 entered promiscuous mode [ 3371.676737][ T848] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3371.713613][ T826] device .1379 entered promiscuous mode 09:54:53 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x1200, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:53 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37b60001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:53 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:53 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xd8020000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x48) [ 3371.964848][ T857] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3371.995906][ T858] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3372.039928][ T860] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 09:54:53 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37b70001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:53 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3372.230343][ T857] device .1380 entered promiscuous mode 09:54:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x4a) 09:54:53 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37b80001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:53 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000004000)={0x0, 0x0, 0x0}, 0x0) [ 3372.659191][ T882] __nla_validate_parse: 7 callbacks suppressed [ 3372.659234][ T882] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3372.810599][ T860] device .1190 entered promiscuous mode 09:54:54 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37b90001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3372.952215][ T896] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3372.966117][ T897] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3373.092523][ T879] device .1381 entered promiscuous mode [ 3373.167428][ T865] device .1191 entered promiscuous mode 09:54:54 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x1202, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:54 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:54 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37ba0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:54 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xda030000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3373.214982][ T879] device .1382 entered promiscuous mode 09:54:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x4c) [ 3373.323314][ T909] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:54 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37bb0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:54 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@union={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000080)=""/136, 0x2b, 0x88, 0x1}, 0x20) [ 3373.604389][ T925] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:55 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37bc0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:55 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:55 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x14, 0x0, 0x0) [ 3373.926924][ T911] device .1192 entered promiscuous mode 09:54:55 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xdc030000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3373.983176][ T939] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3374.030023][ T920] device .1383 entered promiscuous mode [ 3374.037853][ T946] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:55 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x1403, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:55 executing program 3: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xd) 09:54:55 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x5c) 09:54:55 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37bd0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:55 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) [ 3374.405726][ T962] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:55 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010000000007f"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:55 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37be0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000000)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000800)={r2}, 0xc) [ 3374.649887][ T950] device .1193 entered promiscuous mode 09:54:55 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xe2020000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3374.731182][ T975] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3374.747307][ T958] device .1384 entered promiscuous mode [ 3374.782728][ T979] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x60) 09:54:56 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100002000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:56 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x1a03, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:56 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37bf0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) 09:54:56 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100004000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:56 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37c00001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:56 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010000a000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3375.503701][ T983] device .1194 entered promiscuous mode [ 3375.575490][ T989] device .1385 entered promiscuous mode 09:54:56 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37c10001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:56 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001040)) 09:54:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x68) [ 3375.660305][ T983] device .1195 entered promiscuous mode 09:54:56 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xe4030000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:56 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001000fc000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:56 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x2000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:57 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37c20001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:57 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0x22, 0x0, 0x0) [ 3375.854023][ T1025] device .1386 entered promiscuous mode 09:54:57 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001000000a0000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3375.956574][ T1037] validate_nla: 39 callbacks suppressed [ 3375.956612][ T1037] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3375.990557][ T1039] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3376.031961][ T1042] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3376.060901][ T1025] device .1387 entered promiscuous mode 09:54:57 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000380)=@framed, &(0x7f00000003c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:54:57 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37c30001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x6c) 09:54:57 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001000fe800000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:57 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) [ 3376.392596][ T1054] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3376.410078][ T1055] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3376.456101][ T1057] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:54:57 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001000fec00000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:57 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xe4ffffff}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:57 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37c40001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3376.653557][ T1035] device .1196 entered promiscuous mode [ 3376.719529][ T1066] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3376.808621][ T1073] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3376.845113][ T1074] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3376.862956][ T1075] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3376.946813][ T1055] device .1388 entered promiscuous mode 09:54:58 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x2403, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:58 executing program 3: socketpair(0x28, 0x0, 0x200, &(0x7f0000000000)) 09:54:58 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000fc0000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:58 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37c50001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x74) 09:54:58 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000001680)={0x0, 0x0, 0x18}, 0x10) 09:54:58 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37c60001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:58 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100080fe0000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:58 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x44, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) 09:54:58 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37c70001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3377.514059][ T1074] device .1197 entered promiscuous mode 09:54:58 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xea030000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:54:58 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001000c0fe0000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3377.676788][ T1109] __nla_validate_parse: 17 callbacks suppressed [ 3377.692059][ T1109] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3377.917092][ T1093] device .1389 entered promiscuous mode 09:54:59 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x2a02, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:59 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000000080), 0x40) 09:54:59 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37c80001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:59 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000ff0000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3378.182988][ T1111] device .1198 entered promiscuous mode [ 3378.252809][ T1093] device .1390 entered promiscuous mode [ 3378.269802][ T1131] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x7a) 09:54:59 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f00)={0x9, 0x1, &(0x7f0000002b40)=@raw=[@alu], &(0x7f0000002bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 3378.334831][ T1114] device .1199 entered promiscuous mode 09:54:59 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000400"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:59 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37c90001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:54:59 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x2c03, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:54:59 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xec020000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3378.568110][ T1143] device .1391 entered promiscuous mode 09:54:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000180)='mm_page_alloc\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_bp, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3378.618484][ T1156] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:59 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000001"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:54:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0xc2) 09:54:59 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x2e03, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:55:00 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37ca0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3379.009450][ T1173] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:00 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000002"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:00 executing program 3: socketpair(0x32, 0x0, 0x0, &(0x7f0000000040)) 09:55:00 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37cb0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:00 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010000000000a"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3379.326936][ T1157] device .1200 entered promiscuous mode 09:55:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x4}, 0x40) [ 3379.387622][ T1188] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3379.425546][ T1169] device .1392 entered promiscuous mode 09:55:00 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xee030000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3379.454806][ T1191] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0xd4) 09:55:00 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001000000000fc"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:00 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37cc0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x12, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="180000000000f8a63f27da787404c481402e11c949f7ce000000000000000000000000ed1a2d5db5ebee3cdee10a1a2ba5c7f4a5e0e60623a54f32d3146d716847ce5f94fb3e39d7e021b9bf83388bbfe66d8fa6fd8fb5df27a6494f48c4fa96868d5114aa869614950dbac6d193b7d3a0abd13f00"/130, @ANYRES32=0x1, @ANYBLOB="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", @ANYRES32, @ANYBLOB="00000000f8ffffff850000008900000018190000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xa3, &(0x7f0000000100)=""/163, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, &(0x7f0000000280), 0x10}, 0x41) [ 3379.848118][ T1207] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3380.203287][ T1199] device .1201 entered promiscuous mode [ 3380.235960][ T1204] device .1393 entered promiscuous mode 09:55:01 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3688, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:55:01 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001000000080fe"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xf4240, &(0x7f0000000840)=ANY=[@ANYBLOB="180000000000f8a63f27da787404c481402e11c949f7ce000000000000000000000000ed1a2d5db5ebee3cdee10a1a2ba5c7f4a5e0e60623a54f32d3146d716847ce5f94fb3e39d7e021b9bf83388bbfe66d8fa6fd8fb5df27a6494f48c4fa96868d5114aa869614950dbac6d193b7d3a0abd13f00"/130, @ANYRES32=0x1, @ANYBLOB="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", @ANYRES32, @ANYBLOB="00000000f8ffffff850000008900000018190000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xa3, &(0x7f0000000100)=""/163, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, &(0x7f0000000280), 0x10}, 0x41) 09:55:01 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37cd0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:01 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xf0ffffff}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3380.392402][ T1225] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0xf0) 09:55:01 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010000000c0fe"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:01 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37ce0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:01 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) [ 3380.744896][ T1243] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:02 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001000000000ff"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:02 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:55:02 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37cf0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3381.066720][ T1233] device .1202 entered promiscuous mode 09:55:02 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x38f3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:55:02 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x2, &(0x7f00000003c0)=@raw=[@map_val], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:55:02 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010007fffffff"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:02 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xf1220000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3381.184964][ T1259] validate_nla: 35 callbacks suppressed [ 3381.184994][ T1259] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3381.216015][ T1238] device .1394 entered promiscuous mode [ 3381.260664][ T1238] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3381.307013][ T1259] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3381.370465][ T1264] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 09:55:02 executing program 3: bpf$PROG_LOAD(0x12, &(0x7f00000002c0)={0x0, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="180000000000f8a63f27da787404c481402e11c949f7ce000000000000000000000000ed1a2d5db5ebee3cdee10a1a2ba5c7f4a5e0e60623a54f32d3146d716847ce5f94fb3e39d7e021b9bf83388bbfe66d8fa6fd8fb5df27a6494f48c4fa96868d5114aa869614950dbac6d193b7d3a0abd13f00"/130, @ANYRES32=0x1, @ANYBLOB="0000000000020000180000000900000000000000080000002d57f0fffcffffff182a00004149732f3e7a0a25cf15c660cf7d9650dc4754c2a00479537c3aa40f616adc042db0805043971fa6d04d6e7118cee5dccbaecb0d0383ab1d24dfba7fb3bf35fd1871dbb84174f102af43c0506d07040ace65c03ede1d5ee1d548b0860336e250f3d9392c31323fd554fd0e2e29cc23732270c022047229fcdc9c7a557c320bca69ea9b966198ae16ca08273ecc60ab96b77647c06641ea00ecbad26fc5342da85f099b27d1d7a013a4f3de66407cf95f09db3725f60961365527f179fae6f4ac4ccd33c71ff0a89b1c5a8a0915241e4c0af2f996a90853acd1c72eaa8c867d796735436b34e8cf6c672139f0b4ffa8ae2481b7cf054ed5cc2d60a42eb7a31af90d73e635a6b28f4b172c258938b12004da018b2a4605ae33744d99cff1f5f41ae52ad1f6345c2cb5905d2c0b86e6ab5635fbb078d2df65ab391f865e168a0742bd03bfe1caa4f102c0f467149482683d23e55793b0a1027ef16bd12df98f97254ce4c8c83aef4db1997879179aef6599c53e614abd77d62ebb63ea8f3d964c103e5155ed", @ANYRES32, @ANYBLOB="00000000f8ffffff850000008900000018190000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xa3, &(0x7f0000000100)=""/163, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, &(0x7f0000000280), 0x10}, 0x41) [ 3381.418115][ T1271] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3381.556077][ T1238] device .1395 entered promiscuous mode 09:55:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x148) 09:55:02 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:02 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37d00001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:02 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x100, 0x0) [ 3381.720074][ T1282] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3381.761726][ T1284] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3381.789981][ T1286] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:55:03 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:03 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37d10001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3382.040573][ T1293] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3382.096358][ T1296] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3382.114709][ T1272] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3382.134528][ T1264] device .1203 entered promiscuous mode 09:55:03 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3382.363179][ T1284] device .1396 entered promiscuous mode 09:55:03 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3c02, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:55:03 executing program 3: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='cpuset.mems\x00', 0x2, 0x0) 09:55:03 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37d20001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:03 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xf2030000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:55:03 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x150) [ 3382.477351][ T1272] device .1204 entered promiscuous mode 09:55:03 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 09:55:03 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37d30001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3382.651146][ T1316] device .1397 entered promiscuous mode 09:55:03 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x22a) [ 3382.799603][ T1331] __nla_validate_parse: 6 callbacks suppressed [ 3382.799614][ T1331] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:04 executing program 3: r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/net\x00') 09:55:04 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3383.249077][ T1325] device .1205 entered promiscuous mode 09:55:04 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37d40001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:04 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x80400, 0x0) 09:55:04 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3c03, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3383.345866][ T1340] device .1398 entered promiscuous mode 09:55:04 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xf8030000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:55:04 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x23a) [ 3383.472219][ T1359] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:04 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x3, 0x0) [ 3383.531418][ T1364] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:04 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37d50001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:04 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3383.899375][ T1377] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:05 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37d60001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:05 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3384.157725][ T1365] device .1206 entered promiscuous mode 09:55:05 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000020000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3384.248585][ T1389] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3384.265858][ T1372] device .1399 entered promiscuous mode 09:55:05 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3e03, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:55:05 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) [ 3384.309497][ T1392] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x23c) [ 3384.553306][ T1365] device .1207 entered promiscuous mode 09:55:05 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xfa030000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:55:05 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37d70001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:05 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000040000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3384.620426][ T1406] device .1400 entered promiscuous mode [ 3384.702797][ T1413] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x24a) 09:55:06 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001000000a0000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:06 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3f00, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:55:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, 0x0) 09:55:06 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37d80001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3385.165289][ T1430] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:06 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000fc0000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3385.262145][ T1419] device .1208 entered promiscuous mode 09:55:06 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37d90001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3385.358159][ T1423] device .1401 entered promiscuous mode 09:55:06 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000a00"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x26a) [ 3385.495439][ T1419] device .1209 entered promiscuous mode [ 3385.500632][ T1448] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:06 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xfc030000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:55:06 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x41c1, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:55:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000004000)={0x0, 0x0, &(0x7f0000002fc0)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) 09:55:06 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37da0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:06 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000fe8000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3385.843578][ T1468] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:07 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37db0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3385.886635][ T1452] device .1402 entered promiscuous mode 09:55:07 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000fec000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x274) [ 3386.196418][ T1480] validate_nla: 37 callbacks suppressed [ 3386.196432][ T1480] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 09:55:07 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37dc0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:07 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010000000fc00"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3386.444223][ T1486] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3386.463168][ T1460] device .1210 entered promiscuous mode [ 3386.495035][ T1488] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3386.533558][ T1489] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:55:07 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/user\x00') [ 3386.598902][ T1480] device .1403 entered promiscuous mode 09:55:07 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010000080fe00"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:07 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xfe030000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3386.782448][ T1499] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 09:55:08 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x4203, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:55:08 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37dd0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x27c) 09:55:08 executing program 3: perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x9) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x0, 0x7, &(0x7f00000004c0)=ANY=[@ANYRES16=0x0, @ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x3}, 0x8, 0x10, 0x0}, 0x78) r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'wg1\x00', @multicast}) r1 = socket$kcm(0x2, 0x3, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x7, 0x5, &(0x7f0000000440)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @func, @call={0x85, 0x0, 0x0, 0x61}, @call, @ldst={0x1, 0x3, 0x6, 0x5, 0x9, 0x0, 0x10}], 0x0, 0x0, 0x0, &(0x7f00000004c0), 0x41000, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x9}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x2, 0x40, 0xfd, 0x0, 0x0, 0x8000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800040, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x10001ef, 0x0, 0x3, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x4003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000140)={'wg1\x00', @dev}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000180)='GPL\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 09:55:08 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000c0fe00"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3387.090046][ T1510] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3387.118953][ T1512] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 09:55:08 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010000000ff00"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3387.290815][ T1521] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 09:55:08 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37de0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3387.361592][ T1499] device .1211 entered promiscuous mode [ 3387.415945][ T1499] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3387.485908][ T1528] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:55:08 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000004"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:08 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37df0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:08 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:08 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37e00001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3387.907832][ T1520] device wg1 entered promiscuous mode [ 3388.000104][ T1545] __nla_validate_parse: 9 callbacks suppressed [ 3388.000145][ T1545] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3388.003449][ T1512] device .1404 entered promiscuous mode [ 3388.034569][ T1551] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3388.195368][ T1511] device wg1 left promiscuous mode [ 3388.319520][ T1522] device wg1 entered promiscuous mode [ 3388.358258][ T1499] device .1212 entered promiscuous mode 09:55:09 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xfeff0000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:55:09 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x2a6) 09:55:09 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37e10001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:09 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001000000080fe"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:09 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x4403, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3388.515554][ T1566] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3388.561030][ T1563] device .1405 entered promiscuous mode 09:55:09 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:09 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001000000080fe"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:09 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37e20001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x2b0) 09:55:10 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010000000000a"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:10 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3388.897773][ T1582] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3388.996683][ T1586] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3389.208980][ T1571] device .1213 entered promiscuous mode 09:55:10 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xfeffffff}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:55:10 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000002"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:10 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37e30001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:10 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000080"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3389.387092][ T1602] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:10 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xc5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000540)='\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x34f, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0xffffffffffffffc0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@map, 0xffffffffffffffff, 0x21}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@id={0x1e, 0x3, 0x2, {0x4e24, 0x4}}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000700)="46a11c27a64b248e5056e328c3d8bb32dc2006853bf40c5fc162b2e585c8ba772727b94d70d36d7c5e067d8ad60b0ab912ee67e2919b694f618931cd3d7667400d4cfa1ad5396fce45c9c619a74762ef384b6fb1e8981323cc96787b888f2168aa9700779a8c8169b18dd5caa5d3a8302fafa0ad35f13b879a42fd3e1b3c1a82ea8946b5d0f6076b067c2a796f407f900ba744747c87c87a573c9436004641da150e3b0d390199742e6185bbca3716a99c763acc5e17ec4bee0918d1eefe742b165eefdf109265e04d572dc3fe9657edfe4a8b85af5d58c247144e585a2e31ceec54e47f76fd33e8200cbf95a40966b753c6c80a23499af29101cfc2759b311c94aba920184eae5dea332edb26b2adb8290c170ed234caca40b978d84fe6d659bc0a1aa73b97938fbc8562cbef62e46cb48958c416bc89eca94d3411f9d0ee00b5ffe68326aa5b9f3d66d8ef55cfb46b26553e43266b2fe11f7a9e5802096f6338da54c958039f5fb7fa0533af6c68795b4cdb17a70d9306922ff4b942d08fec583ebfd7d30dfed52b3857fd9a956282e88f2574ae7317f8c5c33b00f4e9aa9a9452db93fa146cded263ff503d1327f8aa688f93ebd4dc7a4ada37b8cf669e5d387c7b67844cb078e18bb41d6653bec2ec472ddaa7a60527ee1b2a4610d0fafb481e63b6bf369aac8233fc1eaa6ad0e470922c6071d7963a8a0677d2a73fec8dab0ffa9ec5171cf93433733b8df555a08c2ec9b5e8f8181c2a0522177b4e696cc01808f693aee71b8995499cc9349f96933786a40c9146837a8e25712544a8d571d1ca7797c3c988aa7a545a292cb677d1435b5fb5bee0ca626d545b921b3afb0d427de58f4bf9803702a36230bd3b4c843f5f90be646260c16adf8bfb69e490a0159a4beb158af20c10bacac54c8aa1dbbf2150733d5d605e5d05947401d570cee3a9fbae1e415cc28cdde24757d8e3e50404c32b0d3738754ade87e05e7cd18fabdf291f6c3d8d0720a5dc8b7797cd0dd829b159c0d34bbbdfc9cf5981d5a84b32fdfdd0ae110ca319959a86906106a28d93e03d88b1f2e8176afc65eb45e5f2ac9f65620a4cc59c0fc1410abde98904e6dc58b5b2630b024d04613a02216bfe7b0ed9484ed8667457c820add23c68b74c9db853eb712e2fd8eea4cbfa028cea77b6fda24079678f3a23ca7a8bfbfb9b3adbeec132b55b8a7a3cc9f65b494b227b6373ad631bcafe91497b0d40d3640824504f195a15393ab0daf2480717f7569ee79a2751f31ee52335ceeee0d59819f9d9b0077501333f4022b39bb34d40a1c24248facedc9ac6374c5a64296dfcc50d27d066dd0061d761e4dfecb7ba10bd3ace5cc7cb6cef337b7e8df348d7d71d6ac38737b372d0bdfcdae7ad1a64ef0cccb0fdbf5795ff8312dd6465bc04be3771a7ab71e7a6d6d0df198983312bf6597e208df4a9668355e868a70f8ce4ef4d823f8b393e84979fd4c791a8a81b2205804d60a4662a4597b76a6bb5f8c40db32b56b5804e75c7829f9ed9f1a8cd85871b025cefee97f4622cf7980f9cdf731e17d827d4387b036e070dcb096719a70a95d8a105de2bea8efdb6cabf4bfbd57aec314c6cc68046d020a8c4ca77ad947c101be4fe01759fcf834da427e89dab2fdd43f32c6ed46eac0a945a1396b5476ae4717174d0fdacad949b4be0522b1f83fd21f706db993f081a92df759e257b3e43f2b61b605e38637ac3149d28033f501cca8dc0292b2e5913067af7d7d878ecb8b5ae9cc1a67fe078c79f3437bc3faf2e1d233a1db7f35d88a752663b2cd3a2e06c55cab3446862adc261e15b1410fa5d424c9a2ce2dcce346f48068b5d739b2dac5ff877cc8cb745b153083f7629fa2f32a62078b1e5256187c3ed8ba00f40b0292663925b18e01739246952ae6f121afb3fe5a0e1800bcc285c845581d21fbe7d3a3221fd171330481789f3f01e8de6ee8e5369e92d37935ff0cce0b7fa5188c67a9a452cf49d9841559606e064e01ac96fcf6f2fa578bd28199f2a748823e6dae534a5d564a8d0d40fe60f91518145d232a32a2b8826ea5e91a7299e4e9be771cf5b22a697d05196a01f49032da08f920c10309a98e83d6d0c1cb52059dd37b7f2deb34710518fe2f45acc70f271c668bd239ef5e6c0022c635382785e01f27618f217b87e2ba9e30b7bd437f2e0c9b0d233ca141cc9478caf189b6cd24bc9ba0917071b15574cc26391de637bde5eb5e4126b478a88912c5e6d6c2f82f5ab2cf1feb57835f802c6ec80f249d881e75c9a0e0a692bf8faa0bd56944807ee33a8efe94c243768747438e86944cf555f4ab779b6b89decdbc1f0c0a415f69edb4793f47eae80e4a1ff15e890ee6b25a73e46c8100cae943b7132fd648b677fe277b85d676391d16f5638b57e9d93a0fb0eaf1dafa9446cb69bde76ffb69ce75ae7d810ce14b985dcb41ddda3fe183acc33dd95db6876b878166017ccdd7f3ebb73910d86d0691c36e295f4ba605037202be360b322f41be6eaf58a1014dad7e337dd8d214ba37a5b4e0cb67ea2fb5b22ea7df38b56c099bd8959aaa1507636d37fcc33910277968d5c2ad71bdabdee16567a32433575285ec6b93b6a565033940c51a5b9eb2702503061962aacdeb013cf670eb6a9d5bea0552d28adc5ecb8ee3d264d5373cbd8ba5b81196ba543653080431bcb28f26bd8bd7bc446dce0fd02be422e45426fe29d2eca3037ce1025d082670ca564d4e26b65eca089a02e1c4fcea2d82428edc5ce60da85acd49e827a225c583fe76f5efaccdb8d3651bd521d3640d11ac6bd75b4ce25d2671e4482d6e83a41fafc4c4de5cd81fd949d50a10147ce22c2d0060ef9cead67f731be99072a43003c2b4827454f81bf6943833612055f893618cac4f0f5d0041c619520a915da07b9a9718dd8edf63554cc3de2ccf1459f992326122f5da8a2aecef006c9df90fccd2aebb5049978dff875b8f5a608352e795487050b522185ab5dc8169c5130f09a9fab2a2eb484e40e88add1262bc17ec734d47ea1abd0015f9fa6b569c070f162703d13656a741d863df10d1f39984a37e17f3f2d3b4f5928c1bb3eb2e6d1ae75cfcb010ffb9c3660b9c3bc51c2801c84db5cd6a858e5deea61211678eaddac424f21e8668bb76fcdb4c2d22b6a0ba87c7650e4d333b444d206a61c9cd4aff689b7b29836a58fcae85dbc1fca69dcb8f07be0ed4cfab511ec00c3f7e0480fde2f706442802bcb11f25fb0a010bf88aa64cefdb77d7d05005dfde37f44c2230e337a848160ce6cd0bbb849f0078226a91b732f4e42f5ca99346d070a16a98721080fdb9e298f7575802d0cab7a5aed16cc36462297998e323f48add9208a69e8506d6f6def00dd31998634ab4e79df523b3e1907793b6a02860ae3d0bba31e4cd488cd9107fa567152d6d6793535f302f3d907ca6f8f4290f8432c07649a6cdb80ad0ade06e676b9b078f44f4b038c8a999dd21c317092c6e23f6ad78bb9d136c65999fc2cd58092a4d61a0f539f3731200e27dc43e8a522141119f2526e86d7d16fe128a14ef8fa20b203a8dbdf02f539f89a50c600d6c698f9828da23176821cc55d4c53389a3fb21a1c12c6822133071d3632a35ab178e591e22bc36d18c792d32df783580a3c511a4f00b684933dd5f0ef394f85a0d3ee003b1fd842c421a567c0151bc3f35f37840f0851e5cc49f20e1ed46cd6f76ca63ec713d6bd5a2941155d8c711958f875c37fbfde80139f001b325f63bf05fa932fa6dec1298098fcadcbf2f47070bfcfc4ecafc10143b770fb9afdefb09d044042dc9f59c532c12ddf8e0b64e76e3a06b138d21099c9e53007b21530276c2216798f91a17cf4272944c801d0b554a04f901091024c37986b9ad83aa8fdd7e0324a8b84d0c49099a15d218c46b8062b60051e382ceab9beb851af0f63f0a820bcdcf0b58eac8d78c404f9a94b633736805cb5d44f224efa5d799c06a4391785a1d43194fda42f638329059dbe5aca7e2ca7630d96cf15953de2b7002a389ddc42f737ecd4657b1cf5888826dede508931aa200589b5fab59c86550c0fd1d5e060fa7cef5061c4fbb957519e0038e8e9cc57dfd8d35e68bef83ecddb097619b6f55843c481018f471a859c932ecf90c0b2dd1fad60e7d39c0b2bfb0ee7bf09a42cd6ce035948234bc74b9ac48d64251d324cee57f946dbfff7740126a5f21aae83b38a595d79811a539f75a2150e5906a84b25de0a80ce2f65434c423c3bb8dbaa3360cc3520990c20392ce035ff6f29b608c3c1bac4c78473a828901c8848fe6f8c0d82d398c63a6bc22fb6f5daaa5999b12b3cb91a37261597212b1ade2a1a75ea33418d20591453f676c8db25cbbb5bbce3853435d54f71ab054885647cdf90459ab57b1da6e6051f0a594f2333be8f469f12cbd75bb41590d84f27b5a4e882b438c237ff38177afad3a844aa1087fa7c0d42717195cb18f08af4f8b1b1cd7bae83a245eb26fb922636503414b26ad04559f949153f64370abeec19cfa37ec0eefcf8ef25087804cb4017d1db1f41293bde20e92592155ae520079a84d1cc5cfa5fc51454701d145500733ffeea9072037269d97019823586ffd8611a08ed354e29e6078b18cadc303540b2adfa879f97e222cd79d80a07bb361b90d304af6c92a81c86ec85f46402b38c778bc34eb0a85f1d1c9c7ef6411ed75fde62fcc1d32842ccb8ad41616bde98f1e16f7e79ab867c358ec5b8c5af2b311fc5b205fe05e740b449c5cf76ad92374b018b90dde5af7ec7a035db5e37b42e6e4af843ef9a7ffb2ebf594f1fb90f3924b25feb2444378887e485f99591160078e15c2fb25b2c110be7a1d418f51d8d484ec330dd75debb1a715b8063dd4a266189d1f1f56207312d5ec43135edbf319dca6958d429e0f486aeeadaa5ff5ad750e8a7bb7f3ca52b2f81ad214c6cab83213f836d9d243bd333237d13685ce13109ea59b4e0e9b5c7f46b68b73407d2192ea8f2dbbbca55fc8aceda2824f6d83e1d00bc51265d6d9b3c6bf0c49f56a17fc37fb6f137fb5be9a16262ec7d686528587e923a46013a01bc979db6d296b7c0ec6e3768a50cf8074d4c86dca6a4b720d42c994a29ac0b52b15528d1d9fedb0b671f34dcbb07c9a8fb791149421fd52254d4498aff69f2325160666f4720666a2449f452dca0c5bcb549f67f64b7db3a5302dc79610f777816a73e9a4d8c07dedc9dad188b6e3fb14540bcf145c3fa6613adcba2c1231094373718428583e8a47684bc8f803b0219fd04ba7947c5c60f58526f51da8861a32b86e602559fd2031cfaf92eb6fb4ae89ca117793a3cf69f7cd3f151e94ca7de181e4978a58e9232651e9dc3842542ae100aaacdef3fc5be32fd4c709ca9c74eecafd7532def37ef10f920fd7b623c8e8462fd061f8476a81a4750834d325b20fef5d38001d369d868566922ac4974a3da2db11fec599590220776259ef335df0ed86551b9d7daf8d2812721e9c18f2e202b2e32d99434f79c3b23e3484eafe62fe8ff06ad44d2629adf97973ba7c9104eeddf5db166f8c6488646b52505e39274628a58eb434fcc1cc3815624e78cac07dc60034979be27a38ea3ac1e72aff4fb0a0f339ed7fb46679f3da88770a2d7346c1376793ab257ee6fc7ac29003730d85654d93356ffebc1b83d94961211e887b0807b936ba04be5792aab8ae30d55cf3e752f6e57ca3fee3f03cfc7c707c250749fad56f0b5f4bb370f92268b57700dd53be0bbaf7062899c55219a7d9d4e", 0x1000}, {&(0x7f0000001700)="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", 0x1000}, {&(0x7f0000002700)="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", 0x1000}, {&(0x7f0000000100)="a22f245684d12bede5418bad865837ae1255f92eb89daa9edce5676a6483df3f81794b710d5e57163795a0679d88038450469f551efc3e2c5c3e4359c1e9336b806f432256c2b01af9a699ff539ee08b44e510077f5c4ce36d8b283266391efa47e7fb20dc2b31193047e27cd93a4cc9c99523b20b6d55e8e2dd4f85b764fdeb", 0x80}], 0x4, &(0x7f0000000240)="81708c5a19552f3da0a6ab067decd5037c88e6e334c86b87e1a4e63b70f643d632118cf56cb3cb0b8d267e166ad2a154e77cf48c2811eb1c4b25101cf9d54a3dacf22e5c48fdd41c59f13a83518aca34d1e2113367b2f5cc67fd0f025d39881bcd", 0x61, 0x1}, 0x404a805) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) [ 3389.553708][ T1584] device .1406 entered promiscuous mode 09:55:10 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x4603, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:55:10 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001000000000c0"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:10 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37e40001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3389.822601][ T1622] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:11 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3390.131965][ T1609] device .1214 entered promiscuous mode [ 3390.219662][ T1584] device .1407 entered promiscuous mode 09:55:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x2c6) 09:55:11 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37e50001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:11 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xff7f0000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:55:11 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001000007fffff"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:11 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x8490, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x6, 0x105, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={0x0}, 0x4120, 0x0, 0x0, 0x8, 0x0, 0x6, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x7fc, 0x0, 0x2}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\xfe') close(0xffffffffffffffff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={0xffffffffffffffff, 0x1f, 0x1, 0x3, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000025c0)={&(0x7f0000000000)=@isdn={0x22, 0x0, 0x0, 0x3}, 0x80, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)={[{0x2b, 'memory'}]}, 0x8) [ 3390.453033][ T1640] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:11 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3390.533559][ T1646] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:11 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x4800, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:55:11 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37e60001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3390.860848][ T1661] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:12 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:12 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37e70001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:12 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37e80001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3391.111605][ T1641] device .1215 entered promiscuous mode 09:55:12 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3391.221330][ T1679] validate_nla: 27 callbacks suppressed [ 3391.221342][ T1679] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3391.276091][ T1685] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3391.361084][ T1649] device .1408 entered promiscuous mode [ 3391.437246][ T1697] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 09:55:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x2d0) 09:55:12 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xfffff000}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:55:12 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37e90001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:12 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3391.571483][ T1703] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3391.584347][ T1704] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3391.614420][ T1708] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3391.631805][ T1710] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:55:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001580)=[{0x0}, {0x0}], 0x2}, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x40000, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r0, 0x4) 09:55:13 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:13 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37ea0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:13 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x4802, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3392.057615][ T1703] device .1216 entered promiscuous mode [ 3392.115285][ T1708] device .1409 entered promiscuous mode [ 3392.169989][ T1727] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:55:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x2e2) 09:55:13 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:13 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3392.226610][ T1731] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3392.227352][ T1729] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 09:55:13 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37eb0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3392.319397][ T1732] team0: Device ipvlan0 failed to register rx_handler 09:55:13 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:13 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37ec0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:13 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:13 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37ed0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3392.929521][ T1739] device .1410 entered promiscuous mode [ 3392.955878][ T1738] team0: Device ipvlan0 failed to register rx_handler 09:55:14 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000100)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x8, &(0x7f0000000800)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x1, 0x2e, &(0x7f0000000680)=""/46, 0x41100, 0x8, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000280)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x0, 0xd, 0x1, 0x65}, 0x10}, 0x78) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) 09:55:14 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:14 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37ee0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3393.259057][ T1741] device .1217 entered promiscuous mode 09:55:14 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x4a02, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:55:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x300) [ 3393.344027][ T1773] __nla_validate_parse: 14 callbacks suppressed [ 3393.344040][ T1773] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:14 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xffffff9e}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:55:14 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000200"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3393.515831][ T1779] device .1411 entered promiscuous mode 09:55:14 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37ef0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x31a) 09:55:14 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x4c00, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3393.808682][ T1799] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:15 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000400"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:15 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37f00001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3394.267312][ T1815] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3394.274742][ T1790] device .1218 entered promiscuous mode 09:55:15 executing program 3: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x4802, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:55:15 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000a00"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3394.322859][ T1818] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:15 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xffffffe4}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:55:15 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37f10001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:15 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010000000fc00"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3394.602627][ T1833] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3394.615693][ T1802] device .1412 entered promiscuous mode [ 3394.713449][ T1836] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:15 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xa2, 0x0, 0x1d, 0x0, 0x0, 0x80000000, 0x24421, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfbb5, 0x1, @perf_bp={&(0x7f0000000080), 0x8}, 0x21000, 0x9, 0x3, 0x5, 0x4614, 0x7f, 0x7f}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000000)="240000001e0081aee4050c00000f10fe070101000000000963da9a9a1cae18c1eebd11da", 0x24}], 0x1, 0x0, 0x0, 0xffffa888}, 0x0) 09:55:16 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010000000000a"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x32c) 09:55:16 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37f20001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3395.044066][ T1852] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3395.227443][ T1826] device .1219 entered promiscuous mode 09:55:16 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x4c03, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:55:16 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010000000fe80"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:16 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37f30001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:16 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/233, 0xe9}], 0x2}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(0xffffffffffffffff) sendmsg$tipc(r2, &(0x7f0000000540)={&(0x7f00000001c0)=@id={0x1e, 0x3, 0x3, {0x4e24, 0x3}}, 0x10, &(0x7f0000000440)=[{&(0x7f00000002c0)="3904a0be7507623b603607dca4f0670b4397d10568eea575f5", 0x19}, {&(0x7f0000000300)="5ed590bfda8e23265c79db2b64ae199e81f3f18dcd26287c9f9d59aa9ac66bae714f788361fa138e3f727e6e168e2036cf64cdf710e342ed5729b653f2c60b794c9ed37df80d8c96fc6d9292698dc661dc2d2bff19b7ba33ccabcdd647d9ef4332b51ce56c98488b9e1673479f4cdfac8a2b704018d0b5362db4531d70e48ca0d28426bcfe23568010e27c1d3fda9be23d00909090345d912bfa636b0919694a94e550325e4d3d2e34ee94d46c", 0xad}, {&(0x7f00000003c0)="81dd8b22a42bfdae9d04f2ea33d944735e49632f96db5454ff978c7948404b0ef611ce269233ecda7c69598bca2366f0263b6ab4eb48027e5667ba6ae0350550523251d37e70d047ee89286bc87a5bb9fabf128b6939bfb7394a474cf4feffec55135568295635da08bdd3847abbbcddee75affb6f851ab813d308fffd82", 0x7e}], 0x3, &(0x7f0000000480)="4d0c2ddb99e9deeddc48c2262784775b91faf673f74917d893c4f7b40796e4fa5c68cbd42b597ff875f8af33f160602f76009dcb2286aa64132c8f017ed7bea613bac072bceda00a90eaad8c54f38832f5ae15c2cc1bfc0c1e3ee07e82ed3ab6d956ee28d619cb22c3bcea5cc38f20a6ed2d3c5b4276581c5bf8ad43824f98795fb0384103a6e47006976001683d11763cbb8d31b88d1e677177b1b519b7af49f5bf560b6d", 0xa5, 0x20004800}, 0x4c141) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x12) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000000) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000580), 0x12) 09:55:16 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xfffffff0}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3395.434741][ T1848] device .1413 entered promiscuous mode [ 3395.475683][ T1866] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x34c) 09:55:16 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010000000fec0"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:16 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37f40001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:17 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001000000000fc"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x35c) [ 3395.929445][ T1888] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:17 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37f50001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:17 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001000000080fe"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3396.133845][ T1867] device .1220 entered promiscuous mode [ 3396.234179][ T1900] validate_nla: 33 callbacks suppressed [ 3396.234190][ T1900] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3396.269942][ T1902] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3396.311489][ T1900] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3396.489535][ T1896] device .1414 entered promiscuous mode 09:55:17 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x5402, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:55:17 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xfffffffe}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:55:17 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@struct={0x8, 0x0, 0x0, 0xc}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000400)=""/266, 0x2e, 0x10a, 0x8}, 0x6a) r1 = gettid() r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x70, 0x80, 0x1f, 0x2, 0x5, 0x0, 0x5, 0x200, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x0, 0x8, 0x1, 0x100}, r1, 0xd, r2, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x5, 0x7, 0x4, 0x81, 0x0, 0xde61, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1362, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x2020, 0x2, 0x401, 0x5, 0x5, 0x101, 0x7b}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x9, 0x3, 0x1, 0x42, 0x0, 0xb53, 0x10, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000000), 0xd}, 0x40104, 0x7, 0xce4, 0x3, 0x7fffffff, 0xbd1, 0x80}, r1, 0x2, r3, 0x0) 09:55:17 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "000000000000000000000010000000c0fe"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:17 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37f60001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x35e) [ 3396.626791][ T1916] BPF:[1] FUNC _ [ 3396.632758][ T1918] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3396.647513][ T1916] BPF:type_id=0 [ 3396.664762][ T1920] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3396.680768][ T1921] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3396.682408][ T1916] BPF: [ 3396.743659][ T1916] BPF:Invalid type_id 09:55:17 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001000000000ff"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3396.774679][ T1916] BPF: [ 3396.774679][ T1916] 09:55:18 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37f70001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3396.821006][ T1922] BPF:[1] FUNC _ [ 3396.824830][ T1922] BPF:type_id=0 [ 3396.849861][ T1922] BPF: [ 3396.853226][ T1922] BPF:Invalid type_id [ 3396.858070][ T1930] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3396.915211][ T1922] BPF: [ 3396.915211][ T1922] [ 3396.981277][ T1938] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3397.002250][ T1939] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:55:18 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37f80001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:18 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3397.205641][ T1944] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3397.265455][ T1946] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3397.268591][ T1918] device .1221 entered promiscuous mode 09:55:18 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xffffffff}, 0x40814) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:55:18 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3397.367849][ T1930] device .1415 entered promiscuous mode 09:55:18 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x5c00, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:55:18 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "00000000000000000000001000000080fe"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:18 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37f90001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x364) 09:55:18 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xaf\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x88\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000200)) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000000)={'ip6erspan0\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) 09:55:18 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:19 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37fa0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:19 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3398.032826][ T1953] device .1222 entered promiscuous mode [ 3398.110365][ T1970] device syzkaller1 entered promiscuous mode 09:55:19 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37fb0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:19 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3398.352335][ T1993] __nla_validate_parse: 9 callbacks suppressed [ 3398.352348][ T1993] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3398.570625][ T1967] device .1416 entered promiscuous mode [ 3400.107236][ T1953] device .1223 entered promiscuous mode 09:55:21 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1}, 0x40802) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:55:21 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:21 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37fc0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x370) 09:55:21 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x5c03, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3400.304456][ T2024] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3400.409273][ T2024] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:21 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3400.471871][ T2023] device .1417 entered promiscuous mode 09:55:21 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:21 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37fd0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3400.528488][ T2029] device .1224 entered promiscuous mode 09:55:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x394) [ 3400.642665][ T2043] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:21 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3400.687277][ T2049] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:21 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37fe0001802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x5) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(r2, &(0x7f0000000240)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x1f, 0x40, 0xe0, 0x5, 0x0, 0x10001, 0x41200, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x8}, 0x20, 0x1, 0x9, 0xe, 0xcf0e, 0x7fff, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x2f, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}, 0x10000, 0x0, 0x0, 0x6, 0x4, 0xfffffffc}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) write$cgroup_subtree(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="2d696f202b637075202b696f202d6d656d6f7279202d696f202b696f202b637075202b69a25c1b00"/52], 0x34) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) [ 3400.832360][ T2063] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3400.839164][ T2025] device .1225 entered promiscuous mode [ 3400.867934][ T2064] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:22 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1}, 0x40803) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:55:22 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000007fff"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:22 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3400.939818][ T2050] device .1418 entered promiscuous mode 09:55:22 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37020101802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x3d4) 09:55:22 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1}, 0x40804) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:55:22 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:22 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6403, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3401.227973][ T2081] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3401.288021][ T2086] validate_nla: 26 callbacks suppressed [ 3401.288033][ T2086] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 09:55:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x248000009, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x401) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x76}, [@call={0x27}]}, 0x0, 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = socket$kcm(0x29, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000300000000000c00095000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321af3cf1a54f26fb0b71d0e6adfefcf1d8f7faf75e0f226bd917487960717142fa9ea4318123751c0a0e168c1886d0d4d94f2f4e345c652fbc16ee988e6e0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b32a83438810720a159cda903634e369a9e152ddca64057ff3c4744aeaccd3641110bec4e9027a0c8055bbfc3a96d2e8910c2c39e4b3449abe802f5ab3e89cf6c662ed4048d3b3e22278d00031e5388ee5c867ddd58311d6ece1ccb0cd2b6d3cffd963218ce740068725c37074e468ee207d2f73902ebcfcf49822775985bf31b715f5888b24efa0000000000000000000000000000000000000000ddffffff020000000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab3323aa9fdfb52faf9cb09c3bfd09000000b91ab219efdebb7b3de8f67581cf796a1d4223b9ff7ffcad3f6c962b9f03000000000000001cf41ab11f12fb1e0a494034127de7c6592df1a6c64d8f20a67745409e011f1264d43e153b3d34899f40159e800ea2474b540500a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a74e04bde740750fa4d9aaa705989b8e673e3296e52d337c56abf112874ec309baed0495f06d058a73651d6fe048ba6866adebab53168770a71ad901ace383e41d277b103923a9d971f7a2591dbe4a912ffaf6f658f3f9cd16286744f83a83f138f8f92efd92239eafce5c1b3f97a297c9e49a0c3300ef7b7fb5f09e0c8a868a353409e34d3e82279637599f35ad380a447483cac394c7bbdcd0e3b1c39b6e00916de48a0e70f03cc4146a77af02c1d4cefd4a2b94c0aed8477dfa8ceefb467f05c6977c78cdbf37704ec73755539280b064bdaba71f897144910fe050038ec9e47de89298b7bf4d769ccc18eede00e8ca5457870eb30d211e23ccc8e06dddeb61799257ab55ff413c86ba9affb12ec757c7234c270246c878d01160e6c07bf6cf8809c3a0d062357b22515567230ad1e1f4933545fc3c741374211663f6b63b1dd044dd0a2768e825972ea3b77641467c89fa0f82e8440105051e5510a33dcda5e143fbf221fff161c12ca389cbe4c51b3fa00675cc175067d2a214f8c9d9b2ecf63b66c5fd9c26a54d43fa050b88d1d43a8645bd9109b7e7131421c0f39113be7664e08bdd7115c61afcb718cf3c4680b2f6c7a8400e302000000c20f49e298727340e87cdefb40e56e9cfad973347d0de7ba4754ff231a1b933d8f931ba3552b2c7c503f3d0e7ab0e958adb862822e40009995ae166deb9856291a43a6f7eb2e32cefbf46306f2af79b8d4c2bf0f7a2cb032dad13007b82e6044f643fc8cd47ae636a5dbe9864a117d27326850a7c3b570863f532c218b10af13d7be94987005088a83880ccab9c9920c2d2af8c5e13d52c83ac3fa7c3ae6c08384865b66d2b4dcb5dd9cba16b64ebbbf8702ae12c77e6e34991af603e3856a346cf7f9fe0bc9f2a1a7506d35e5eb7088aeda890cf8a4a6f31ba6d9b8cb098f935bdcbb29fd0f1a342c010000000000000048a9dea00000b91d2309dc7ae49e4d5f7e50b652053a39e7307c09ff3ac3e820b01c57dd74d4aafc4c383a17bc1de5347bb71ca165cbbbaa2935f602327484386b21b96492ae662082b56cf666e63a757c0ef3ea7af6881513be94b362e15ffca8ec453b3a2a67aedc0264273d82e3c4c67a"], &(0x7f0000000140)='GPL\x00'}, 0x48) r5 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r5, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000040)={r5, r4}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r4, 0x0, 0xd, 0x6d, &(0x7f0000000100)="7bd94e05e4edd521e58b7e297e", &(0x7f00000002c0)=""/109, 0x5, 0x0, 0xa9, 0xe7, &(0x7f0000000340)="ca2a438e5f5e056e472d0a82f29d28fcffafed1c057faa64fd921d0cc678c0300e48ad268062d7c6b0fed281f6c10f41089184bb1763d491990e94ac3dd6759b3584ced822882536ccf7ab6086325c5a28aead3b661974d6361d29b82bade2e45ef8654948a2555b611b5ede1b7d354e8415fd6f160e0b3b00797677445e1f276d66589ecc67e67138ff625ac535c5ed9b5ddc8fa4b1fa6934b95d1419d17e8bea49b94bc06af7bba3", &(0x7f0000000480)="57cbf51c85c86946d849dff352de771c38ad0f759b1a1296ae073177dcad2eb9f714325bffe7fefffd8fa94b5139eef0745fec2596fa8be92c27429c2a2f0aa318ac3af95eb6f057ae9c3246c399c049a31ae650ea52230d20822f9bef0c04ee2cf967486c5148430a56d709249ee92656b9b9b196506265fd7f9ad0b3c9d9af9b23e3ff51a9b2be2ff1dc080e690fb9847eef3e546ea9dfab3b02a49695b1b2352ff0309e3cf62d3473a5347792521bdad7eb346a0d6e9c34b379293cd92f7ff5f3383afcbd4c599db94660756d6e7647975c2105b8623a9127f74dabd7c71e97eda4c0390746", 0x1, 0x33a1}, 0x48) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r2}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x3008, 0x0, 0x0, 0x0, 0x0, 0xbe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x12000005f) 09:55:22 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37030101802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3401.413831][ T2092] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 3401.431907][ T2093] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3401.464796][ T2086] device .1419 entered promiscuous mode 09:55:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x3de) [ 3401.533612][ T2101] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3401.569785][ T2101] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:22 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:22 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37040101802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3401.758676][ T2109] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3401.911852][ T2114] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:55:23 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3401.989811][ T2114] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3402.022582][ T2092] device .1226 entered promiscuous mode [ 3402.104250][ T2119] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3402.141112][ T2109] device .1420 entered promiscuous mode 09:55:23 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37050101802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:23 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1}, 0x40805) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:55:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x3e2) 09:55:23 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6602, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) [ 3402.412425][ T2131] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3402.443518][ T2133] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 09:55:23 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3402.460075][ T2135] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 09:55:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1ab, &(0x7f00000003c0)='bdev!)-%+wlan\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;YE\xec\x8c;\xf7\xcc\xa7\x8b6\n\xbe\x01\x01\xae\xb6\f4\x87\xd9j\xd8\x0e\xc2\x10\xb1\x7f\x95\x01fE\xaea\x10\x8f\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xd6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d\xaa\b\xe4\"\x1c\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8by}/\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj,q[\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k\x8c\x1dTi\xafq\xde\x06/ \x93O.\xe5<0\xfa\b\x82\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\n\xb5\xb6\xffBQ\x80\xe6\xe6\xaf\xc8\x15_>\xe6\xfc\xb9R\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xdf5\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2\xc1CJ\x10\x88\xc5#\x92\xa32)2\xd3\xa02q\xdb\xe4\xe3\x97\x9d\xbc\xc9\xf8G'}, 0x30) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43408) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000180)={'veth1_to_batadv\x00'}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x310) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 09:55:23 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1}, 0x40806) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 3402.579961][ T2131] device .1421 entered promiscuous mode 09:55:23 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37060101802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x3fa) 09:55:23 executing program 1: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6800, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002001400000037153e370a0001802e255b00d1bd", 0x2e}], 0x1}, 0x0) 09:55:24 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37070101802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:24 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37080101802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:24 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e37090101802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 09:55:24 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0101802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3403.425337][ T2175] __nla_validate_parse: 8 callbacks suppressed [ 3403.425377][ T2175] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 09:55:24 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370b0101802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3403.618946][ T2184] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3403.676102][ T2147] device .1227 entered promiscuous mode [ 3403.715852][ T2161] device .1422 entered promiscuous mode 09:55:24 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370c0101802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3403.796349][ T2152] device .1228 entered promiscuous mode [ 3403.803315][ T8] device .0 left promiscuous mode [ 3403.942487][ T2210] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3403.972046][ T8] device .1 left promiscuous mode [ 3403.981663][ T2211] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3404.047598][ T8] device .2 left promiscuous mode [ 3404.116100][ T8] device .3 left promiscuous mode [ 3404.206311][ T8] device .4 left promiscuous mode [ 3404.275748][ T8] device .5 left promiscuous mode [ 3404.336251][ T8] device .6 left promiscuous mode [ 3404.416361][ T8] device .7 left promiscuous mode [ 3404.487452][ T8] device .8 left promiscuous mode [ 3404.555704][ T8] device .9 left promiscuous mode [ 3404.615659][ T8] device .10 left promiscuous mode [ 3404.675683][ T8] device .11 left promiscuous mode [ 3404.735976][ T8] device .12 left promiscuous mode [ 3404.795795][ T8] device .13 left promiscuous mode [ 3404.856043][ T8] device .14 left promiscuous mode [ 3404.915811][ T8] device .15 left promiscuous mode [ 3404.975884][ T8] device .16 left promiscuous mode [ 3405.015950][ T8] device .17 left promiscuous mode [ 3405.065792][ T8] device .18 left promiscuous mode [ 3405.125892][ T8] device .19 left promiscuous mode [ 3405.195696][ T8] device .20 left promiscuous mode [ 3405.235905][ T8] device .21 left promiscuous mode [ 3405.275944][ T8] device .22 left promiscuous mode [ 3405.325767][ T8] device .23 left promiscuous mode [ 3405.376031][ T8] device .24 left promiscuous mode [ 3405.435721][ T8] device .25 left promiscuous mode [ 3405.496034][ T8] device .26 left promiscuous mode [ 3405.555743][ T8] device .27 left promiscuous mode [ 3405.625937][ T8] device .28 left promiscuous mode [ 3405.686790][ T8] device .29 left promiscuous mode [ 3405.785540][ T8] device .30 left promiscuous mode [ 3405.859860][ T8] device .31 left promiscuous mode [ 3405.916679][ T8] device .32 left promiscuous mode [ 3405.975619][ T8] device .33 left promiscuous mode [ 3406.045878][ T8] device .34 left promiscuous mode [ 3406.105911][ T8] device .35 left promiscuous mode [ 3406.165757][ T8] device .36 left promiscuous mode [ 3406.225907][ T8] device .37 left promiscuous mode [ 3406.285655][ T8] device .38 left promiscuous mode [ 3406.335877][ T8] device .39 left promiscuous mode [ 3406.386057][ T8] device .40 left promiscuous mode [ 3406.445761][ T8] device .41 left promiscuous mode [ 3406.515818][ T8] device .42 left promiscuous mode [ 3406.595618][ T8] device .43 left promiscuous mode [ 3406.635628][ T8] device .44 left promiscuous mode [ 3406.675864][ T8] device .45 left promiscuous mode [ 3406.745608][ T8] device .46 left promiscuous mode [ 3406.815885][ T8] device .47 left promiscuous mode [ 3406.885720][ T8] device .48 left promiscuous mode [ 3406.945852][ T8] device .49 left promiscuous mode [ 3407.024727][ T2227] IPVS: ftp: loaded support on port[0] = 21 [ 3407.046908][ T8] device .50 left promiscuous mode [ 3407.096454][ T8] device .51 left promiscuous mode [ 3407.143103][ T8] device .52 left promiscuous mode [ 3407.203047][ T8] device .53 left promiscuous mode [ 3407.293434][ T2227] chnl_net:caif_netlink_parms(): no params data found [ 3407.309562][ T8] device .54 left promiscuous mode [ 3407.371053][ T8] device .55 left promiscuous mode [ 3407.448715][ T8] device .56 left promiscuous mode [ 3407.461684][ T2227] bridge0: port 1(bridge_slave_0) entered blocking state [ 3407.469892][ T2227] bridge0: port 1(bridge_slave_0) entered disabled state [ 3407.488109][ T2227] device bridge_slave_0 entered promiscuous mode [ 3407.502840][ T8] device .57 left promiscuous mode [ 3407.514739][ T2227] bridge0: port 2(bridge_slave_1) entered blocking state [ 3407.522353][ T2227] bridge0: port 2(bridge_slave_1) entered disabled state [ 3407.539918][ T2227] device bridge_slave_1 entered promiscuous mode [ 3407.572119][ T8] device .58 left promiscuous mode [ 3407.628622][ T2227] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3407.639520][ T8] device .59 left promiscuous mode [ 3407.674690][ T2227] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3407.708563][ T8] device .60 left promiscuous mode [ 3407.757363][ T2227] team0: Port device team_slave_0 added [ 3407.781206][ T2227] team0: Port device team_slave_1 added [ 3407.790014][ T8] device .61 left promiscuous mode [ 3407.849157][ T8] device .62 left promiscuous mode [ 3407.867927][ T2227] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3407.875795][ T2227] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3407.905410][ T2227] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3407.929403][ T8] device .63 left promiscuous mode [ 3407.953494][ T2227] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3407.961077][ T2227] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3407.993820][ T2227] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3408.038279][ T8] device .64 left promiscuous mode [ 3408.082496][ T2227] device hsr_slave_0 entered promiscuous mode [ 3408.103557][ T2227] device hsr_slave_1 entered promiscuous mode [ 3408.121463][ T2227] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 3408.130638][ T2227] Cannot create hsr debugfs directory [ 3408.140379][ T8] device .65 left promiscuous mode [ 3408.223719][ T8] device .66 left promiscuous mode [ 3408.318484][ T8] device .67 left promiscuous mode [ 3408.408558][ T8] device .68 left promiscuous mode [ 3408.467667][ T8] device .69 left promiscuous mode [ 3408.526374][ T8] device .70 left promiscuous mode [ 3408.597804][ T8] device .71 left promiscuous mode [ 3408.632067][ T2227] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3408.651973][ T8] device .72 left promiscuous mode [ 3408.676950][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3408.689793][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3408.699855][ T8] device .73 left promiscuous mode [ 3408.727106][ T2227] 8021q: adding VLAN 0 to HW filter on device team0 [ 3408.751816][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3408.762516][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3408.776715][ T2222] bridge0: port 1(bridge_slave_0) entered blocking state [ 3408.783938][ T2222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3408.795143][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3408.805935][ T8] device .74 left promiscuous mode [ 3408.851328][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3408.862445][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3408.875212][ T667] bridge0: port 2(bridge_slave_1) entered blocking state [ 3408.883073][ T667] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3408.893597][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3408.923498][ T8] device .75 left promiscuous mode [ 3408.934753][ T2368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3408.965935][ T2368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3408.975992][ T667] Bluetooth: hci0: command 0x0409 tx timeout [ 3408.986847][ T2368] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3408.998431][ T2368] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3409.021116][ T8] device .76 left promiscuous mode [ 3409.033508][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3409.047104][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3409.072907][ T8] device .77 left promiscuous mode [ 3409.083050][ T33] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3409.097817][ T33] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3409.124674][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3409.138057][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3409.148965][ T8] device .78 left promiscuous mode [ 3409.170710][ T2227] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3409.217230][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3409.235237][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3409.249375][ T8] device .79 left promiscuous mode [ 3409.269562][ T2227] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3409.296187][ T8] device .80 left promiscuous mode [ 3409.361381][ T8] device .81 left promiscuous mode [ 3409.391528][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3409.402509][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3409.424667][ T8] device .82 left promiscuous mode [ 3409.479204][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3409.490379][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3409.506635][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3409.518124][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3409.529073][ T8] device .83 left promiscuous mode [ 3409.550913][ T2227] device veth0_vlan entered promiscuous mode [ 3409.584683][ T2227] device veth1_vlan entered promiscuous mode [ 3409.596640][ T8] device .84 left promiscuous mode [ 3409.652030][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3409.664773][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3409.677099][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3409.688155][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3409.700277][ T8] device .85 left promiscuous mode [ 3409.722617][ T2227] device veth0_macvtap entered promiscuous mode [ 3409.747526][ T2227] device veth1_macvtap entered promiscuous mode [ 3409.764501][ T8] device .86 left promiscuous mode [ 3409.813307][ T2227] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3409.825495][ T2227] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3409.840048][ T2227] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 3409.851348][ T2227] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3409.872634][ T2227] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3409.882611][ T8] device .87 left promiscuous mode [ 3409.894653][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3409.913043][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3409.927662][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3409.939885][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3409.953667][ T8] device .88 left promiscuous mode [ 3409.974522][ T2227] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3409.988735][ T2227] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3409.999649][ T2227] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3410.012531][ T2227] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3410.023369][ T2227] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3410.036524][ T2227] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3410.047188][ T2227] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3410.060878][ T2227] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3410.071404][ T2227] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3410.086130][ T2227] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3410.098870][ T2227] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 3410.110007][ T2227] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3410.126466][ T2227] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3410.140781][ T33] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3410.152120][ T33] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3410.181506][ T8] device .89 left promiscuous mode [ 3410.247324][ T8] device .90 left promiscuous mode [ 3410.322852][ T8] device .91 left promiscuous mode [ 3410.358338][T16464] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3410.367099][T16464] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3410.395310][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 3410.434361][ T8] device .92 left promiscuous mode [ 3410.488884][T16464] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3410.502507][T16464] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3410.516184][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 3410.533088][ T8] device .93 left promiscuous mode 09:55:31 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "0000000000000000000000100000000000"}], 0x28}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:55:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370a0001802e25640400bd", 0x2e}], 0x1}, 0x3fc) 09:55:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5a, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000600)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xf6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 09:55:31 executing program 2: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x40004) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c00020002033c0037153e370a0001802e256400d1bd", 0x2e}], 0x1}, 0x40807) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ac0)=ANY=[@ANYBLOB="bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 09:55:31 executing program 5: perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000036000511d25a80648c63940d0135fc60100012400c0002000200000037153e370d0101802e256400d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) [ 3410.595413][ T8] device .94 left promiscuous mode [ 3410.648045][ T8] device .95 left promiscuous mode [ 3410.664584][ T2472] validate_nla: 17 callbacks suppressed [ 3410.664596][ T2472] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3410.702397][ T2475] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 3410.737787][ T8] device .96 left promiscuous mode [ 3410.744697][ T2475] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 3410.835242][ T8] device .97 left promiscuous mode [ 3410.912141][ T34] audit: type=1800 audit(1607680532.079:227): pid=2474 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="cgroup.controllers" dev="sda1" ino=16373 res=0 errno=0 [ 3410.936458][ T8] device .98 left promiscuous mode [ 3411.005228][ T8] device .99 left promiscuous mode [ 3411.065373][ T667] Bluetooth: hci0: command 0x041b tx timeout [ 3411.071755][ T8] device .100 left promiscuous mode [ 3411.139048][ T8] device .101 left promiscuous mode [ 3411.175519][ T8] device .102 left promiscuous mode [ 3411.245213][ T8] device .103 left promiscuous mode [ 3411.315220][ T8] device .104 left promiscuous mode [ 3411.376490][ T8] device .105 left promiscuous mode [ 3411.427030][ T8] device .106 left promiscuous mode [ 3411.485109][ T8] device .107 left promiscuous mode [ 3411.526763][ T8] device .108 left promiscuous mode [ 3411.585197][ T8] device .109 left promiscuous mode [ 3411.655241][ T8] device .110 left promiscuous mode [ 3411.715178][ T8] device .111 left promiscuous mode [ 3411.786093][ T8] device .112 left promiscuous mode [ 3411.845213][ T8] device .113 left promiscuous mode [ 3411.915236][ T8] device .114 left promiscuous mode [ 3411.958995][ T8] device .115 left promiscuous mode [ 3412.017747][ T8] device .116 left promiscuous mode [ 3412.075320][ T8] device .117 left promiscuous mode [ 3412.125090][ T8] device .118 left promiscuous mode [ 3412.165135][ T8] device .119 left promiscuous mode [ 3412.205140][ T8] device .120 left promiscuous mode [ 3412.255005][ T8] device .121 left promiscuous mode [ 3412.315221][ T8] device .122 left promiscuous mode [ 3412.355371][ T8] device .123 left promiscuous mode [ 3412.395600][ T8] device .124 left promiscuous mode [ 3412.455155][ T8] device .125 left promiscuous mode [ 3412.518565][ T8] device .126 left promiscuous mode [ 3412.584852][ T8] device .127 left promiscuous mode [ 3412.644996][ T8] device .128 left promiscuous mode [ 3412.705107][ T8] device .129 left promiscuous mode [ 3412.745260][ T8] device .130 left promiscuous mode [ 3412.815049][ T8] device .131 left promiscuous mode [ 3412.875175][ T8] device .132 left promiscuous mode [ 3412.935007][ T8] device .133 left promiscuous mode [ 3412.975689][ T8] device .134 left promiscuous mode [ 3413.025052][ T8] device .135 left promiscuous mode [ 3413.084995][ T8] device .136 left promiscuous mode [ 3413.135410][ T2437] Bluetooth: hci0: command 0x040f tx timeout [ 3413.141800][ T8] device .137 left promiscuous mode [ 3413.195213][ T8] device .138 left promiscuous mode [ 3413.255019][ T8] device .139 left promiscuous mode [ 3413.295441][ T8] device .140 left promiscuous mode [ 3413.355085][ T8] device .141 left promiscuous mode [ 3413.395288][ T8] device .142 left promiscuous mode [ 3413.455100][ T8] device .143 left promiscuous mode [ 3413.515077][ T8] device .144 left promiscuous mode [ 3413.555261][ T8] device .145 left promiscuous mode [ 3413.624796][ T8] device .146 left promiscuous mode [ 3413.675323][ T8] device .147 left promiscuous mode [ 3413.715253][ T8] device .148 left promiscuous mode [ 3413.775455][ T8] device .149 left promiscuous mode [ 3413.846247][ T8] device .150 left promiscuous mode [ 3413.905114][ T8] device .151 left promiscuous mode [ 3413.975131][ T8] device .152 left promiscuous mode [ 3414.034975][ T8] device .153 left promiscuous mode [ 3414.105046][ T8] device .154 left promiscuous mode [ 3414.166674][ T8] device .155 left promiscuous mode [ 3414.235212][ T8] device .156 left promiscuous mode [ 3414.295494][ T8] device .157 left promiscuous mode [ 3414.364912][ T8] device .158 left promiscuous mode [ 3414.424924][ T8] device .159 left promiscuous mode [ 3414.498682][ T8] device .160 left promiscuous mode [ 3414.555327][ T8] device .161 left promiscuous mode [ 3414.614816][ T8] device .162 left promiscuous mode [ 3414.674869][ T8] device .163 left promiscuous mode [ 3414.715140][ T8] device .164 left promiscuous mode [ 3414.755386][ T8] device .165 left promiscuous mode [ 3414.795672][ T8] device .166 left promiscuous mode [ 3414.854887][ T8] device .167 left promiscuous mode [ 3414.895103][ T8] device .168 left promiscuous mode [ 3414.954955][ T8] device .169 left promiscuous mode [ 3415.035621][ T8] device .170 left promiscuous mode [ 3415.104969][ T8] device .171 left promiscuous mode [ 3415.184988][ T8] device .172 left promiscuous mode [ 3415.214819][ T2437] Bluetooth: hci0: command 0x0419 tx timeout [ 3415.254902][ T8] device .173 left promiscuous mode [ 3415.314771][ T8] device .174 left promiscuous mode [ 3415.374993][ T8] device .175 left promiscuous mode [ 3415.437153][ T8] device .176 left promiscuous mode [ 3415.495151][ T8] device .177 left promiscuous mode [ 3415.575178][ T8] device .178 left promiscuous mode [ 3415.635387][ T8] device .179 left promiscuous mode [ 3415.694949][ T8] device .180 left promiscuous mode [ 3415.754844][ T8] device .181 left promiscuous mode [ 3415.815035][ T8] device .182 left promiscuous mode [ 3415.865248][ T8] device .183 left promiscuous mode [ 3415.925000][ T8] device .184 left promiscuous mode [ 3415.984951][ T8] device .185 left promiscuous mode [ 3416.054839][ T8] device .186 left promiscuous mode [ 3416.114932][ T8] device .187 left promiscuous mode [ 3416.174867][ T8] device .188 left promiscuous mode [ 3416.234854][ T8] device .189 left promiscuous mode [ 3416.274811][ T8] device .190 left promiscuous mode [ 3416.334979][ T8] device .191 left promiscuous mode [ 3416.405378][ T8] device .192 left promiscuous mode [ 3416.455090][ T8] device .193 left promiscuous mode [ 3416.514893][ T8] device .194 left promiscuous mode [ 3416.565024][ T8] device .195 left promiscuous mode [ 3416.634864][ T8] device .196 left promiscuous mode [ 3416.704870][ T8] device .197 left promiscuous mode [ 3416.744909][ T8] device .198 left promiscuous mode [ 3416.785095][ T8] device .199 left promiscuous mode [ 3416.844663][ T8] device .200 left promiscuous mode [ 3416.914857][ T8] device .201 left promiscuous mode [ 3416.964968][ T8] device .202 left promiscuous mode [ 3417.024715][ T8] device .203 left promiscuous mode [ 3417.084762][ T8] device .204 left promiscuous mode [ 3417.127681][ T8] device .205 left promiscuous mode [ 3417.184793][ T8] device .206 left promiscuous mode [ 3417.254741][ T8] device .207 left promiscuous mode [ 3417.314647][ T8] device .208 left promiscuous mode [ 3417.384788][ T8] device .209 left promiscuous mode [ 3417.444871][ T8] device .210 left promiscuous mode [ 3417.504696][ T8] device .211 left promiscuous mode [ 3417.544851][ T8] device .212 left promiscuous mode [ 3417.604648][ T8] device .213 left promiscuous mode [ 3417.664711][ T8] device .214 left promiscuous mode [ 3417.714856][ T8] device .215 left promiscuous mode [ 3417.764822][ T8] device .216 left promiscuous mode [ 3417.844837][ T8] device .217 left promiscuous mode [ 3417.904709][ T8] device .218 left promiscuous mode [ 3417.964602][ T8] device .219 left promiscuous mode [ 3418.024806][ T8] device .220 left promiscuous mode [ 3418.095024][ T8] device .221 left promiscuous mode [ 3418.167088][ T8] device .222 left promiscuous mode [ 3418.224807][ T8] device .223 left promiscuous mode [ 3418.264814][ T8] device .224 left promiscuous mode [ 3418.324646][ T8] device .225 left promiscuous mode [ 3418.384823][ T8] device .226 left promiscuous mode [ 3418.444621][ T8] device .227 left promiscuous mode [ 3418.504525][ T8] device .228 left promiscuous mode [ 3418.564533][ T8] device .229 left promiscuous mode [ 3418.634562][ T8] device .230 left promiscuous mode [ 3418.704717][ T8] device .231 left promiscuous mode [ 3418.764571][ T8] device .232 left promiscuous mode [ 3418.834542][ T8] device .233 left promiscuous mode [ 3418.874906][ T8] device .234 left promiscuous mode [ 3418.934751][ T8] device .235 left promiscuous mode [ 3418.994813][ T8] device .236 left promiscuous mode [ 3419.064577][ T8] device .237 left promiscuous mode [ 3419.124499][ T8] device .238 left promiscuous mode [ 3419.184896][ T8] device .239 left promiscuous mode [ 3419.264747][ T8] device .240 left promiscuous mode [ 3419.324827][ T8] device .241 left promiscuous mode [ 3419.384677][ T8] device .242 left promiscuous mode [ 3419.444770][ T8] device .243 left promiscuous mode [ 3419.504712][ T8] device .244 left promiscuous mode [ 3419.574573][ T8] device .245 left promiscuous mode [ 3419.634497][ T8] device .246 left promiscuous mode [ 3419.704403][ T8] device .247 left promiscuous mode [ 3419.766085][ T8] device .248 left promiscuous mode [ 3419.814779][ T8] device .249 left promiscuous mode [ 3419.864745][ T8] device .250 left promiscuous mode [ 3419.915947][ T8] device .251 left promiscuous mode [ 3419.984741][ T8] device .252 left promiscuous mode [ 3420.044435][ T8] device .253 left promiscuous mode [ 3420.084594][ T8] device .254 left promiscuous mode [ 3420.134579][ T8] device .255 left promiscuous mode [ 3420.194460][ T8] device .256 left promiscuous mode [ 3420.254535][ T8] device .257 left promiscuous mode [ 3420.324563][ T8] device .258 left promiscuous mode [ 3420.384544][ T8] device .259 left promiscuous mode [ 3420.454590][ T8] device .260 left promiscuous mode [ 3420.494983][ T8] device .261 left promiscuous mode [ 3420.564503][ T8] device .262 left promiscuous mode [ 3420.635483][ T8] device .263 left promiscuous mode [ 3420.704561][ T8] device .264 left promiscuous mode [ 3420.744712][ T8] device .265 left promiscuous mode [ 3420.795797][ T8] device .266 left promiscuous mode [ 3420.854591][ T8] device .267 left promiscuous mode [ 3420.914497][ T8] device .268 left promiscuous mode [ 3420.984904][ T8] device .269 left promiscuous mode [ 3421.024707][ T8] device .270 left promiscuous mode [ 3421.084446][ T8] device .271 left promiscuous mode [ 3421.124573][ T8] device .272 left promiscuous mode [ 3421.185674][ T8] device .273 left promiscuous mode [ 3421.254448][ T8] device .274 left promiscuous mode [ 3421.294801][ T8] device .275 left promiscuous mode [ 3421.354489][ T8] device .276 left promiscuous mode [ 3421.414536][ T8] device .277 left promiscuous mode [ 3421.464534][ T8] device .278 left promiscuous mode [ 3421.534442][ T8] device .279 left promiscuous mode [ 3421.594334][ T8] device .280 left promiscuous mode [ 3421.654421][ T8] device .281 left promiscuous mode [ 3421.724409][ T8] device .282 left promiscuous mode [ 3421.774881][ T8] device .283 left promiscuous mode [ 3421.844438][ T8] device .284 left promiscuous mode [ 3421.884589][ T8] device .285 left promiscuous mode [ 3421.954409][ T8] device .286 left promiscuous mode [ 3422.004656][ T8] device .287 left promiscuous mode [ 3422.064340][ T8] device .288 left promiscuous mode [ 3422.114649][ T8] device .289 left promiscuous mode [ 3422.164489][ T8] device .290 left promiscuous mode [ 3422.225507][ T8] device .291 left promiscuous mode [ 3422.284269][ T8] device .292 left promiscuous mode [ 3422.354243][ T8] device .293 left promiscuous mode [ 3422.404648][ T8] device .294 left promiscuous mode [ 3422.464357][ T8] device .295 left promiscuous mode [ 3422.514447][ T8] device .296 left promiscuous mode [ 3422.574540][ T8] device .297 left promiscuous mode [ 3422.645587][ T8] device .298 left promiscuous mode [ 3422.704441][ T8] device .299 left promiscuous mode [ 3422.764283][ T8] device .300 left promiscuous mode [ 3422.814513][ T8] device .301 left promiscuous mode [ 3422.854638][ T8] device .302 left promiscuous mode [ 3422.904432][ T8] device .303 left promiscuous mode [ 3422.944573][ T8] device .304 left promiscuous mode [ 3423.014426][ T8] device .305 left promiscuous mode [ 3423.074310][ T8] device .306 left promiscuous mode [ 3423.134206][ T8] device .307 left promiscuous mode [ 3423.214584][ T8] device .308 left promiscuous mode [ 3423.274311][ T8] device .309 left promiscuous mode [ 3423.325540][ T8] device .310 left promiscuous mode [ 3423.394253][ T8] device .311 left promiscuous mode [ 3423.436112][ T8] device .312 left promiscuous mode [ 3423.494325][ T8] device .313 left promiscuous mode [ 3423.574297][ T8] device .314 left promiscuous mode [ 3423.634347][ T8] device .315 left promiscuous mode [ 3423.704426][ T8] device .316 left promiscuous mode [ 3423.744534][ T8] device .317 left promiscuous mode [ 3423.804343][ T8] device .318 left promiscuous mode [ 3423.854473][ T8] device .319 left promiscuous mode [ 3423.914219][ T8] device .320 left promiscuous mode [ 3423.954567][ T8] device .321 left promiscuous mode [ 3423.995969][ T8] device .322 left promiscuous mode [ 3424.054340][ T8] device .323 left promiscuous mode [ 3424.094420][ T8] device .324 left promiscuous mode [ 3424.164245][ T8] device .325 left promiscuous mode [ 3424.224255][ T8] device .326 left promiscuous mode [ 3424.294238][ T8] device .327 left promiscuous mode [ 3424.354274][ T8] device .328 left promiscuous mode [ 3424.414488][ T8] device .329 left promiscuous mode [ 3424.474302][ T8] device .330 left promiscuous mode [ 3424.535921][ T8] device .331 left promiscuous mode [ 3424.604274][ T8] device .332 left promiscuous mode [ 3424.664066][ T8] device .333 left promiscuous mode [ 3424.704447][ T8] device .334 left promiscuous mode [ 3424.774300][ T8] device .335 left promiscuous mode [ 3424.834358][ T8] device .336 left promiscuous mode [ 3424.874502][ T8] device .337 left promiscuous mode [ 3424.934169][ T8] device .338 left promiscuous mode [ 3424.994381][ T8] device .339 left promiscuous mode [ 3425.054103][ T8] device .340 left promiscuous mode [ 3425.114222][ T8] device .341 left promiscuous mode [ 3425.184306][ T8] device .342 left promiscuous mode [ 3425.274446][ T8] device .343 left promiscuous mode [ 3425.334162][ T8] device .344 left promiscuous mode [ 3425.406682][ T8] device .345 left promiscuous mode [ 3425.464476][ T8] device .346 left promiscuous mode [ 3425.534278][ T8] device .347 left promiscuous mode [ 3425.594283][ T8] device .348 left promiscuous mode [ 3425.644401][ T8] device .349 left promiscuous mode [ 3425.714144][ T8] device .350 left promiscuous mode [ 3425.784267][ T8] device .351 left promiscuous mode [ 3425.844265][ T8] device .352 left promiscuous mode [ 3425.904082][ T8] device .353 left promiscuous mode [ 3425.964104][ T8] device .354 left promiscuous mode [ 3426.024072][ T8] device .355 left promiscuous mode [ 3426.084070][ T8] device .356 left promiscuous mode [ 3426.144112][ T8] device .357 left promiscuous mode [ 3426.204270][ T8] device .358 left promiscuous mode [ 3426.264125][ T8] device .359 left promiscuous mode [ 3426.314288][ T8] device .360 left promiscuous mode [ 3426.374077][ T8] device .361 left promiscuous mode [ 3426.433956][ T8] device .362 left promiscuous mode [ 3426.484243][ T8] device .363 left promiscuous mode [ 3426.543971][ T8] device .364 left promiscuous mode [ 3426.614290][ T8] device .365 left promiscuous mode [ 3426.673923][ T8] device .366 left promiscuous mode [ 3426.734510][ T8] device .367 left promiscuous mode [ 3426.794052][ T8] device .368 left promiscuous mode [ 3426.834123][ T8] device .369 left promiscuous mode [ 3426.904150][ T8] device .370 left promiscuous mode [ 3426.974057][ T8] device .371 left promiscuous mode [ 3427.033984][ T8] device .372 left promiscuous mode [ 3427.105331][ T8] device .373 left promiscuous mode [ 3427.174087][ T8] device .374 left promiscuous mode [ 3427.233973][ T8] device .375 left promiscuous mode [ 3427.274432][ T8] device .376 left promiscuous mode [ 3427.337630][ T8] device .377 left promiscuous mode [ 3427.394169][ T8] device .378 left promiscuous mode [ 3427.454206][ T8] device .379 left promiscuous mode [ 3427.523978][ T8] device .380 left promiscuous mode [ 3427.595165][ T8] device .381 left promiscuous mode [ 3427.654142][ T8] device .382 left promiscuous mode [ 3427.725721][ T8] device .383 left promiscuous mode [ 3427.794126][ T8] device .384 left promiscuous mode [ 3427.863900][ T8] device .385 left promiscuous mode [ 3427.923870][ T8] device .386 left promiscuous mode [ 3427.984109][ T8] device .387 left promiscuous mode [ 3428.054866][ T8] device .388 left promiscuous mode [ 3428.113993][ T8] device .389 left promiscuous mode [ 3428.173863][ T8] device .390 left promiscuous mode [ 3428.233949][ T8] device .391 left promiscuous mode [ 3428.274116][ T8] device .392 left promiscuous mode [ 3428.363826][ T8] device .393 left promiscuous mode [ 3428.414036][ T8] device .394 left promiscuous mode [ 3428.493853][ T8] device .395 left promiscuous mode [ 3428.584252][ T8] device .396 left promiscuous mode [ 3428.635077][ T8] device .397 left promiscuous mode [ 3428.703974][ T8] device .398 left promiscuous mode [ 3428.763895][ T8] device .399 left promiscuous mode [ 3428.804081][ T8] device .400 left promiscuous mode [ 3428.873942][ T8] device .401 left promiscuous mode [ 3428.914120][ T8] device .402 left promiscuous mode [ 3428.973793][ T8] device .403 left promiscuous mode [ 3429.033816][ T8] device .404 left promiscuous mode [ 3429.075566][ T8] device .405 left promiscuous mode [ 3429.133875][ T8] device .406 left promiscuous mode [ 3429.219613][ T8] device .407 left promiscuous mode [ 3429.263994][ T8] device .408 left promiscuous mode [ 3429.333827][ T8] device .409 left promiscuous mode [ 3429.404009][ T8] device .410 left promiscuous mode [ 3429.454205][ T8] device .411 left promiscuous mode [ 3429.513739][ T8] device .412 left promiscuous mode [ 3429.555613][ T8] device .413 left promiscuous mode [ 3429.613911][ T8] device .414 left promiscuous mode [ 3429.674937][ T8] device .415 left promiscuous mode [ 3429.743792][ T8] device .416 left promiscuous mode [ 3429.813742][ T8] device .417 left promiscuous mode [ 3429.854084][ T8] device .418 left promiscuous mode [ 3429.894188][ T8] device .419 left promiscuous mode [ 3429.944109][ T8] device .420 left promiscuous mode [ 3430.004025][ T8] device .421 left promiscuous mode [ 3430.053889][ T8] device .422 left promiscuous mode [ 3430.104392][ T8] device .423 left promiscuous mode [ 3430.154049][ T8] device .424 left promiscuous mode [ 3430.203818][ T8] device .425 left promiscuous mode [ 3430.263618][ T8] device .426 left promiscuous mode [ 3430.303867][ T8] device .427 left promiscuous mode [ 3430.353951][ T8] device .428 left promiscuous mode [ 3430.413712][ T8] device .429 left promiscuous mode [ 3430.485490][ T8] device .430 left promiscuous mode [ 3430.543923][ T8] device .431 left promiscuous mode [ 3430.613964][ T8] device .432 left promiscuous mode [ 3430.657117][ T8] device .433 left promiscuous mode [ 3430.723887][ T8] device .434 left promiscuous mode [ 3430.784075][ T8] device .435 left promiscuous mode [ 3430.843811][ T8] device .436 left promiscuous mode [ 3430.883977][ T8] device .437 left promiscuous mode [ 3430.953807][ T8] device .438 left promiscuous mode [ 3431.013639][ T8] device .439 left promiscuous mode [ 3431.054204][ T8] device .440 left promiscuous mode [ 3431.113788][ T8] device .441 left promiscuous mode [ 3431.155570][ T8] device .442 left promiscuous mode [ 3431.223994][ T8] device .443 left promiscuous mode [ 3431.283727][ T8] device .444 left promiscuous mode [ 3431.343915][ T8] device .445 left promiscuous mode [ 3431.403639][ T8] device .446 left promiscuous mode [ 3431.473811][ T8] device .447 left promiscuous mode [ 3431.553655][ T8] device .448 left promiscuous mode [ 3431.633894][ T8] device .449 left promiscuous mode [ 3431.693694][ T8] device .450 left promiscuous mode [ 3431.753840][ T8] device .451 left promiscuous mode [ 3431.813725][ T8] device .452 left promiscuous mode [ 3431.883655][ T8] device .453 left promiscuous mode [ 3431.923955][ T8] device .454 left promiscuous mode [ 3431.963878][ T8] device .455 left promiscuous mode [ 3432.023550][ T8] device .456 left promiscuous mode [ 3432.085022][ T8] device .457 left promiscuous mode [ 3432.143710][ T8] device .458 left promiscuous mode [ 3432.203603][ T8] device .459 left promiscuous mode [ 3432.263676][ T8] device .460 left promiscuous mode [ 3432.305033][ T8] device .461 left promiscuous mode [ 3432.373594][ T8] device .462 left promiscuous mode [ 3432.433552][ T8] device .463 left promiscuous mode [ 3432.473614][ T8] device .464 left promiscuous mode [ 3432.513805][ T8] device .465 left promiscuous mode [ 3432.583575][ T8] device .466 left promiscuous mode [ 3432.643556][ T8] device .467 left promiscuous mode [ 3432.703628][ T8] device .468 left promiscuous mode [ 3432.753611][ T8] device .469 left promiscuous mode [ 3432.803807][ T8] device .470 left promiscuous mode [ 3432.863645][ T8] device .471 left promiscuous mode [ 3432.906003][ T8] device .472 left promiscuous mode [ 3432.963811][ T8] device .473 left promiscuous mode [ 3433.023606][ T8] device .474 left promiscuous mode [ 3433.083631][ T8] device .475 left promiscuous mode [ 3433.143555][ T8] device .476 left promiscuous mode [ 3433.203536][ T8] device .477 left promiscuous mode [ 3433.263454][ T8] device .478 left promiscuous mode [ 3433.303602][ T8] device .479 left promiscuous mode [ 3433.363593][ T8] device .480 left promiscuous mode [ 3433.403731][ T8] device .481 left promiscuous mode [ 3433.454944][ T8] device .482 left promiscuous mode [ 3433.523461][ T8] device .483 left promiscuous mode [ 3433.593459][ T8] device .484 left promiscuous mode [ 3433.663481][ T8] device .485 left promiscuous mode [ 3433.703845][ T8] device .486 left promiscuous mode [ 3433.763591][ T8] device .487 left promiscuous mode [ 3433.823487][ T8] device .488 left promiscuous mode [ 3433.883551][ T8] device .489 left promiscuous mode [ 3433.943353][ T8] device .490 left promiscuous mode [ 3434.013735][ T8] device .491 left promiscuous mode [ 3434.073726][ T8] device .492 left promiscuous mode [ 3434.133449][ T8] device .493 left promiscuous mode [ 3434.193612][ T8] device .494 left promiscuous mode [ 3434.253781][ T8] device .495 left promiscuous mode [ 3434.323521][ T8] device .496 left promiscuous mode [ 3434.373669][ T8] device .497 left promiscuous mode [ 3434.433569][ T8] device .498 left promiscuous mode [ 3434.493662][ T8] device .499 left promiscuous mode [ 3434.553346][ T8] device .500 left promiscuous mode [ 3434.613568][ T8] device .501 left promiscuous mode [ 3434.663626][ T8] device .502 left promiscuous mode [ 3434.723515][ T8] device .503 left promiscuous mode [ 3434.767108][ T8] device .504 left promiscuous mode [ 3434.823899][ T8] device .505 left promiscuous mode [ 3434.883551][ T8] device .506 left promiscuous mode [ 3434.943658][ T8] device .507 left promiscuous mode [ 3434.993690][ T8] device .508 left promiscuous mode [ 3435.053736][ T8] device .509 left promiscuous mode [ 3435.113615][ T8] device .510 left promiscuous mode [ 3435.173465][ T8] device .511 left promiscuous mode [ 3435.233540][ T8] device .512 left promiscuous mode [ 3435.283727][ T8] device .513 left promiscuous mode [ 3435.333605][ T8] device .514 left promiscuous mode [ 3435.383593][ T8] device .515 left promiscuous mode [ 3435.423540][ T8] device .516 left promiscuous mode [ 3435.493415][ T8] device .517 left promiscuous mode [ 3435.553341][ T8] device .518 left promiscuous mode [ 3435.613681][ T8] device .519 left promiscuous mode [ 3435.663494][ T8] device .520 left promiscuous mode [ 3435.743386][ T8] device .521 left promiscuous mode [ 3435.814353][ T8] device .522 left promiscuous mode [ 3435.873292][ T8] device .523 left promiscuous mode [ 3435.923653][ T8] device .524 left promiscuous mode [ 3435.993285][ T8] device .525 left promiscuous mode [ 3436.053380][ T8] device .526 left promiscuous mode [ 3436.103410][ T8] device .527 left promiscuous mode [ 3436.163260][ T8] device .528 left promiscuous mode [ 3436.203418][ T8] device .529 left promiscuous mode [ 3436.255808][ T8] device .530 left promiscuous mode [ 3436.323302][ T8] device .531 left promiscuous mode [ 3436.363455][ T8] device .532 left promiscuous mode [ 3436.403639][ T8] device .533 left promiscuous mode [ 3436.453324][ T8] device .534 left promiscuous mode [ 3436.503583][ T8] device .535 left promiscuous mode [ 3436.563665][ T8] device .536 left promiscuous mode [ 3436.643304][ T8] device .537 left promiscuous mode [ 3436.693478][ T8] device .538 left promiscuous mode [ 3436.743502][ T8] device .539 left promiscuous mode [ 3436.793428][ T8] device .540 left promiscuous mode [ 3436.853273][ T8] device .541 left promiscuous mode [ 3436.923478][ T8] device .542 left promiscuous mode [ 3436.983175][ T8] device .543 left promiscuous mode [ 3437.053236][ T8] device .544 left promiscuous mode [ 3437.113184][ T8] device .545 left promiscuous mode [ 3437.153335][ T8] device .546 left promiscuous mode [ 3437.193500][ T8] device .547 left promiscuous mode [ 3437.263274][ T8] device .548 left promiscuous mode [ 3437.323287][ T8] device .549 left promiscuous mode [ 3437.383289][ T8] device .550 left promiscuous mode [ 3437.434663][ T8] device .551 left promiscuous mode [ 3437.493161][ T8] device .552 left promiscuous mode [ 3437.553425][ T8] device .553 left promiscuous mode [ 3437.603361][ T8] device .554 left promiscuous mode [ 3437.653260][ T8] device .555 left promiscuous mode [ 3437.713161][ T8] device .556 left promiscuous mode [ 3437.763323][ T8] device .557 left promiscuous mode [ 3437.823201][ T8] device .558 left promiscuous mode [ 3437.883136][ T8] device .559 left promiscuous mode [ 3437.944280][ T8] device .560 left promiscuous mode [ 3438.003265][ T8] device .561 left promiscuous mode [ 3438.073383][ T8] device .562 left promiscuous mode [ 3438.135688][ T8] device .563 left promiscuous mode [ 3438.193129][ T8] device .564 left promiscuous mode [ 3438.263043][ T8] device .565 left promiscuous mode [ 3438.323078][ T8] device .566 left promiscuous mode [ 3438.383058][ T8] device .567 left promiscuous mode [ 3438.423367][ T8] device .568 left promiscuous mode [ 3438.464728][ T8] device .569 left promiscuous mode [ 3438.523321][ T8] device .570 left promiscuous mode [ 3438.593050][ T8] device .571 left promiscuous mode [ 3438.653159][ T8] device .572 left promiscuous mode [ 3438.723168][ T8] device .573 left promiscuous mode [ 3438.773253][ T8] device .574 left promiscuous mode [ 3438.813298][ T8] device .575 left promiscuous mode [ 3438.883148][ T8] device .576 left promiscuous mode [ 3438.943189][ T8] device .577 left promiscuous mode [ 3438.993344][ T8] device .578 left promiscuous mode [ 3439.052985][ T8] device .579 left promiscuous mode [ 3439.093201][ T8] device .580 left promiscuous mode [ 3439.133534][ T8] device .581 left promiscuous mode [ 3439.214435][ T8] device .582 left promiscuous mode [ 3439.273494][ T8] device .583 left promiscuous mode [ 3439.333474][ T8] device .584 left promiscuous mode [ 3439.373433][ T8] device .585 left promiscuous mode [ 3439.433193][ T8] device .586 left promiscuous mode [ 3439.473309][ T8] device .587 left promiscuous mode [ 3439.543151][ T8] device .588 left promiscuous mode [ 3439.583445][ T8] device .589 left promiscuous mode [ 3439.643030][ T8] device .590 left promiscuous mode [ 3439.703044][ T8] device .591 left promiscuous mode [ 3439.763311][ T8] device .592 left promiscuous mode [ 3439.832945][ T8] device .593 left promiscuous mode [ 3439.903434][ T8] device .594 left promiscuous mode [ 3439.983170][ T8] device .595 left promiscuous mode [ 3440.063051][ T8] device .596 left promiscuous mode [ 3440.135919][ T8] device .597 left promiscuous mode [ 3440.203226][ T8] device .598 left promiscuous mode [ 3440.253184][ T8] device .599 left promiscuous mode [ 3440.323380][ T8] device .600 left promiscuous mode [ 3440.403072][ T8] device .601 left promiscuous mode [ 3440.443123][ T8] device .602 left promiscuous mode [ 3440.494053][ T8] device .603 left promiscuous mode [ 3440.579123][ T8] device .604 left promiscuous mode [ 3440.643109][ T8] device .605 left promiscuous mode [ 3440.713115][ T8] device .606 left promiscuous mode [ 3440.783021][ T8] device .607 left promiscuous mode [ 3440.826260][ T8] device .608 left promiscuous mode [ 3440.883099][ T8] device .609 left promiscuous mode [ 3440.943040][ T8] device .610 left promiscuous mode [ 3441.002880][ T8] device .611 left promiscuous mode [ 3441.043248][ T8] device .612 left promiscuous mode [ 3441.102844][ T8] device .613 left promiscuous mode [ 3441.173163][ T8] device .614 left promiscuous mode [ 3441.232876][ T8] device .615 left promiscuous mode [ 3441.283079][ T8] device .616 left promiscuous mode [ 3441.352950][ T8] device .617 left promiscuous mode [ 3441.423146][ T8] device .618 left promiscuous mode [ 3441.482895][ T8] device .619 left promiscuous mode [ 3441.542958][ T8] device .620 left promiscuous mode [ 3441.602874][ T8] device .621 left promiscuous mode [ 3441.652888][ T8] device .622 left promiscuous mode [ 3441.693162][ T8] device .623 left promiscuous mode [ 3441.754634][ T8] device .624 left promiscuous mode [ 3441.813039][ T8] device .625 left promiscuous mode [ 3441.872754][ T8] device .626 left promiscuous mode [ 3441.933085][ T8] device .627 left promiscuous mode [ 3441.992950][ T8] device .628 left promiscuous mode [ 3442.052967][ T8] device .629 left promiscuous mode [ 3442.122879][ T8] device .630 left promiscuous mode [ 3442.202880][ T8] device .631 left promiscuous mode [ 3442.253084][ T8] device .632 left promiscuous mode [ 3442.324280][ T8] device .633 left promiscuous mode [ 3442.383029][ T8] device .634 left promiscuous mode [ 3442.442899][ T8] device .635 left promiscuous mode [ 3442.483169][ T8] device .636 left promiscuous mode [ 3442.542870][ T8] device .637 left promiscuous mode [ 3442.593149][ T8] device .638 left promiscuous mode [ 3442.652840][ T8] device .639 left promiscuous mode [ 3442.712806][ T8] device .640 left promiscuous mode [ 3442.792806][ T8] device .641 left promiscuous mode [ 3442.852916][ T8] device .642 left promiscuous mode [ 3442.912877][ T8] device .643 left promiscuous mode [ 3442.993001][ T8] device .644 left promiscuous mode [ 3443.062886][ T8] device .645 left promiscuous mode [ 3443.122997][ T8] device .646 left promiscuous mode [ 3443.193021][ T8] device .647 left promiscuous mode [ 3443.262989][ T8] device .648 left promiscuous mode [ 3443.322756][ T8] device .649 left promiscuous mode [ 3443.362943][ T8] device .650 left promiscuous mode [ 3443.422759][ T8] device .651 left promiscuous mode [ 3443.464245][ T8] device .652 left promiscuous mode [ 3443.532935][ T8] device .653 left promiscuous mode [ 3443.602729][ T8] device .654 left promiscuous mode [ 3443.662716][ T8] device .655 left promiscuous mode [ 3443.702855][ T8] device .656 left promiscuous mode [ 3443.782920][ T8] device .657 left promiscuous mode [ 3443.822939][ T8] device .658 left promiscuous mode [ 3443.872880][ T8] device .659 left promiscuous mode [ 3443.924589][ T8] device .660 left promiscuous mode [ 3443.973028][ T8] device .661 left promiscuous mode [ 3444.023244][ T8] device .662 left promiscuous mode [ 3444.072794][ T8] device .663 left promiscuous mode [ 3444.132698][ T8] device .664 left promiscuous mode [ 3444.192697][ T8] device .665 left promiscuous mode [ 3444.262688][ T8] device .666 left promiscuous mode [ 3444.332863][ T8] device .667 left promiscuous mode [ 3444.392665][ T8] device .668 left promiscuous mode [ 3444.462892][ T8] device .669 left promiscuous mode [ 3444.502780][ T8] device .670 left promiscuous mode [ 3444.552979][ T8] device .671 left promiscuous mode [ 3444.602823][ T8] device .672 left promiscuous mode [ 3444.672751][ T8] device .673 left promiscuous mode [ 3444.732806][ T8] device .674 left promiscuous mode [ 3444.793937][ T8] device .675 left promiscuous mode [ 3444.862784][ T8] device .676 left promiscuous mode [ 3444.922747][ T8] device .677 left promiscuous mode [ 3444.982938][ T8] device .678 left promiscuous mode [ 3445.042683][ T8] device .679 left promiscuous mode [ 3445.102848][ T8] device .680 left promiscuous mode [ 3445.172919][ T8] device .681 left promiscuous mode [ 3445.232515][ T8] device .682 left promiscuous mode [ 3445.272671][ T8] device .683 left promiscuous mode [ 3445.322537][ T8] device .684 left promiscuous mode [ 3445.362686][ T8] device .685 left promiscuous mode [ 3445.412614][ T8] device .686 left promiscuous mode [ 3445.472684][ T8] device .687 left promiscuous mode [ 3445.512631][ T8] device .688 left promiscuous mode [ 3445.562693][ T8] device .689 left promiscuous mode [ 3445.622762][ T8] device .690 left promiscuous mode [ 3445.692929][ T8] device .691 left promiscuous mode [ 3445.722897][ T8] device .692 left promiscuous mode [ 3445.792628][ T8] device .693 left promiscuous mode [ 3445.834154][ T8] device .694 left promiscuous mode [ 3445.892621][ T8] device .695 left promiscuous mode [ 3445.942868][ T8] device .696 left promiscuous mode [ 3445.992930][ T8] device .697 left promiscuous mode [ 3446.043941][ T8] device .698 left promiscuous mode [ 3446.112592][ T8] device .699 left promiscuous mode [ 3446.162757][ T8] device .700 left promiscuous mode [ 3446.232488][ T8] device .701 left promiscuous mode [ 3446.292541][ T8] device .702 left promiscuous mode [ 3446.332840][ T8] device .703 left promiscuous mode [ 3446.383870][ T8] device .704 left promiscuous mode [ 3446.452558][ T8] device .705 left promiscuous mode [ 3446.512646][ T8] device .706 left promiscuous mode [ 3446.572682][ T8] device .707 left promiscuous mode [ 3446.612642][ T8] device .708 left promiscuous mode [ 3446.653225][ T8] device .709 left promiscuous mode [ 3446.714173][ T8] device .710 left promiscuous mode [ 3446.772525][ T8] device .711 left promiscuous mode [ 3446.842577][ T8] device .712 left promiscuous mode [ 3446.912706][ T8] device .713 left promiscuous mode [ 3446.982817][ T8] device .714 left promiscuous mode [ 3447.022687][ T8] device .715 left promiscuous mode [ 3447.062694][ T8] device .716 left promiscuous mode [ 3447.112595][ T8] device .717 left promiscuous mode [ 3447.172522][ T8] device .718 left promiscuous mode [ 3447.212654][ T8] device .719 left promiscuous mode [ 3447.282579][ T8] device .720 left promiscuous mode [ 3447.332753][ T8] device .721 left promiscuous mode [ 3447.382944][ T8] device .722 left promiscuous mode [ 3447.452983][ T8] device .723 left promiscuous mode [ 3447.502770][ T8] device .724 left promiscuous mode [ 3447.562515][ T8] device .725 left promiscuous mode [ 3447.602804][ T8] device .726 left promiscuous mode [ 3447.662433][ T8] device .727 left promiscuous mode [ 3447.722647][ T8] device .728 left promiscuous mode [ 3447.792806][ T8] device .729 left promiscuous mode [ 3447.852512][ T8] device .730 left promiscuous mode [ 3447.912455][ T8] device .731 left promiscuous mode [ 3447.952523][ T8] device .732 left promiscuous mode [ 3448.002726][ T8] device .733 left promiscuous mode [ 3448.052481][ T8] device .734 left promiscuous mode [ 3448.092694][ T8] device .735 left promiscuous mode [ 3448.132804][ T8] device .736 left promiscuous mode [ 3448.182650][ T8] device .737 left promiscuous mode [ 3448.252584][ T8] device .738 left promiscuous mode [ 3448.312451][ T8] device .739 left promiscuous mode [ 3448.382481][ T8] device .740 left promiscuous mode [ 3448.452456][ T8] device .741 left promiscuous mode [ 3448.522382][ T8] device .742 left promiscuous mode [ 3448.562460][ T8] device .743 left promiscuous mode [ 3448.602990][ T8] device .744 left promiscuous mode [ 3448.642675][ T8] device .745 left promiscuous mode [ 3448.722592][ T8] device .746 left promiscuous mode [ 3448.792376][ T8] device .747 left promiscuous mode [ 3448.862418][ T8] device .748 left promiscuous mode [ 3448.922352][ T8] device .749 left promiscuous mode [ 3448.962649][ T8] device .750 left promiscuous mode [ 3449.012483][ T8] device .751 left promiscuous mode [ 3449.052680][ T8] device .752 left promiscuous mode [ 3449.122490][ T8] device .753 left promiscuous mode [ 3449.192380][ T8] device .754 left promiscuous mode [ 3449.252325][ T8] device .755 left promiscuous mode [ 3449.312481][ T8] device .756 left promiscuous mode [ 3449.392344][ T8] device .757 left promiscuous mode [ 3449.442551][ T8] device .758 left promiscuous mode [ 3449.482682][ T8] device .759 left promiscuous mode [ 3449.542230][ T8] device .760 left promiscuous mode [ 3449.582407][ T8] device .761 left promiscuous mode [ 3449.632243][ T8] device .762 left promiscuous mode [ 3449.692401][ T8] device .763 left promiscuous mode [ 3449.762461][ T8] device .764 left promiscuous mode [ 3449.832429][ T8] device .765 left promiscuous mode [ 3449.892585][ T8] device .766 left promiscuous mode [ 3449.952306][ T8] device .767 left promiscuous mode [ 3450.022274][ T8] device .768 left promiscuous mode [ 3450.094208][ T8] device .769 left promiscuous mode [ 3450.152424][ T8] device .770 left promiscuous mode [ 3450.212513][ T8] device .771 left promiscuous mode [ 3450.283589][ T8] device .772 left promiscuous mode [ 3450.352281][ T8] device .773 left promiscuous mode [ 3450.422565][ T8] device .774 left promiscuous mode [ 3450.472422][ T8] device .775 left promiscuous mode [ 3450.512297][ T8] device .776 left promiscuous mode [ 3450.562808][ T8] device .777 left promiscuous mode [ 3450.622635][ T8] device .778 left promiscuous mode [ 3450.673901][ T8] device .779 left promiscuous mode [ 3450.732325][ T8] device .780 left promiscuous mode [ 3450.802276][ T8] device .781 left promiscuous mode [ 3450.862268][ T8] device .782 left promiscuous mode [ 3450.922129][ T8] device .783 left promiscuous mode [ 3450.992310][ T8] device .784 left promiscuous mode [ 3451.061971][ T8] device .785 left promiscuous mode [ 3451.122305][ T8] device .786 left promiscuous mode [ 3451.192292][ T8] device .787 left promiscuous mode [ 3451.262248][ T8] device .788 left promiscuous mode [ 3451.332163][ T8] device .789 left promiscuous mode [ 3451.414985][ T8] device .790 left promiscuous mode [ 3451.482209][ T8] device .791 left promiscuous mode [ 3451.523667][ T8] device .792 left promiscuous mode [ 3451.582248][ T8] device .793 left promiscuous mode [ 3451.652048][ T8] device .794 left promiscuous mode [ 3451.693246][ T8] device .795 left promiscuous mode [ 3451.752236][ T8] device .796 left promiscuous mode [ 3451.812208][ T8] device .797 left promiscuous mode [ 3451.852723][ T8] device .798 left promiscuous mode [ 3451.912258][ T8] device .799 left promiscuous mode [ 3451.982179][ T8] device .800 left promiscuous mode [ 3452.052216][ T8] device .801 left promiscuous mode [ 3452.112202][ T8] device .802 left promiscuous mode [ 3452.182225][ T8] device .803 left promiscuous mode [ 3452.252076][ T8] device .804 left promiscuous mode [ 3452.322113][ T8] device .805 left promiscuous mode [ 3452.362121][ T8] device .806 left promiscuous mode [ 3452.412721][ T8] device .807 left promiscuous mode [ 3452.462592][ T8] device .808 left promiscuous mode [ 3452.532149][ T8] device .809 left promiscuous mode [ 3452.582173][ T8] device .810 left promiscuous mode [ 3452.632388][ T8] device .811 left promiscuous mode [ 3452.682251][ T8] device .812 left promiscuous mode [ 3452.752101][ T8] device .813 left promiscuous mode [ 3452.812118][ T8] device .814 left promiscuous mode [ 3452.852377][ T8] device .815 left promiscuous mode [ 3452.911993][ T8] device .816 left promiscuous mode [ 3452.952241][ T8] device .817 left promiscuous mode [ 3452.992513][ T8] device .818 left promiscuous mode [ 3453.042303][ T8] device .819 left promiscuous mode [ 3453.112378][ T8] device .820 left promiscuous mode [ 3453.152213][ T8] device .821 left promiscuous mode [ 3453.192442][ T8] device .822 left promiscuous mode [ 3453.262020][ T8] device .823 left promiscuous mode [ 3453.331996][ T8] device .824 left promiscuous mode [ 3453.392046][ T8] device .825 left promiscuous mode [ 3453.432169][ T8] device .826 left promiscuous mode [ 3453.472162][ T8] device .827 left promiscuous mode [ 3453.512287][ T8] device .828 left promiscuous mode [ 3453.562121][ T8] device .829 left promiscuous mode [ 3453.622001][ T8] device .830 left promiscuous mode [ 3453.691887][ T8] device .831 left promiscuous mode [ 3453.762008][ T8] device .832 left promiscuous mode [ 3453.802265][ T8] device .833 left promiscuous mode [ 3453.873846][ T8] device .834 left promiscuous mode [ 3453.942769][ T8] device .835 left promiscuous mode [ 3454.001952][ T8] device .836 left promiscuous mode [ 3454.062053][ T8] device .837 left promiscuous mode [ 3454.121895][ T8] device .838 left promiscuous mode [ 3454.192058][ T8] device .839 left promiscuous mode [ 3454.272245][ T8] device .840 left promiscuous mode [ 3454.314148][ T8] device .841 left promiscuous mode [ 3454.362174][ T8] device .842 left promiscuous mode [ 3454.425624][ T8] device .843 left promiscuous mode [ 3454.492160][ T8] device .844 left promiscuous mode [ 3454.534599][ T8] device .845 left promiscuous mode [ 3454.601950][ T8] device .846 left promiscuous mode [ 3454.671893][ T8] device .847 left promiscuous mode [ 3454.732059][ T8] device .848 left promiscuous mode [ 3454.791967][ T8] device .849 left promiscuous mode [ 3454.863614][ T8] device .850 left promiscuous mode [ 3454.931993][ T8] device .851 left promiscuous mode [ 3455.001889][ T8] device .852 left promiscuous mode [ 3455.061800][ T8] device .853 left promiscuous mode [ 3455.102150][ T8] device .854 left promiscuous mode [ 3455.171972][ T8] device .855 left promiscuous mode [ 3455.212204][ T8] device .856 left promiscuous mode [ 3455.281940][ T8] device .857 left promiscuous mode [ 3455.341768][ T8] device .858 left promiscuous mode [ 3455.412086][ T8] device .859 left promiscuous mode [ 3455.471904][ T8] device .860 left promiscuous mode [ 3455.523848][ T8] device .861 left promiscuous mode [ 3455.612313][ T8] device .862 left promiscuous mode [ 3455.671785][ T8] device .863 left promiscuous mode [ 3455.712358][ T8] device .864 left promiscuous mode [ 3455.762075][ T8] device .865 left promiscuous mode [ 3455.802055][ T8] device .866 left promiscuous mode [ 3455.851812][ T8] device .867 left promiscuous mode [ 3455.913366][ T8] device .868 left promiscuous mode [ 3455.962557][ T8] device .869 left promiscuous mode [ 3456.022120][ T8] device .870 left promiscuous mode [ 3456.062396][ T8] device .871 left promiscuous mode [ 3456.121940][ T8] device .872 left promiscuous mode [ 3456.182935][ T8] device .873 left promiscuous mode [ 3456.241893][ T8] device .874 left promiscuous mode [ 3456.301772][ T8] device .875 left promiscuous mode [ 3456.342416][ T8] device .876 left promiscuous mode [ 3456.401828][ T8] device .877 left promiscuous mode [ 3456.441980][ T8] device .878 left promiscuous mode [ 3456.482166][ T8] device .879 left promiscuous mode [ 3456.522332][ T8] device .880 left promiscuous mode [ 3456.581852][ T8] device .881 left promiscuous mode [ 3456.641972][ T8] device .882 left promiscuous mode [ 3456.701760][ T8] device .883 left promiscuous mode [ 3456.761827][ T8] device .884 left promiscuous mode [ 3456.834287][ T8] device .885 left promiscuous mode [ 3456.901936][ T8] device .886 left promiscuous mode [ 3456.972021][ T8] device .887 left promiscuous mode [ 3457.031811][ T8] device .888 left promiscuous mode [ 3457.071939][ T8] device .889 left promiscuous mode [ 3457.122124][ T8] device .890 left promiscuous mode [ 3457.173995][ T8] device .891 left promiscuous mode [ 3457.231670][ T8] device .892 left promiscuous mode [ 3457.272458][ T8] device .893 left promiscuous mode [ 3457.341679][ T8] device .894 left promiscuous mode [ 3457.401881][ T8] device .895 left promiscuous mode [ 3457.452345][ T8] device .896 left promiscuous mode [ 3457.522097][ T8] device .897 left promiscuous mode [ 3457.582150][ T8] device .898 left promiscuous mode [ 3457.644255][ T8] device .899 left promiscuous mode [ 3457.702095][ T8] device .900 left promiscuous mode [ 3457.781772][ T8] device .901 left promiscuous mode [ 3457.841733][ T8] device .902 left promiscuous mode [ 3457.901771][ T8] device .903 left promiscuous mode [ 3457.963288][ T8] device .904 left promiscuous mode [ 3458.021732][ T8] device .905 left promiscuous mode [ 3458.091653][ T8] device .906 left promiscuous mode [ 3458.171706][ T8] device .907 left promiscuous mode [ 3458.232838][ T8] device .908 left promiscuous mode [ 3458.291692][ T8] device .909 left promiscuous mode [ 3458.334572][ T8] device .910 left promiscuous mode [ 3458.382004][ T8] device .911 left promiscuous mode [ 3458.441630][ T8] device .912 left promiscuous mode [ 3458.481847][ T8] device .913 left promiscuous mode [ 3458.541782][ T8] device .914 left promiscuous mode [ 3458.603374][ T8] device .915 left promiscuous mode [ 3458.671660][ T8] device .916 left promiscuous mode [ 3458.731553][ T8] device .917 left promiscuous mode [ 3458.771728][ T8] device .918 left promiscuous mode [ 3458.811996][ T8] device .919 left promiscuous mode [ 3458.871884][ T8] device .920 left promiscuous mode [ 3458.912172][ T8] device .921 left promiscuous mode [ 3458.981800][ T8] device .922 left promiscuous mode [ 3459.031750][ T8] device .923 left promiscuous mode [ 3459.091746][ T8] device .924 left promiscuous mode [ 3459.152132][ T8] device .925 left promiscuous mode [ 3459.191686][ T8] device .926 left promiscuous mode [ 3459.261644][ T8] device .927 left promiscuous mode [ 3459.341635][ T8] device .928 left promiscuous mode [ 3459.411627][ T8] device .929 left promiscuous mode [ 3459.471611][ T8] device .930 left promiscuous mode [ 3459.521751][ T8] device .931 left promiscuous mode [ 3459.581689][ T8] device .932 left promiscuous mode [ 3459.651659][ T8] device .933 left promiscuous mode [ 3459.711530][ T8] device .934 left promiscuous mode [ 3459.775260][ T8] device .935 left promiscuous mode [ 3459.833329][ T8] device .936 left promiscuous mode [ 3459.891650][ T8] device .937 left promiscuous mode [ 3459.943488][ T8] device .938 left promiscuous mode [ 3460.014395][ T8] device .939 left promiscuous mode [ 3460.071495][ T8] device .940 left promiscuous mode [ 3460.111657][ T8] device .941 left promiscuous mode [ 3460.171481][ T8] device .942 left promiscuous mode [ 3460.231482][ T8] device .943 left promiscuous mode [ 3460.301592][ T8] device .944 left promiscuous mode [ 3460.371601][ T8] device .945 left promiscuous mode [ 3460.431470][ T8] device .946 left promiscuous mode [ 3460.491664][ T8] device .947 left promiscuous mode [ 3460.551700][ T8] device .948 left promiscuous mode [ 3460.611433][ T8] device .949 left promiscuous mode [ 3460.671579][ T8] device .950 left promiscuous mode [ 3460.741498][ T8] device .951 left promiscuous mode [ 3460.802833][ T8] device .952 left promiscuous mode [ 3460.861538][ T8] device .953 left promiscuous mode [ 3460.911679][ T8] device .954 left promiscuous mode [ 3460.951586][ T8] device .955 left promiscuous mode [ 3461.021542][ T8] device .956 left promiscuous mode [ 3461.081503][ T8] device .957 left promiscuous mode [ 3461.141464][ T8] device .958 left promiscuous mode [ 3461.181513][ T8] device .959 left promiscuous mode [ 3461.251591][ T8] device .960 left promiscuous mode [ 3461.321471][ T8] device .961 left promiscuous mode [ 3461.381438][ T8] device .962 left promiscuous mode [ 3461.441714][ T8] device .963 left promiscuous mode [ 3461.491365][ T8] device .964 left promiscuous mode [ 3461.561550][ T8] device .965 left promiscuous mode [ 3461.621474][ T8] device .966 left promiscuous mode [ 3461.691445][ T8] device .967 left promiscuous mode [ 3461.751474][ T8] device .968 left promiscuous mode [ 3461.812561][ T8] device .969 left promiscuous mode [ 3461.871375][ T8] device .970 left promiscuous mode [ 3461.941616][ T8] device .971 left promiscuous mode [ 3462.001443][ T8] device .972 left promiscuous mode [ 3462.051672][ T8] device .973 left promiscuous mode [ 3462.111341][ T8] device .974 left promiscuous mode [ 3462.161568][ T8] device .975 left promiscuous mode [ 3462.201886][ T8] device .976 left promiscuous mode [ 3462.263119][ T8] device .977 left promiscuous mode [ 3462.331611][ T8] device .978 left promiscuous mode [ 3462.391528][ T8] device .979 left promiscuous mode [ 3462.461368][ T8] device .980 left promiscuous mode [ 3462.531477][ T8] device .981 left promiscuous mode [ 3462.591296][ T8] device .982 left promiscuous mode [ 3462.651362][ T8] device .983 left promiscuous mode [ 3462.721319][ T8] device .984 left promiscuous mode [ 3462.781628][ T8] device .985 left promiscuous mode [ 3462.841244][ T8] device .986 left promiscuous mode [ 3462.911284][ T8] device .987 left promiscuous mode [ 3462.961605][ T8] device .988 left promiscuous mode [ 3463.021294][ T8] device .989 left promiscuous mode [ 3463.091422][ T8] device .990 left promiscuous mode [ 3463.131603][ T8] device .991 left promiscuous mode [ 3463.183860][ T8] device .992 left promiscuous mode [ 3463.262727][ T8] device .993 left promiscuous mode [ 3463.322391][ T8] device .994 left promiscuous mode [ 3463.381368][ T8] device .995 left promiscuous mode [ 3463.471449][ T8] device .996 left promiscuous mode [ 3463.531716][ T8] device .997 left promiscuous mode [ 3463.601700][ T8] device .998 left promiscuous mode [ 3463.681616][ T8] device .999 left promiscuous mode [ 3463.741187][ T8] device .1000 left promiscuous mode [ 3463.812699][ T8] device .1001 left promiscuous mode [ 3463.871224][ T8] device .1002 left promiscuous mode [ 3463.931756][ T8] device .1003 left promiscuous mode [ 3463.992674][ T8] device .1004 left promiscuous mode [ 3464.061372][ T8] device .1005 left promiscuous mode [ 3464.121324][ T8] device .1006 left promiscuous mode [ 3464.191228][ T8] device .1007 left promiscuous mode [ 3464.251508][ T8] device .1008 left promiscuous mode [ 3464.311474][ T8] device .1009 left promiscuous mode [ 3464.381219][ T8] device .1010 left promiscuous mode [ 3464.441283][ T8] device .1011 left promiscuous mode [ 3464.501593][ T8] device .1012 left promiscuous mode [ 3464.561373][ T8] device .1013 left promiscuous mode [ 3464.631435][ T8] device .1014 left promiscuous mode [ 3464.691284][ T8] device .1015 left promiscuous mode [ 3464.751136][ T8] device .1016 left promiscuous mode [ 3464.791714][ T8] device .1017 left promiscuous mode [ 3464.851130][ T8] device .1018 left promiscuous mode [ 3464.911252][ T8] device .1019 left promiscuous mode [ 3464.961057][ T8] device .1020 left promiscuous mode [ 3465.001398][ T8] device .1021 left promiscuous mode [ 3465.071235][ T8] device .1022 left promiscuous mode [ 3465.112054][ T8] device .1023 left promiscuous mode [ 3465.171100][ T8] device .1024 left promiscuous mode [ 3465.231109][ T8] device .1025 left promiscuous mode [ 3465.281297][ T8] device .1026 left promiscuous mode [ 3465.351459][ T8] device .1027 left promiscuous mode [ 3465.411197][ T8] device .1028 left promiscuous mode [ 3465.471032][ T8] device .1029 left promiscuous mode [ 3465.511359][ T8] device .1030 left promiscuous mode [ 3465.581080][ T8] device .1031 left promiscuous mode [ 3465.631207][ T8] device .1032 left promiscuous mode [ 3465.691273][ T8] device .1033 left promiscuous mode [ 3465.761165][ T8] device .1034 left promiscuous mode [ 3465.841179][ T8] device .1035 left promiscuous mode [ 3465.881145][ T8] device .1036 left promiscuous mode [ 3465.921480][ T8] device .1037 left promiscuous mode [ 3465.971356][ T8] device .1038 left promiscuous mode [ 3466.031500][ T8] device .1039 left promiscuous mode [ 3466.071276][ T8] device .1040 left promiscuous mode [ 3466.131134][ T8] device .1041 left promiscuous mode [ 3466.191048][ T8] device .1042 left promiscuous mode [ 3466.251065][ T8] device .1043 left promiscuous mode [ 3466.321123][ T8] device .1044 left promiscuous mode [ 3466.361408][ T8] device .1045 left promiscuous mode [ 3466.415397][ T8] device .1046 left promiscuous mode [ 3466.471069][ T8] device .1047 left promiscuous mode [ 3466.541723][ T8] device .1048 left promiscuous mode [ 3466.611057][ T8] device .1049 left promiscuous mode [ 3466.670915][ T8] device .1050 left promiscuous mode [ 3466.741209][ T8] device .1051 left promiscuous mode [ 3466.801178][ T8] device .1052 left promiscuous mode [ 3466.863753][ T8] device .1053 left promiscuous mode [ 3466.921324][ T8] device .1054 left promiscuous mode [ 3466.961340][ T8] device .1055 left promiscuous mode [ 3467.021334][ T8] device .1056 left promiscuous mode [ 3467.091051][ T8] device .1057 left promiscuous mode [ 3467.151184][ T8] device .1058 left promiscuous mode [ 3467.191232][ T8] device .1059 left promiscuous mode [ 3467.251127][ T8] device .1060 left promiscuous mode [ 3467.312801][ T8] device .1061 left promiscuous mode [ 3467.371143][ T8] device .1062 left promiscuous mode [ 3467.430951][ T8] device .1063 left promiscuous mode [ 3467.471162][ T8] device .1064 left promiscuous mode [ 3467.511552][ T8] device .1065 left promiscuous mode [ 3467.561116][ T8] device .1066 left promiscuous mode [ 3467.621131][ T8] device .1067 left promiscuous mode [ 3467.681010][ T8] device .1068 left promiscuous mode [ 3467.751049][ T8] device .1069 left promiscuous mode [ 3467.810872][ T8] device .1070 left promiscuous mode [ 3467.851337][ T8] device .1071 left promiscuous mode [ 3467.921026][ T8] device .1072 left promiscuous mode [ 3467.991025][ T8] device .1073 left promiscuous mode [ 3468.031279][ T8] device .1074 left promiscuous mode [ 3468.081330][ T8] device .1075 left promiscuous mode [ 3468.141051][ T8] device .1076 left promiscuous mode [ 3468.191044][ T8] device .1077 left promiscuous mode [ 3468.232753][ T8] device .1078 left promiscuous mode [ 3468.281139][ T8] device .1079 left promiscuous mode [ 3468.321002][ T8] device .1080 left promiscuous mode [ 3468.380857][ T8] device .1081 left promiscuous mode [ 3468.440958][ T8] device .1082 left promiscuous mode [ 3468.501261][ T8] device .1083 left promiscuous mode [ 3468.571274][ T8] device .1084 left promiscuous mode [ 3468.631066][ T8] device .1085 left promiscuous mode [ 3468.681358][ T8] device .1086 left promiscuous mode [ 3468.742609][ T8] device .1087 left promiscuous mode [ 3468.800924][ T8] device .1088 left promiscuous mode [ 3468.860824][ T8] device .1089 left promiscuous mode [ 3468.911130][ T8] device .1090 left promiscuous mode [ 3468.971019][ T8] device .1091 left promiscuous mode [ 3469.040832][ T8] device .1092 left promiscuous mode [ 3469.081132][ T8] device .1093 left promiscuous mode [ 3469.121141][ T8] device .1094 left promiscuous mode [ 3469.161471][ T8] device .1095 left promiscuous mode [ 3469.231127][ T8] device .1096 left promiscuous mode [ 3469.291004][ T8] device .1097 left promiscuous mode [ 3469.360927][ T8] device .1098 left promiscuous mode [ 3469.400941][ T8] device .1099 left promiscuous mode [ 3469.471080][ T8] device .1100 left promiscuous mode [ 3469.541218][ T8] device .1101 left promiscuous mode [ 3469.600880][ T8] device .1102 left promiscuous mode [ 3469.661018][ T8] device .1103 left promiscuous mode [ 3469.730767][ T8] device .1104 left promiscuous mode [ 3469.800763][ T8] device .1105 left promiscuous mode [ 3469.842377][ T8] device .1106 left promiscuous mode [ 3469.910748][ T8] device .1107 left promiscuous mode [ 3469.960886][ T8] device .1108 left promiscuous mode [ 3470.030885][ T8] device .1109 left promiscuous mode [ 3470.090815][ T8] device .1110 left promiscuous mode [ 3470.151014][ T8] device .1111 left promiscuous mode [ 3470.191041][ T8] device .1112 left promiscuous mode [ 3470.250996][ T8] device .1113 left promiscuous mode [ 3470.300824][ T8] device .1114 left promiscuous mode [ 3470.360718][ T8] device .1115 left promiscuous mode [ 3470.432031][ T8] device .1116 left promiscuous mode [ 3470.491007][ T8] device .1117 left promiscuous mode [ 3470.550882][ T8] device .1118 left promiscuous mode [ 3470.600997][ T8] device .1119 left promiscuous mode [ 3470.660707][ T8] device .1120 left promiscuous mode [ 3470.700909][ T8] device .1121 left promiscuous mode [ 3470.750909][ T8] device .1122 left promiscuous mode [ 3470.802222][ T8] device .1123 left promiscuous mode [ 3470.860964][ T8] device .1124 left promiscuous mode [ 3470.940835][ T8] device .1125 left promiscuous mode [ 3470.991008][ T8] device .1126 left promiscuous mode [ 3471.050695][ T8] device .1127 left promiscuous mode [ 3471.100979][ T8] device .1128 left promiscuous mode [ 3471.160803][ T8] device .1129 left promiscuous mode [ 3471.201082][ T8] device .1130 left promiscuous mode [ 3471.243845][ T8] device .1131 left promiscuous mode [ 3471.300747][ T8] device .1132 left promiscuous mode [ 3471.363955][ T8] device .1133 left promiscuous mode [ 3471.420827][ T8] device .1134 left promiscuous mode [ 3471.481017][ T8] device .1135 left promiscuous mode [ 3471.550724][ T8] device .1136 left promiscuous mode [ 3471.610748][ T8] device .1137 left promiscuous mode [ 3471.670650][ T8] device .1138 left promiscuous mode [ 3471.730591][ T8] device .1139 left promiscuous mode [ 3471.790834][ T8] device .1140 left promiscuous mode [ 3471.841063][ T8] device .1141 left promiscuous mode [ 3471.900708][ T8] device .1142 left promiscuous mode [ 3471.960721][ T8] device .1143 left promiscuous mode [ 3472.030762][ T8] device .1144 left promiscuous mode [ 3472.090870][ T8] device .1145 left promiscuous mode [ 3472.140938][ T8] device .1146 left promiscuous mode [ 3472.200585][ T8] device .1147 left promiscuous mode [ 3472.240809][ T8] device .1148 left promiscuous mode [ 3472.290962][ T8] device .1149 left promiscuous mode [ 3472.340898][ T8] device .1150 left promiscuous mode [ 3472.400769][ T8] device .1151 left promiscuous mode [ 3472.480623][ T8] device .1152 left promiscuous mode [ 3472.550795][ T8] device .1153 left promiscuous mode [ 3472.610611][ T8] device .1154 left promiscuous mode [ 3472.670567][ T8] device .1155 left promiscuous mode [ 3472.712946][ T8] device .1156 left promiscuous mode [ 3472.770702][ T8] device .1157 left promiscuous mode [ 3472.830594][ T8] device .1158 left promiscuous mode [ 3472.895602][ T8] device .1159 left promiscuous mode [ 3472.951304][ T8] device .1160 left promiscuous mode [ 3473.020606][ T8] device .1161 left promiscuous mode [ 3473.081128][ T8] device .1162 left promiscuous mode [ 3473.140512][ T8] device .1163 left promiscuous mode [ 3473.211232][ T8] device .1164 left promiscuous mode [ 3473.280515][ T8] device .1165 left promiscuous mode [ 3473.341139][ T8] device .1166 left promiscuous mode [ 3473.380876][ T8] device .1167 left promiscuous mode [ 3473.430902][ T8] device .1168 left promiscuous mode [ 3473.490869][ T8] device .1169 left promiscuous mode [ 3473.540645][ T8] device .1170 left promiscuous mode [ 3473.591007][ T8] device .1171 left promiscuous mode [ 3473.640941][ T8] device .1172 left promiscuous mode [ 3473.690655][ T8] device .1173 left promiscuous mode [ 3473.760604][ T8] device .1174 left promiscuous mode [ 3473.800660][ T8] device .1175 left promiscuous mode [ 3473.860622][ T8] device .1176 left promiscuous mode [ 3473.920542][ T8] device .1177 left promiscuous mode [ 3473.980542][ T8] device .1178 left promiscuous mode [ 3474.040445][ T8] device .1179 left promiscuous mode [ 3474.100726][ T8] device .1180 left promiscuous mode [ 3474.160402][ T8] device .1181 left promiscuous mode [ 3474.210624][ T8] device .1182 left promiscuous mode [ 3474.270446][ T8] device .1183 left promiscuous mode [ 3474.350366][ T8] device .1184 left promiscuous mode [ 3474.400570][ T8] device .1185 left promiscuous mode [ 3474.460406][ T8] device .1186 left promiscuous mode [ 3474.520447][ T8] device .1187 left promiscuous mode [ 3474.570612][ T8] device .1188 left promiscuous mode [ 3474.620628][ T8] device .1189 left promiscuous mode [ 3474.660602][ T8] device .1190 left promiscuous mode [ 3474.720694][ T8] device .1191 left promiscuous mode [ 3474.790457][ T8] device .1192 left promiscuous mode [ 3474.850525][ T8] device .1193 left promiscuous mode [ 3474.890534][ T8] device .1194 left promiscuous mode [ 3474.950680][ T8] device .1195 left promiscuous mode [ 3474.990723][ T8] device .1196 left promiscuous mode [ 3475.070534][ T8] device .1197 left promiscuous mode [ 3475.140379][ T8] device .1198 left promiscuous mode [ 3475.200365][ T8] device .1199 left promiscuous mode [ 3475.260898][ T8] device .1200 left promiscuous mode [ 3475.340398][ T8] device .1201 left promiscuous mode [ 3475.402057][ T8] device .1202 left promiscuous mode [ 3475.470538][ T8] device .1203 left promiscuous mode [ 3475.530322][ T8] device .1204 left promiscuous mode [ 3475.590333][ T8] device .1205 left promiscuous mode [ 3475.640636][ T8] device .1206 left promiscuous mode [ 3475.682704][ T8] device .1207 left promiscuous mode [ 3475.742090][ T8] device .1208 left promiscuous mode [ 3475.810634][ T8] device .1209 left promiscuous mode [ 3475.852539][ T8] device .1210 left promiscuous mode [ 3475.910938][ T8] device .1211 left promiscuous mode [ 3475.970429][ T8] device .1212 left promiscuous mode [ 3476.040457][ T8] device .1213 left promiscuous mode [ 3476.100362][ T8] device .1214 left promiscuous mode [ 3476.150536][ T8] device .1215 left promiscuous mode [ 3476.210578][ T8] device .1216 left promiscuous mode [ 3476.270296][ T8] device .1217 left promiscuous mode [ 3476.320596][ T8] device .1218 left promiscuous mode [ 3476.370593][ T8] device .1219 left promiscuous mode [ 3476.420571][ T8] device .1220 left promiscuous mode [ 3476.480283][ T8] device .1221 left promiscuous mode [ 3476.540292][ T8] device .1222 left promiscuous mode [ 3476.580469][ T8] device .1223 left promiscuous mode [ 3476.640355][ T8] device .1224 left promiscuous mode [ 3476.690576][ T8] device .1225 left promiscuous mode [ 3476.760452][ T8] device .1226 left promiscuous mode [ 3476.830497][ T8] device .1227 left promiscuous mode [ 3476.890406][ T8] device .1228 left promiscuous mode [ 3476.950345][ T8] device .1229 left promiscuous mode [ 3476.990578][ T8] device .1230 left promiscuous mode [ 3477.050571][ T8] device .1231 left promiscuous mode [ 3477.110386][ T8] device .1232 left promiscuous mode [ 3477.170198][ T8] device .1233 left promiscuous mode [ 3477.210940][ T8] device .1234 left promiscuous mode [ 3477.270202][ T8] device .1235 left promiscuous mode [ 3477.330238][ T8] device .1236 left promiscuous mode [ 3477.370311][ T8] device .1237 left promiscuous mode [ 3477.440284][ T8] device .1238 left promiscuous mode [ 3477.502872][ T8] device .1239 left promiscuous mode [ 3477.560446][ T8] device .1240 left promiscuous mode [ 3477.611723][ T8] device .1241 left promiscuous mode [ 3477.670217][ T8] device .1242 left promiscuous mode [ 3477.730245][ T8] device .1243 left promiscuous mode [ 3477.770314][ T8] device .1244 left promiscuous mode [ 3477.820542][ T8] device .1245 left promiscuous mode [ 3477.870486][ T8] device .1246 left promiscuous mode [ 3477.920633][ T8] device .1247 left promiscuous mode [ 3477.980307][ T8] device .1248 left promiscuous mode [ 3478.030474][ T8] device .1249 left promiscuous mode [ 3478.100255][ T8] device .1250 left promiscuous mode [ 3478.160373][ T8] device .1251 left promiscuous mode [ 3478.230329][ T8] device .1252 left promiscuous mode [ 3478.280682][ T8] device .1253 left promiscuous mode [ 3478.350210][ T8] device .1254 left promiscuous mode [ 3478.430263][ T8] device .1255 left promiscuous mode [ 3478.492737][ T8] device .1256 left promiscuous mode [ 3478.560286][ T8] device .1257 left promiscuous mode [ 3478.630145][ T8] device .1258 left promiscuous mode [ 3478.670329][ T8] device .1259 left promiscuous mode [ 3478.750130][ T8] device .1260 left promiscuous mode [ 3478.790293][ T8] device .1261 left promiscuous mode [ 3478.840371][ T8] device .1262 left promiscuous mode [ 3478.890891][ T8] device .1263 left promiscuous mode [ 3478.971534][ T8] device .1264 left promiscuous mode [ 3479.020314][ T8] device .1265 left promiscuous mode [ 3479.080425][ T8] device .1266 left promiscuous mode [ 3479.150199][ T8] device .1267 left promiscuous mode [ 3479.210706][ T8] device .1268 left promiscuous mode [ 3479.270078][ T8] device .1269 left promiscuous mode [ 3479.330070][ T8] device .1270 left promiscuous mode [ 3479.379988][ T8] device .1271 left promiscuous mode [ 3479.440474][ T8] device .1272 left promiscuous mode [ 3479.500046][ T8] device .1273 left promiscuous mode [ 3479.580512][ T8] device .1274 left promiscuous mode [ 3479.640257][ T8] device .1275 left promiscuous mode [ 3479.681644][ T8] device .1276 left promiscuous mode [ 3479.730438][ T8] device .1277 left promiscuous mode [ 3479.801868][ T8] device .1278 left promiscuous mode [ 3479.870090][ T8] device .1279 left promiscuous mode [ 3479.910193][ T8] device .1280 left promiscuous mode [ 3479.970041][ T8] device .1281 left promiscuous mode [ 3480.020238][ T8] device .1282 left promiscuous mode [ 3480.080193][ T8] device .1283 left promiscuous mode [ 3480.130277][ T8] device .1284 left promiscuous mode [ 3480.200240][ T8] device .1285 left promiscuous mode [ 3480.252739][ T8] device .1286 left promiscuous mode [ 3480.320114][ T8] device .1287 left promiscuous mode [ 3480.370043][ T8] device .1288 left promiscuous mode [ 3480.430287][ T8] device .1289 left promiscuous mode [ 3480.470255][ T8] device .1290 left promiscuous mode [ 3480.531230][ T8] device .1291 left promiscuous mode [ 3480.620533][ T8] device .1292 left promiscuous mode [ 3480.679953][ T8] device .1293 left promiscuous mode [ 3480.720121][ T8] device .1294 left promiscuous mode [ 3480.760536][ T8] device .1295 left promiscuous mode [ 3480.810564][ T8] device .1296 left promiscuous mode [ 3480.869956][ T8] device .1297 left promiscuous mode [ 3480.911443][ T8] device .1298 left promiscuous mode [ 3480.980123][ T8] device .1299 left promiscuous mode [ 3481.020241][ T8] device .1300 left promiscuous mode [ 3481.090274][ T8] device .1301 left promiscuous mode [ 3481.149908][ T8] device .1302 left promiscuous mode [ 3481.210252][ T8] device .1303 left promiscuous mode [ 3481.270357][ T8] device .1304 left promiscuous mode [ 3481.329965][ T8] device .1305 left promiscuous mode [ 3481.390005][ T8] device .1306 left promiscuous mode [ 3481.450102][ T8] device .1307 left promiscuous mode [ 3481.510051][ T8] device .1308 left promiscuous mode [ 3481.549948][ T8] device .1309 left promiscuous mode [ 3481.590285][ T8] device .1310 left promiscuous mode [ 3481.640076][ T8] device .1311 left promiscuous mode [ 3481.710005][ T8] device .1312 left promiscuous mode [ 3481.749968][ T8] device .1313 left promiscuous mode [ 3481.829876][ T8] device .1314 left promiscuous mode [ 3481.919923][ T8] device .1315 left promiscuous mode [ 3481.989967][ T8] device .1316 left promiscuous mode [ 3482.049835][ T8] device .1317 left promiscuous mode [ 3482.090130][ T8] device .1318 left promiscuous mode [ 3482.130236][ T8] device .1319 left promiscuous mode [ 3482.201558][ T8] device .1320 left promiscuous mode [ 3482.269980][ T8] device .1321 left promiscuous mode [ 3482.330229][ T8] device .1322 left promiscuous mode [ 3482.399806][ T8] device .1323 left promiscuous mode [ 3482.439901][ T8] device .1324 left promiscuous mode [ 3482.480560][ T8] device .1325 left promiscuous mode [ 3482.529985][ T8] device .1326 left promiscuous mode [ 3482.570206][ T8] device .1327 left promiscuous mode [ 3482.620116][ T8] device .1328 left promiscuous mode [ 3482.679850][ T8] device .1329 left promiscuous mode [ 3482.759917][ T8] device .1330 left promiscuous mode [ 3482.800151][ T8] device .1331 left promiscuous mode [ 3482.850140][ T8] device .1332 left promiscuous mode [ 3482.892169][ T8] device .1333 left promiscuous mode [ 3482.940026][ T8] device .1334 left promiscuous mode [ 3482.991719][ T8] device .1335 left promiscuous mode [ 3483.040112][ T8] device .1336 left promiscuous mode [ 3483.090382][ T8] device .1337 left promiscuous mode [ 3483.140080][ T8] device .1338 left promiscuous mode [ 3483.209823][ T8] device .1339 left promiscuous mode [ 3483.290107][ T8] device .1340 left promiscuous mode [ 3483.362375][ T8] device .1341 left promiscuous mode [ 3483.419909][ T8] device .1342 left promiscuous mode [ 3483.479921][ T8] device .1343 left promiscuous mode [ 3483.550064][ T8] device .1344 left promiscuous mode [ 3483.590305][ T8] device .1345 left promiscuous mode [ 3483.650608][ T8] device .1346 left promiscuous mode [ 3483.690195][ T8] device .1347 left promiscuous mode [ 3483.749687][ T8] device .1348 left promiscuous mode [ 3483.809670][ T8] device .1349 left promiscuous mode [ 3483.849803][ T8] device .1350 left promiscuous mode [ 3483.899932][ T8] device .1351 left promiscuous mode [ 3483.959927][ T8] device .1352 left promiscuous mode [ 3484.020047][ T8] device .1353 left promiscuous mode [ 3484.090325][ T8] device .1354 left promiscuous mode [ 3484.149758][ T8] device .1355 left promiscuous mode [ 3484.209837][ T8] device .1356 left promiscuous mode [ 3484.269729][ T8] device .1357 left promiscuous mode [ 3484.339849][ T8] device .1358 left promiscuous mode [ 3484.409891][ T8] device .1359 left promiscuous mode [ 3484.479948][ T8] device .1360 left promiscuous mode [ 3484.549768][ T8] device .1361 left promiscuous mode [ 3484.609815][ T8] device .1362 left promiscuous mode [ 3484.659826][ T8] device .1363 left promiscuous mode [ 3484.719613][ T8] device .1364 left promiscuous mode [ 3484.760016][ T8] device .1365 left promiscuous mode [ 3484.820326][ T8] device .1366 left promiscuous mode [ 3484.879849][ T8] device .1367 left promiscuous mode [ 3484.939583][ T8] device .1368 left promiscuous mode [ 3484.979728][ T8] device .1369 left promiscuous mode [ 3485.019871][ T8] device .1370 left promiscuous mode [ 3485.059854][ T8] device .1371 left promiscuous mode [ 3485.109973][ T8] device .1372 left promiscuous mode [ 3485.149851][ T8] device .1373 left promiscuous mode [ 3485.209751][ T8] device .1374 left promiscuous mode [ 3485.269635][ T8] device .1375 left promiscuous mode [ 3485.319827][ T8] device .1376 left promiscuous mode [ 3485.360069][ T8] device .1377 left promiscuous mode [ 3485.410985][ T8] device .1378 left promiscuous mode [ 3485.469632][ T8] device .1379 left promiscuous mode [ 3485.509835][ T8] device .1380 left promiscuous mode [ 3485.579609][ T8] device .1381 left promiscuous mode [ 3485.639514][ T8] device .1382 left promiscuous mode [ 3485.710060][ T8] device .1383 left promiscuous mode [ 3485.749909][ T8] device .1384 left promiscuous mode [ 3485.809589][ T8] device .1385 left promiscuous mode [ 3485.869579][ T8] device .1386 left promiscuous mode [ 3485.929681][ T8] device .1387 left promiscuous mode [ 3485.979874][ T8] device .1388 left promiscuous mode [ 3486.049883][ T8] device .1389 left promiscuous mode [ 3486.109571][ T8] device .1390 left promiscuous mode [ 3486.170042][ T8] device .1391 left promiscuous mode [ 3486.233218][ T8] device .1392 left promiscuous mode [ 3486.289726][ T8] device .1393 left promiscuous mode [ 3486.359563][ T8] device .1394 left promiscuous mode [ 3486.399843][ T8] device .1395 left promiscuous mode [ 3486.459746][ T8] device .1396 left promiscuous mode [ 3486.529683][ T8] device .1397 left promiscuous mode [ 3486.599454][ T8] device .1398 left promiscuous mode [ 3486.669512][ T8] device .1399 left promiscuous mode [ 3486.709786][ T8] device .1400 left promiscuous mode [ 3486.779489][ T8] device .1401 left promiscuous mode [ 3486.819640][ T8] device .1402 left promiscuous mode [ 3486.879430][ T8] device .1403 left promiscuous mode [ 3486.939746][ T8] device .1404 left promiscuous mode [ 3487.009523][ T8] device .1405 left promiscuous mode [ 3487.079582][ T8] device .1406 left promiscuous mode [ 3487.149706][ T8] device .1407 left promiscuous mode [ 3487.189710][ T8] device .1408 left promiscuous mode [ 3487.239695][ T8] device .1409 left promiscuous mode [ 3487.289986][ T8] device .1410 left promiscuous mode [ 3487.339758][ T8] device .1411 left promiscuous mode [ 3487.399558][ T8] device .1412 left promiscuous mode [ 3487.450024][ T8] device .1413 left promiscuous mode [ 3487.529612][ T8] device .1414 left promiscuous mode [ 3487.589810][ T8] device .1415 left promiscuous mode [ 3487.629555][ T8] device .1416 left promiscuous mode [ 3487.690695][ T8] device .1417 left promiscuous mode [ 3487.759434][ T8] device .1418 left promiscuous mode [ 3487.819446][ T8] device .1419 left promiscuous mode [ 3487.879438][ T8] device .1420 left promiscuous mode [ 3487.929980][ T8] device .1421 left promiscuous mode [ 3487.989408][ T8] device .1422 left promiscuous mode [ 3488.029493][ T8] device .1423 left promiscuous mode [ 3488.069635][ T8] device .1424 left promiscuous mode [ 3488.119704][ T8] device .1425 left promiscuous mode [ 3488.179396][ T8] device .1426 left promiscuous mode [ 3488.219535][ T8] device .1427 left promiscuous mode [ 3488.279404][ T8] device .1428 left promiscuous mode [ 3488.349413][ T8] device .1429 left promiscuous mode [ 3488.409528][ T8] device .1430 left promiscuous mode [ 3488.469528][ T8] device .1431 left promiscuous mode [ 3488.529494][ T8] device .1432 left promiscuous mode [ 3488.569713][ T8] device .1433 left promiscuous mode [ 3488.619799][ T8] device .1434 left promiscuous mode [ 3488.669327][ T8] device .1435 left promiscuous mode [ 3488.719713][ T8] device .1436 left promiscuous mode [ 3488.769527][ T8] device .1437 left promiscuous mode [ 3488.829321][ T8] device .1438 left promiscuous mode [ 3488.899533][ T8] device .1439 left promiscuous mode [ 3488.989597][ T8] device .1440 left promiscuous mode [ 3489.029651][ T8] device .1441 left promiscuous mode [ 3489.109402][ T8] device .1442 left promiscuous mode [ 3489.159439][ T8] device .1443 left promiscuous mode [ 3489.201946][ T8] device .1444 left promiscuous mode [ 3489.259532][ T8] device .1445 left promiscuous mode [ 3489.309475][ T8] device .1446 left promiscuous mode [ 3489.369302][ T8] device .1447 left promiscuous mode [ 3489.430597][ T8] device .1448 left promiscuous mode [ 3489.489301][ T8] device .1449 left promiscuous mode [ 3489.539211][ T8] device .1450 left promiscuous mode [ 3489.599646][ T8] device .1451 left promiscuous mode [ 3489.649525][ T8] device .1452 left promiscuous mode [ 3489.700948][ T8] device .1453 left promiscuous mode [ 3489.749460][ T8] device .1454 left promiscuous mode [ 3489.799788][ T8] device .1455 left promiscuous mode [ 3489.879436][ T8] device .1456 left promiscuous mode [ 3489.939274][ T8] device .1457 left promiscuous mode [ 3489.999446][ T8] device .1458 left promiscuous mode [ 3490.059248][ T8] device .1459 left promiscuous mode [ 3490.119460][ T8] device .1460 left promiscuous mode [ 3490.159376][ T8] device .1461 left promiscuous mode [ 3490.199629][ T8] device .1462 left promiscuous mode [ 3490.251455][ T8] device .1463 left promiscuous mode [ 3490.319385][ T8] device .1464 left promiscuous mode [ 3490.379208][ T8] device .1465 left promiscuous mode [ 3490.419303][ T8] device .1466 left promiscuous mode [ 3490.479243][ T8] device .1467 left promiscuous mode [ 3490.539169][ T8] device .1468 left promiscuous mode [ 3490.579406][ T8] device .1469 left promiscuous mode [ 3490.639353][ T8] device .1470 left promiscuous mode [ 3490.700784][ T8] device .1471 left promiscuous mode [ 3490.769305][ T8] device .1472 left promiscuous mode [ 3490.829454][ T8] device .1473 left promiscuous mode [ 3490.899357][ T8] device .1474 left promiscuous mode [ 3490.959233][ T8] device .1475 left promiscuous mode [ 3491.031587][ T8] device .1476 left promiscuous mode [ 3491.089271][ T8] device .1477 left promiscuous mode [ 3491.149202][ T8] device .1478 left promiscuous mode [ 3491.209297][ T8] device .1479 left promiscuous mode [ 3491.279087][ T8] device .1480 left promiscuous mode [ 3491.349383][ T8] device .1481 left promiscuous mode [ 3491.419300][ T8] device .1482 left promiscuous mode [ 3491.489247][ T8] device .1483 left promiscuous mode [ 3491.549209][ T8] device .1484 left promiscuous mode [ 3491.619182][ T8] device .1485 left promiscuous mode [ 3491.669227][ T8] device .1486 left promiscuous mode [ 3491.739133][ T8] device .1487 left promiscuous mode [ 3491.799079][ T8] device .1488 left promiscuous mode [ 3491.839398][ T8] device .1489 left promiscuous mode [ 3491.909144][ T8] device .1490 left promiscuous mode [ 3491.949356][ T8] device .1491 left promiscuous mode [ 3492.019382][ T8] device .1492 left promiscuous mode [ 3492.089513][ T8] device 0 left promiscuous mode [ 3492.151498][ T8] device 0 left promiscuous mode [ 3492.209179][ T8] device 0 left promiscuous mode [ 3492.249566][ T8] device 0 left promiscuous mode [ 3492.330363][ T8] device &0 left promiscuous mode [ 3492.409348][ T8] device &1 left promiscuous mode [ 3492.479183][ T8] device 00 left promiscuous mode [ 3492.549111][ T8] device ;0 left promiscuous mode [ 3492.609169][ T8] device G0 left promiscuous mode [ 3492.649382][ T8] device Z0 left promiscuous mode [ 3492.689388][ T8] device b0 left promiscuous mode [ 3492.739317][ T8] device c0 left promiscuous mode [ 3492.789044][ T8] device c1 left promiscuous mode [ 3492.849038][ T8] device d0 left promiscuous mode [ 3492.889639][ T8] device d1 left promiscuous mode [ 3492.929721][ T8] device e0 left promiscuous mode [ 3492.989042][ T8] device e1 left promiscuous mode [ 3493.049481][ T8] device g0 left promiscuous mode [ 3493.109334][ T8] device h0 left promiscuous mode [ 3493.170597][ T8] device i0 left promiscuous mode [ 3493.229023][ T8] device l0 left promiscuous mode [ 3493.269335][ T8] device l1 left promiscuous mode [ 3493.329047][ T8] device m0 left promiscuous mode [ 3493.389219][ T8] device n0 left promiscuous mode [ 3493.439089][ T8] device s0 left promiscuous mode [ 3493.479362][ T8] device t0 left promiscuous mode [ 3493.530518][ T8] device v0 left promiscuous mode [ 3493.589277][ T8] device v1 left promiscuous mode [ 3493.629300][ T8] device w0 left promiscuous mode [ 3493.689037][ T8] device w1 left promiscuous mode [ 3493.760996][ T8] device x0 left promiscuous mode [ 3493.819155][ T8] device À0 left promiscuous mode [ 3493.880662][ T8] device .;d left promiscuous mode [ 3493.949151][ T8] device .Zd left promiscuous mode [ 3494.009170][ T8] device .cd left promiscuous mode [ 3494.049267][ T8] device .0 left promiscuous mode [ 3494.089915][ T8] device .1493 left promiscuous mode [ 3494.158985][ T8] device .1494 left promiscuous mode [ 3494.218959][ T8] device .1495 left promiscuous mode [ 3494.259391][ T8] device .1496 left promiscuous mode [ 3494.318993][ T8] device .1497 left promiscuous mode [ 3494.379065][ T8] device .1498 left promiscuous mode [ 3494.438868][ T8] device .1499 left promiscuous mode [ 3494.489230][ T8] device .1500 left promiscuous mode [ 3494.529547][ T8] device .1501 left promiscuous mode [ 3494.588979][ T8] device .1502 left promiscuous mode [ 3494.648957][ T8] device .1503 left promiscuous mode [ 3494.709090][ T8] device .1504 left promiscuous mode [ 3494.749012][ T8] device .1505 left promiscuous mode [ 3494.789184][ T8] device .1506 left promiscuous mode [ 3494.848882][ T8] device .1507 left promiscuous mode [ 3494.929038][ T8] device .1508 left promiscuous mode [ 3494.970013][ T8] device .1509 left promiscuous mode [ 3495.029077][ T8] device .1510 left promiscuous mode [ 3495.098964][ T8] device .1511 left promiscuous mode [ 3495.141149][ T8] device .1512 left promiscuous mode [ 3495.208962][ T8] device .1513 left promiscuous mode [ 3495.268813][ T8] device .1514 left promiscuous mode [ 3495.308961][ T8] device .1515 left promiscuous mode [ 3495.378884][ T8] device .1516 left promiscuous mode [ 3495.439062][ T8] device .1517 left promiscuous mode [ 3495.508920][ T8] device .1518 left promiscuous mode [ 3495.549101][ T8] device .1519 left promiscuous mode [ 3495.589536][ T8] device .1520 left promiscuous mode [ 3495.639061][ T8] device .1521 left promiscuous mode [ 3495.690688][ T8] device .1522 left promiscuous mode [ 3495.739176][ T8] device .1523 left promiscuous mode [ 3495.789140][ T8] device .1524 left promiscuous mode [ 3495.859177][ T8] device .1525 left promiscuous mode [ 3495.928810][ T8] device .1526 left promiscuous mode [ 3495.969586][ T8] device .1527 left promiscuous mode [ 3496.020630][ T8] device .1528 left promiscuous mode [ 3496.079163][ T8] device .1529 left promiscuous mode [ 3496.139072][ T8] device .1530 left promiscuous mode [ 3496.189093][ T8] device .1531 left promiscuous mode [ 3496.248947][ T8] device .1532 left promiscuous mode [ 3496.289030][ T8] device .1533 left promiscuous mode [ 3496.339017][ T8] device .1534 left promiscuous mode [ 3496.398831][ T8] device .1535 left promiscuous mode [ 3496.438919][ T8] device .1536 left promiscuous mode [ 3496.479121][ T8] device .1537 left promiscuous mode [ 3496.538900][ T8] device .1538 left promiscuous mode [ 3496.578833][ T8] device .1539 left promiscuous mode [ 3496.628778][ T8] device .1540 left promiscuous mode [ 3496.698939][ T8] device .1541 left promiscuous mode [ 3496.758753][ T8] device .1542 left promiscuous mode [ 3496.818834][ T8] device .1543 left promiscuous mode [ 3496.869005][ T8] device .1544 left promiscuous mode [ 3496.929058][ T8] device .1545 left promiscuous mode [ 3496.979161][ T8] device .1546 left promiscuous mode [ 3497.068982][ T8] device .1547 left promiscuous mode [ 3497.138948][ T8] device .1548 left promiscuous mode [ 3497.198859][ T8] device .1549 left promiscuous mode [ 3497.268902][ T8] device .1550 left promiscuous mode [ 3497.308989][ T8] device .1551 left promiscuous mode [ 3497.398763][ T8] device .1552 left promiscuous mode [ 3497.478929][ T8] device .1553 left promiscuous mode [ 3497.518909][ T8] device .1554 left promiscuous mode [ 3497.568701][ T8] device .1555 left promiscuous mode [ 3497.609231][ T8] device .1556 left promiscuous mode [ 3497.671231][ T8] device .1557 left promiscuous mode [ 3497.738833][ T8] device .1558 left promiscuous mode [ 3497.800382][ T8] device .1559 left promiscuous mode [ 3497.868723][ T8] device .1560 left promiscuous mode [ 3497.908991][ T8] device .1561 left promiscuous mode [ 3497.968670][ T8] device .1562 left promiscuous mode [ 3498.028707][ T8] device .1563 left promiscuous mode [ 3498.088712][ T8] device .1564 left promiscuous mode [ 3498.148671][ T8] device .1565 left promiscuous mode [ 3498.218776][ T8] device .1566 left promiscuous mode [ 3498.278771][ T8] device .1567 left promiscuous mode [ 3498.339067][ T8] device .1568 left promiscuous mode [ 3498.408676][ T8] device .1569 left promiscuous mode [ 3498.448979][ T8] device .1570 left promiscuous mode [ 3498.498632][ T8] device .1571 left promiscuous mode [ 3498.558596][ T8] device .1572 left promiscuous mode [ 3498.599527][ T8] device .1573 left promiscuous mode [ 3498.660678][ T8] device .1574 left promiscuous mode [ 3498.728954][ T8] device .1575 left promiscuous mode [ 3498.788611][ T8] device .1576 left promiscuous mode [ 3498.838857][ T8] device .1577 left promiscuous mode [ 3498.898867][ T8] device .1578 left promiscuous mode [ 3498.958666][ T8] device .1579 left promiscuous mode [ 3498.998981][ T8] device .1580 left promiscuous mode [ 3499.058685][ T8] device .1581 left promiscuous mode [ 3499.118746][ T8] device .1582 left promiscuous mode [ 3499.170550][ T8] device .1583 left promiscuous mode [ 3499.228884][ T8] device .1584 left promiscuous mode [ 3499.298633][ T8] device .1585 left promiscuous mode [ 3499.338709][ T8] device .1586 left promiscuous mode [ 3499.378914][ T8] device .1587 left promiscuous mode [ 3499.430066][ T8] device .1588 left promiscuous mode [ 3499.488871][ T8] device .1589 left promiscuous mode [ 3499.529068][ T8] device .1590 left promiscuous mode [ 3499.588690][ T8] device .1591 left promiscuous mode [ 3499.648644][ T8] device .1592 left promiscuous mode [ 3499.698980][ T8] device .1593 left promiscuous mode [ 3499.758643][ T8] device .1594 left promiscuous mode [ 3499.840253][ T8] device .1595 left promiscuous mode [ 3499.908584][ T8] device .1596 left promiscuous mode [ 3499.948810][ T8] device .1597 left promiscuous mode [ 3499.988878][ T8] device .1598 left promiscuous mode [ 3500.038642][ T8] device .1599 left promiscuous mode [ 3500.088701][ T8] device .1600 left promiscuous mode [ 3500.138931][ T8] device .1601 left promiscuous mode [ 3500.198632][ T8] device .1602 left promiscuous mode [ 3500.249107][ T8] device .1603 left promiscuous mode [ 3500.318700][ T8] device .1604 left promiscuous mode [ 3500.358815][ T8] device .1605 left promiscuous mode [ 3500.428692][ T8] device .1606 left promiscuous mode [ 3500.468577][ T8] device .1607 left promiscuous mode [ 3500.519078][ T8] device .1608 left promiscuous mode [ 3500.590949][ T8] device .1609 left promiscuous mode [ 3500.668530][ T8] device .1610 left promiscuous mode [ 3500.738627][ T8] device .1611 left promiscuous mode [ 3500.778791][ T8] device .1612 left promiscuous mode [ 3500.838461][ T8] device .1613 left promiscuous mode [ 3500.888727][ T8] device .1614 left promiscuous mode [ 3500.959842][ T8] device .1615 left promiscuous mode [ 3501.028778][ T8] device .1616 left promiscuous mode [ 3501.068711][ T8] device .1617 left promiscuous mode [ 3501.128533][ T8] device .1618 left promiscuous mode [ 3501.168631][ T8] device .1619 left promiscuous mode [ 3501.228577][ T8] device .1620 left promiscuous mode [ 3501.288571][ T8] device .1621 left promiscuous mode [ 3501.348406][ T8] device .1622 left promiscuous mode [ 3501.389577][ T8] device .1623 left promiscuous mode [ 3501.448442][ T8] device .1624 left promiscuous mode [ 3501.508751][ T8] device .1625 left promiscuous mode [ 3501.568455][ T8] device .1626 left promiscuous mode [ 3501.628470][ T8] device .1627 left promiscuous mode [ 3501.698743][ T8] device .1628 left promiscuous mode [ 3501.758418][ T8] device .1629 left promiscuous mode [ 3501.818452][ T8] device .1630 left promiscuous mode [ 3501.878430][ T8] device .1631 left promiscuous mode [ 3501.918690][ T8] device .1632 left promiscuous mode [ 3501.978478][ T8] device .1633 left promiscuous mode [ 3502.018659][ T8] device .1634 left promiscuous mode [ 3502.088584][ T8] device .1635 left promiscuous mode [ 3502.128566][ T8] device .1636 left promiscuous mode [ 3502.188358][ T8] device .1637 left promiscuous mode [ 3502.248433][ T8] device .1638 left promiscuous mode [ 3502.308440][ T8] device .1639 left promiscuous mode [ 3502.368315][ T8] device .1640 left promiscuous mode [ 3502.410820][ T8] device .1641 left promiscuous mode [ 3502.458857][ T8] device .1642 left promiscuous mode [ 3502.499079][ T8] device .1643 left promiscuous mode [ 3502.558305][ T8] device .1644 left promiscuous mode [ 3502.629180][ T8] device .1645 left promiscuous mode [ 3502.690768][ T8] device .1646 left promiscuous mode [ 3502.748370][ T8] device .1647 left promiscuous mode [ 3502.798578][ T8] device .1648 left promiscuous mode [ 3502.868556][ T8] device .1649 left promiscuous mode [ 3502.928266][ T8] device .1650 left promiscuous mode [ 3502.988236][ T8] device .1651 left promiscuous mode [ 3503.068323][ T8] device .1652 left promiscuous mode [ 3503.128705][ T8] device .1653 left promiscuous mode [ 3503.189321][ T8] device .1654 left promiscuous mode [ 3503.248406][ T8] device .1655 left promiscuous mode [ 3503.308286][ T8] device .1656 left promiscuous mode [ 3503.368261][ T8] device .1657 left promiscuous mode [ 3503.418458][ T8] device .1658 left promiscuous mode [ 3503.468507][ T8] device .1659 left promiscuous mode [ 3503.528483][ T8] device .1660 left promiscuous mode [ 3503.568472][ T8] device .1661 left promiscuous mode [ 3503.621282][ T8] device .1662 left promiscuous mode [ 3503.678229][ T8] device .1663 left promiscuous mode [ 3503.739883][ T8] device .1664 left promiscuous mode [ 3503.808204][ T8] device .1665 left promiscuous mode [ 3503.848312][ T8] device .1666 left promiscuous mode [ 3503.908557][ T8] device .1667 left promiscuous mode [ 3503.969909][ T8] device .1668 left promiscuous mode [ 3504.019031][ T8] device .1669 left promiscuous mode [ 3504.088488][ T8] device .1670 left promiscuous mode [ 3504.138705][ T8] device .1671 left promiscuous mode [ 3504.189497][ T8] device .1672 left promiscuous mode [ 3504.238753][ T8] device .1673 left promiscuous mode [ 3504.298333][ T8] device .1674 left promiscuous mode [ 3504.358611][ T8] device .1675 left promiscuous mode [ 3504.410256][ T8] device .1676 left promiscuous mode [ 3504.468175][ T8] device .1677 left promiscuous mode [ 3504.508307][ T8] device .1678 left promiscuous mode [ 3504.558463][ T8] device .1679 left promiscuous mode [ 3504.618307][ T8] device .1680 left promiscuous mode [ 3504.688431][ T8] device .1681 left promiscuous mode [ 3504.748411][ T8] device .1682 left promiscuous mode [ 3504.818459][ T8] device .1683 left promiscuous mode [ 3504.888729][ T8] device .1684 left promiscuous mode [ 3504.948321][ T8] device .1685 left promiscuous mode [ 3505.008261][ T8] device .1686 left promiscuous mode [ 3505.048375][ T8] device .1687 left promiscuous mode [ 3505.108220][ T8] device .1688 left promiscuous mode [ 3505.148373][ T8] device .1689 left promiscuous mode [ 3505.210245][ T8] device .1690 left promiscuous mode [ 3505.278301][ T8] device .1691 left promiscuous mode [ 3505.318548][ T8] device .1692 left promiscuous mode [ 3505.378147][ T8] device .1693 left promiscuous mode [ 3505.438145][ T8] device .1694 left promiscuous mode [ 3505.508268][ T8] device .1695 left promiscuous mode [ 3505.548486][ T8] device .1696 left promiscuous mode [ 3505.598257][ T8] device .1697 left promiscuous mode [ 3505.648572][ T8] device .1698 left promiscuous mode [ 3505.688516][ T8] device .1699 left promiscuous mode [ 3505.748256][ T8] device .1700 left promiscuous mode [ 3505.798257][ T8] device .1701 left promiscuous mode [ 3505.838268][ T8] device .1702 left promiscuous mode [ 3505.879580][ T8] device .1703 left promiscuous mode [ 3505.928912][ T8] device .1704 left promiscuous mode [ 3505.998181][ T8] device .1705 left promiscuous mode [ 3506.038183][ T8] device .1706 left promiscuous mode [ 3506.078595][ T8] device .1707 left promiscuous mode [ 3506.128305][ T8] device .1708 left promiscuous mode [ 3506.188218][ T8] device .1709 left promiscuous mode [ 3506.248614][ T8] device .1710 left promiscuous mode [ 3506.308128][ T8] device .1711 left promiscuous mode [ 3506.368121][ T8] device .1712 left promiscuous mode [ 3506.428163][ T8] device .1713 left promiscuous mode [ 3506.468355][ T8] device .1714 left promiscuous mode [ 3506.527991][ T8] device .1715 left promiscuous mode [ 3506.588015][ T8] device .1716 left promiscuous mode [ 3506.647954][ T8] device .1717 left promiscuous mode [ 3506.688181][ T8] device .1718 left promiscuous mode [ 3506.728328][ T8] device .1719 left promiscuous mode [ 3506.768285][ T8] device .1720 left promiscuous mode [ 3506.810757][ T8] device .1721 left promiscuous mode [ 3506.868111][ T8] device .1722 left promiscuous mode [ 3506.930431][ T8] device .1723 left promiscuous mode [ 3506.988143][ T8] device .1724 left promiscuous mode [ 3507.049860][ T8] device .1725 left promiscuous mode [ 3507.108264][ T8] device .1726 left promiscuous mode [ 3507.148210][ T8] device .1727 left promiscuous mode [ 3507.198622][ T8] device .1728 left promiscuous mode [ 3507.258188][ T8] device .1729 left promiscuous mode [ 3507.318114][ T8] device .1730 left promiscuous mode [ 3507.358099][ T8] device .1731 left promiscuous mode [ 3507.398346][ T8] device .1732 left promiscuous mode [ 3507.448622][ T8] device .1733 left promiscuous mode [ 3507.518997][ T8] device .1734 left promiscuous mode [ 3507.578091][ T8] device .1735 left promiscuous mode [ 3507.637931][ T8] device .1736 left promiscuous mode [ 3507.688438][ T8] device .1737 left promiscuous mode [ 3507.728323][ T8] device .1738 left promiscuous mode [ 3507.798019][ T8] device .1739 left promiscuous mode [ 3507.857929][ T8] device .1740 left promiscuous mode [ 3507.919212][ T8] device .1741 left promiscuous mode [ 3507.978016][ T8] device .1742 left promiscuous mode [ 3508.039571][ T8] device .1743 left promiscuous mode [ 3508.107984][ T8] device .1744 left promiscuous mode [ 3508.167877][ T8] device .1745 left promiscuous mode [ 3508.218029][ T8] device .1746 left promiscuous mode [ 3508.258266][ T8] device .1747 left promiscuous mode [ 3508.308279][ T8] device .1748 left promiscuous mode [ 3508.348312][ T8] device .1749 left promiscuous mode [ 3508.398240][ T8] device .1750 left promiscuous mode [ 3508.458065][ T8] device .1751 left promiscuous mode [ 3508.498029][ T8] device .1752 left promiscuous mode [ 3508.548358][ T8] device .1753 left promiscuous mode [ 3508.618042][ T8] device .1754 left promiscuous mode [ 3508.658054][ T8] device .1755 left promiscuous mode [ 3508.718036][ T8] device .1756 left promiscuous mode [ 3508.787918][ T8] device .1757 left promiscuous mode [ 3508.858391][ T8] device .1758 left promiscuous mode [ 3508.927987][ T8] device .1759 left promiscuous mode [ 3508.989056][ T8] device .1760 left promiscuous mode [ 3509.048465][ T8] device .1761 left promiscuous mode [ 3509.118000][ T8] device .1762 left promiscuous mode [ 3509.177838][ T8] device .1763 left promiscuous mode [ 3509.237788][ T8] device .1764 left promiscuous mode [ 3509.297902][ T8] device .1765 left promiscuous mode [ 3509.357784][ T8] device .1766 left promiscuous mode [ 3509.407964][ T8] device .1767 left promiscuous mode [ 3509.448361][ T8] device .1768 left promiscuous mode [ 3509.498042][ T8] device .1769 left promiscuous mode [ 3509.548325][ T8] device .1770 left promiscuous mode [ 3509.598003][ T8] device .1771 left promiscuous mode [ 3509.667871][ T8] device .1772 left promiscuous mode [ 3509.709933][ T8] device .1773 left promiscuous mode [ 3509.768005][ T8] device .1774 left promiscuous mode [ 3509.827810][ T8] device .1775 left promiscuous mode [ 3509.897922][ T8] device .1776 left promiscuous mode [ 3509.947931][ T8] device .1777 left promiscuous mode [ 3509.987985][ T8] device .1778 left promiscuous mode [ 3510.028285][ T8] device .1779 left promiscuous mode [ 3510.078420][ T8] device .1780 left promiscuous mode [ 3510.128007][ T8] device .1781 left promiscuous mode [ 3510.187934][ T8] device .1782 left promiscuous mode [ 3510.228046][ T8] device .1783 left promiscuous mode [ 3510.278050][ T8] device .1784 left promiscuous mode [ 3510.347735][ T8] device .1785 left promiscuous mode [ 3510.407959][ T8] device .1786 left promiscuous mode [ 3510.477742][ T8] device .1787 left promiscuous mode [ 3510.537718][ T8] device .1788 left promiscuous mode [ 3510.597870][ T8] device .1789 left promiscuous mode [ 3510.637882][ T8] device .1790 left promiscuous mode [ 3510.688349][ T8] device .1791 left promiscuous mode [ 3510.740396][ T8] device .1792 left promiscuous mode [ 3510.808026][ T8] device .1793 left promiscuous mode [ 3510.867693][ T8] device .1794 left promiscuous mode [ 3510.927754][ T8] device .1795 left promiscuous mode [ 3510.977932][ T8] device .1796 left promiscuous mode [ 3511.047962][ T8] device .1797 left promiscuous mode [ 3511.117826][ T8] device .1798 left promiscuous mode [ 3511.168016][ T8] device .1799 left promiscuous mode [ 3511.227736][ T8] device .1800 left promiscuous mode [ 3511.289435][ T8] device .1801 left promiscuous mode [ 3511.357801][ T8] device .1802 left promiscuous mode [ 3511.417662][ T8] device .1803 left promiscuous mode [ 3511.477659][ T8] device .1804 left promiscuous mode [ 3511.547794][ T8] device .1805 left promiscuous mode [ 3511.587980][ T8] device .1806 left promiscuous mode [ 3511.647696][ T8] device .1807 left promiscuous mode [ 3511.697935][ T8] device .1808 left promiscuous mode [ 3511.767814][ T8] device .1809 left promiscuous mode [ 3511.837895][ T8] device .1810 left promiscuous mode [ 3511.897684][ T8] device .1811 left promiscuous mode [ 3511.937991][ T8] device .1812 left promiscuous mode [ 3511.988210][ T8] device .1813 left promiscuous mode [ 3512.038028][ T8] device .1814 left promiscuous mode [ 3512.078052][ T8] device .1815 left promiscuous mode [ 3512.147701][ T8] device .1816 left promiscuous mode [ 3512.207636][ T8] device .1817 left promiscuous mode [ 3512.267812][ T8] device .1818 left promiscuous mode [ 3512.307688][ T8] device .1819 left promiscuous mode [ 3512.358017][ T8] device .1820 left promiscuous mode [ 3512.417757][ T8] device .1821 left promiscuous mode [ 3512.457947][ T8] device .1822 left promiscuous mode [ 3512.518130][ T8] device .1823 left promiscuous mode [ 3512.577771][ T8] device .1824 left promiscuous mode [ 3512.617691][ T8] device .1825 left promiscuous mode [ 3512.657958][ T8] device .1826 left promiscuous mode [ 3512.707701][ T8] device .1827 left promiscuous mode [ 3512.757929][ T8] device .1828 left promiscuous mode [ 3512.827695][ T8] device .1829 left promiscuous mode [ 3512.889236][ T8] device .1830 left promiscuous mode [ 3512.947881][ T8] device .1831 left promiscuous mode [ 3513.007740][ T8] device .1832 left promiscuous mode [ 3513.067616][ T8] device .1833 left promiscuous mode [ 3513.117766][ T8] device .1834 left promiscuous mode [ 3513.157722][ T8] device .1835 left promiscuous mode [ 3513.208025][ T8] device .1836 left promiscuous mode [ 3513.257782][ T8] device .1837 left promiscuous mode [ 3513.317653][ T8] device .1838 left promiscuous mode [ 3513.377633][ T8] device .1839 left promiscuous mode [ 3513.427907][ T8] device .1840 left promiscuous mode [ 3513.477791][ T8] device .1841 left promiscuous mode [ 3513.529643][ T8] device .1842 left promiscuous mode [ 3513.587594][ T8] device .1843 left promiscuous mode [ 3513.647572][ T8] device .1844 left promiscuous mode [ 3513.687731][ T8] device .1845 left promiscuous mode [ 3513.747662][ T8] device .1846 left promiscuous mode [ 3513.790307][ T8] device .1847 left promiscuous mode [ 3513.847863][ T8] device .1848 left promiscuous mode [ 3513.917772][ T8] device .1849 left promiscuous mode [ 3513.977619][ T8] device .1850 left promiscuous mode [ 3514.037573][ T8] device .1851 left promiscuous mode [ 3514.078192][ T8] device .1852 left promiscuous mode [ 3514.137572][ T8] device .1853 left promiscuous mode [ 3514.197388][ T8] device .1854 left promiscuous mode [ 3514.237587][ T8] device .1855 left promiscuous mode [ 3514.297470][ T8] device .1856 left promiscuous mode [ 3514.337991][ T8] device .1857 left promiscuous mode [ 3514.397607][ T8] device .1858 left promiscuous mode [ 3514.467417][ T8] device .1859 left promiscuous mode [ 3514.527459][ T8] device .1860 left promiscuous mode [ 3514.597476][ T8] device .1861 left promiscuous mode [ 3514.637684][ T8] device .1862 left promiscuous mode [ 3514.699888][ T8] device .1863 left promiscuous mode [ 3514.757676][ T8] device .1864 left promiscuous mode [ 3514.827348][ T8] device .1865 left promiscuous mode [ 3514.867532][ T8] device .1866 left promiscuous mode [ 3514.927897][ T8] device .1867 left promiscuous mode [ 3514.997589][ T8] device .1868 left promiscuous mode [ 3515.037669][ T8] device .1869 left promiscuous mode [ 3515.097477][ T8] device .1870 left promiscuous mode [ 3515.147762][ T8] device .1871 left promiscuous mode [ 3515.217505][ T8] device .1872 left promiscuous mode [ 3515.257470][ T8] device .1873 left promiscuous mode [ 3515.307950][ T8] device .1874 left promiscuous mode [ 3515.367596][ T8] device .1875 left promiscuous mode [ 3515.407690][ T8] device .1876 left promiscuous mode [ 3515.467402][ T8] device .1877 left promiscuous mode [ 3515.507501][ T8] device .1878 left promiscuous mode [ 3515.557364][ T8] device .1879 left promiscuous mode [ 3515.597507][ T8] device .1880 left promiscuous mode [ 3515.647906][ T8] device .1881 left promiscuous mode [ 3515.707631][ T8] device .1882 left promiscuous mode [ 3515.787667][ T8] device .1883 left promiscuous mode [ 3515.847415][ T8] device .1884 left promiscuous mode [ 3515.907569][ T8] device .1885 left promiscuous mode [ 3515.967467][ T8] device .1886 left promiscuous mode [ 3516.037388][ T8] device .1887 left promiscuous mode [ 3516.099074][ T8] device .1888 left promiscuous mode [ 3516.137434][ T8] device .1889 left promiscuous mode [ 3516.187812][ T8] device .1890 left promiscuous mode [ 3516.247550][ T8] device .1891 left promiscuous mode [ 3516.307641][ T8] device .1892 left promiscuous mode [ 3516.349270][ T8] device .1893 left promiscuous mode [ 3516.417648][ T8] device .1894 left promiscuous mode [ 3516.459649][ T8] device .1895 left promiscuous mode [ 3516.517479][ T8] device .1896 left promiscuous mode [ 3516.573856][ T8] device .1897 left promiscuous mode [ 3516.628581][ T8] device .1898 left promiscuous mode [ 3516.697301][ T8] device .1899 left promiscuous mode [ 3516.737333][ T8] device .1900 left promiscuous mode [ 3516.777816][ T8] device .1901 left promiscuous mode [ 3516.837292][ T8] device .1902 left promiscuous mode [ 3516.887383][ T8] device .1903 left promiscuous mode [ 3516.957429][ T8] device .1904 left promiscuous mode [ 3517.017422][ T8] device .1905 left promiscuous mode [ 3517.087285][ T8] device .1906 left promiscuous mode [ 3517.127600][ T8] device .1907 left promiscuous mode [ 3517.187236][ T8] device .1908 left promiscuous mode [ 3517.247230][ T8] device .1909 left promiscuous mode [ 3517.287665][ T8] device .1910 left promiscuous mode [ 3517.357371][ T8] device .1911 left promiscuous mode [ 3517.417432][ T8] device .1912 left promiscuous mode [ 3517.457335][ T8] device .1913 left promiscuous mode [ 3517.499105][ T8] device .1914 left promiscuous mode [ 3517.547407][ T8] device .1915 left promiscuous mode [ 3517.597397][ T8] device .1916 left promiscuous mode [ 3517.647535][ T8] device .1917 left promiscuous mode [ 3517.688019][ T8] device .1918 left promiscuous mode [ 3517.737293][ T8] device .1919 left promiscuous mode [ 3517.777711][ T8] device .1920 left promiscuous mode [ 3517.837492][ T8] device .1921 left promiscuous mode [ 3517.897456][ T8] device .1922 left promiscuous mode [ 3517.937399][ T8] device .1923 left promiscuous mode [ 3517.997337][ T8] device .1924 left promiscuous mode [ 3518.058707][ T8] device .1925 left promiscuous mode [ 3518.107448][ T8] device .1926 left promiscuous mode [ 3518.169913][ T8] device .1927 left promiscuous mode [ 3518.227933][ T8] device .1928 left promiscuous mode [ 3518.267256][ T8] device .1929 left promiscuous mode [ 3518.317559][ T8] device .1930 left promiscuous mode [ 3518.377378][ T8] device .1931 left promiscuous mode [ 3518.447234][ T8] device .1932 left promiscuous mode [ 3518.498509][ T8] device .1933 left promiscuous mode [ 3518.547298][ T8] device .1934 left promiscuous mode [ 3518.609755][ T8] device .1935 left promiscuous mode [ 3518.677257][ T8] device .1936 left promiscuous mode [ 3518.748543][ T8] device .1937 left promiscuous mode [ 3518.817140][ T8] device .1938 left promiscuous mode [ 3518.887123][ T8] device .1939 left promiscuous mode [ 3518.948093][ T8] device .1940 left promiscuous mode [ 3519.007110][ T8] device .1941 left promiscuous mode [ 3519.059192][ T8] device .1942 left promiscuous mode [ 3519.127315][ T8] device .1943 left promiscuous mode [ 3519.169880][ T8] device .1944 left promiscuous mode [ 3519.227288][ T8] device .1945 left promiscuous mode [ 3519.267291][ T8] device .1946 left promiscuous mode [ 3519.317292][ T8] device .1947 left promiscuous mode [ 3519.387163][ T8] device .1948 left promiscuous mode [ 3519.427301][ T8] device .1949 left promiscuous mode [ 3519.467631][ T8] device .1950 left promiscuous mode [ 3519.527275][ T8] device .1951 left promiscuous mode [ 3519.607312][ T8] device .1952 left promiscuous mode [ 3519.647304][ T8] device .1953 left promiscuous mode [ 3519.707553][ T8] device .1954 left promiscuous mode [ 3519.777879][ T8] device .1955 left promiscuous mode [ 3519.847056][ T8] device .1956 left promiscuous mode [ 3519.897226][ T8] device .1957 left promiscuous mode [ 3519.937374][ T8] device .1958 left promiscuous mode [ 3519.997117][ T8] device .1959 left promiscuous mode [ 3520.057107][ T8] device .1960 left promiscuous mode [ 3520.097290][ T8] device .1961 left promiscuous mode [ 3520.147210][ T8] device .1962 left promiscuous mode [ 3520.207013][ T8] device .1963 left promiscuous mode [ 3520.247157][ T8] device .1964 left promiscuous mode [ 3520.297505][ T8] device .1965 left promiscuous mode [ 3520.367098][ T8] device .1966 left promiscuous mode [ 3520.437088][ T8] device .1967 left promiscuous mode [ 3520.507278][ T8] device .1968 left promiscuous mode [ 3520.547087][ T8] device .1969 left promiscuous mode [ 3520.587364][ T8] device .1970 left promiscuous mode [ 3520.627357][ T8] device .1971 left promiscuous mode [ 3520.677519][ T8] device .1972 left promiscuous mode [ 3520.747297][ T8] device .1973 left promiscuous mode [ 3520.796994][ T8] device .1974 left promiscuous mode [ 3520.857303][ T8] device .1975 left promiscuous mode [ 3520.927563][ T8] device .1976 left promiscuous mode [ 3520.997188][ T8] device .1977 left promiscuous mode [ 3521.067067][ T8] device .1978 left promiscuous mode [ 3521.107116][ T8] device .1979 left promiscuous mode [ 3521.147516][ T8] device .1980 left promiscuous mode [ 3521.187199][ T8] device .1981 left promiscuous mode [ 3521.247020][ T8] device .1982 left promiscuous mode [ 3521.287140][ T8] device .1983 left promiscuous mode [ 3521.337100][ T8] device .1984 left promiscuous mode [ 3521.378025][ T8] device .1985 left promiscuous mode [ 3521.427364][ T8] device .1986 left promiscuous mode [ 3521.487072][ T8] device .1987 left promiscuous mode [ 3521.557335][ T8] device .1988 left promiscuous mode [ 3521.617058][ T8] device .1989 left promiscuous mode [ 3521.676906][ T8] device .1990 left promiscuous mode [ 3521.737100][ T8] device .1991 left promiscuous mode [ 3521.799314][ T8] device .1992 left promiscuous mode [ 3521.866948][ T8] device .1993 left promiscuous mode [ 3521.927148][ T8] device .1994 left promiscuous mode [ 3521.987244][ T8] device .1995 left promiscuous mode [ 3522.027085][ T8] device .1996 left promiscuous mode [ 3522.087048][ T8] device .1997 left promiscuous mode [ 3522.150480][ T8] device .1998 left promiscuous mode [ 3522.206862][ T8] device .1999 left promiscuous mode [ 3522.247079][ T8] device .2000 left promiscuous mode [ 3522.316965][ T8] device .2001 left promiscuous mode [ 3522.357035][ T8] device .2002 left promiscuous mode [ 3522.407205][ T8] device .2003 left promiscuous mode [ 3522.467177][ T8] device .2004 left promiscuous mode [ 3522.526920][ T8] device .2005 left promiscuous mode [ 3522.577357][ T8] device .2006 left promiscuous mode [ 3522.637274][ T8] device .2007 left promiscuous mode [ 3522.698603][ T8] device .2008 left promiscuous mode [ 3522.756950][ T8] device .2009 left promiscuous mode [ 3522.816934][ T8] device .2010 left promiscuous mode [ 3522.876934][ T8] device .2011 left promiscuous mode [ 3522.927003][ T8] device .2012 left promiscuous mode [ 3522.996899][ T8] device .2013 left promiscuous mode [ 3523.036905][ T8] device .2014 left promiscuous mode [ 3523.096862][ T8] device .2015 left promiscuous mode [ 3523.147102][ T8] device .2016 left promiscuous mode [ 3523.187084][ T8] device .2017 left promiscuous mode [ 3523.246848][ T8] device .2018 left promiscuous mode [ 3523.286971][ T8] device .2019 left promiscuous mode [ 3523.336782][ T8] device .2020 left promiscuous mode [ 3523.376878][ T8] device .2021 left promiscuous mode [ 3523.437383][ T8] device .2022 left promiscuous mode [ 3523.487299][ T8] device .2023 left promiscuous mode [ 3523.537137][ T8] device .2024 left promiscuous mode [ 3523.607135][ T8] device .2025 left promiscuous mode [ 3523.676795][ T8] device .2026 left promiscuous mode [ 3523.736774][ T8] device .2027 left promiscuous mode [ 3523.777058][ T8] device .2028 left promiscuous mode [ 3523.836719][ T8] device .2029 left promiscuous mode [ 3523.896820][ T8] device .2030 left promiscuous mode [ 3523.957017][ T8] device .2031 left promiscuous mode [ 3524.009533][ T8] device .2032 left promiscuous mode [ 3524.066943][ T8] device .2033 left promiscuous mode [ 3524.137273][ T8] device .2034 left promiscuous mode [ 3524.196696][ T8] device .2035 left promiscuous mode [ 3524.238596][ T8] device .2036 left promiscuous mode [ 3524.306941][ T8] device .2037 left promiscuous mode [ 3524.376804][ T8] device .2038 left promiscuous mode [ 3524.426922][ T8] device .2039 left promiscuous mode [ 3524.476748][ T8] device .2040 left promiscuous mode [ 3524.517093][ T8] device .2041 left promiscuous mode [ 3524.566670][ T8] device .2042 left promiscuous mode [ 3524.606915][ T8] device .2043 left promiscuous mode [ 3524.666791][ T8] device .2044 left promiscuous mode [ 3524.726976][ T8] device .2045 left promiscuous mode [ 3524.786687][ T8] device .2046 left promiscuous mode [ 3524.846682][ T8] device .2047 left promiscuous mode [ 3524.906878][ T8] device .2048 left promiscuous mode [ 3524.966915][ T8] device .2049 left promiscuous mode [ 3525.026843][ T8] device .2050 left promiscuous mode [ 3525.086976][ T8] device .2051 left promiscuous mode [ 3525.156933][ T8] device .2052 left promiscuous mode [ 3525.226894][ T8] device .2053 left promiscuous mode [ 3525.296679][ T8] device .2054 left promiscuous mode [ 3525.356619][ T8] device .2055 left promiscuous mode [ 3525.416684][ T8] device .2056 left promiscuous mode [ 3525.466966][ T8] device .2057 left promiscuous mode [ 3525.536843][ T8] device .2058 left promiscuous mode [ 3525.586832][ T8] device .2059 left promiscuous mode [ 3525.637851][ T8] device .2060 left promiscuous mode [ 3525.706664][ T8] device .2061 left promiscuous mode [ 3525.786733][ T8] device .2062 left promiscuous mode [ 3525.847078][ T8] device .2063 left promiscuous mode [ 3525.906905][ T8] device .2064 left promiscuous mode [ 3525.966734][ T8] device .2065 left promiscuous mode [ 3526.007687][ T8] device .2066 left promiscuous mode [ 3526.066609][ T8] device .2067 left promiscuous mode [ 3526.126703][ T8] device .2068 left promiscuous mode [ 3526.186618][ T8] device .2069 left promiscuous mode [ 3526.256684][ T8] device .2070 left promiscuous mode [ 3526.306796][ T8] device .2071 left promiscuous mode [ 3526.376764][ T8] device .2072 left promiscuous mode [ 3526.446903][ T8] device .2073 left promiscuous mode [ 3526.506738][ T8] device .2074 left promiscuous mode [ 3526.566973][ T8] device .2075 left promiscuous mode [ 3526.626601][ T8] device .2076 left promiscuous mode [ 3526.666773][ T8] device .2077 left promiscuous mode [ 3526.726928][ T8] device .2078 left promiscuous mode [ 3526.786610][ T8] device .2079 left promiscuous mode [ 3526.856788][ T8] device .2080 left promiscuous mode [ 3526.896691][ T8] device .2081 left promiscuous mode [ 3526.936887][ T8] device .2082 left promiscuous mode [ 3527.006752][ T8] device .2083 left promiscuous mode [ 3527.056675][ T8] device .2084 left promiscuous mode [ 3527.099375][ T8] device .2085 left promiscuous mode [ 3527.156619][ T8] device .2086 left promiscuous mode [ 3527.196753][ T8] device .2087 left promiscuous mode [ 3527.236920][ T8] device .2088 left promiscuous mode [ 3527.296556][ T8] device .2089 left promiscuous mode [ 3527.356499][ T8] device .2090 left promiscuous mode [ 3527.398034][ T8] device .2091 left promiscuous mode [ 3527.456612][ T8] device .2092 left promiscuous mode [ 3527.497017][ T8] device .2093 left promiscuous mode [ 3527.556601][ T8] device .2094 left promiscuous mode [ 3527.626599][ T8] device .2095 left promiscuous mode [ 3527.679984][ T8] device .2096 left promiscuous mode [ 3527.736543][ T8] device .2097 left promiscuous mode [ 3527.799170][ T8] device .2098 left promiscuous mode [ 3527.856637][ T8] device .2099 left promiscuous mode [ 3527.916569][ T8] device .2100 left promiscuous mode [ 3527.978116][ T8] device .2101 left promiscuous mode [ 3528.036508][ T8] device .2102 left promiscuous mode [ 3528.086724][ T8] device .2103 left promiscuous mode [ 3528.146711][ T8] device .2104 left promiscuous mode [ 3528.186554][ T8] device .2105 left promiscuous mode [ 3528.227018][ T8] device .2106 left promiscuous mode [ 3528.286547][ T8] device .2107 left promiscuous mode [ 3528.346482][ T8] device .2108 left promiscuous mode [ 3528.386648][ T8] device .2109 left promiscuous mode [ 3528.456496][ T8] device .2110 left promiscuous mode [ 3528.506655][ T8] device .2111 left promiscuous mode [ 3528.546621][ T8] device .2112 left promiscuous mode [ 3528.617595][ T8] device .2113 left promiscuous mode [ 3528.676415][ T8] device .2114 left promiscuous mode [ 3528.716505][ T8] device .2115 left promiscuous mode [ 3528.766733][ T8] device .2116 left promiscuous mode [ 3528.817230][ T8] device .2117 left promiscuous mode [ 3528.876418][ T8] device .2118 left promiscuous mode [ 3528.956468][ T8] device .2119 left promiscuous mode [ 3528.996577][ T8] device .2120 left promiscuous mode [ 3529.046403][ T2222] Bluetooth: hci0: command 0x0406 tx timeout [ 3529.066577][ T8] device .2121 left promiscuous mode [ 3529.126707][ T8] device .2122 left promiscuous mode [ 3529.186601][ T8] device .2123 left promiscuous mode [ 3529.246567][ T8] device .2124 left promiscuous mode [ 3529.286775][ T8] device .2125 left promiscuous mode [ 3529.336832][ T8] device .2126 left promiscuous mode [ 3529.396680][ T8] device .2127 left promiscuous mode [ 3529.456340][ T8] device .2128 left promiscuous mode [ 3529.516388][ T8] device .2129 left promiscuous mode [ 3529.558997][ T8] device .2130 left promiscuous mode [ 3529.616304][ T8] device .2131 left promiscuous mode [ 3529.696970][ T8] device .2132 left promiscuous mode [ 3529.748234][ T8] device .2133 left promiscuous mode [ 3529.806439][ T8] device .2134 left promiscuous mode [ 3529.866485][ T8] device .2135 left promiscuous mode [ 3529.936742][ T8] device .2136 left promiscuous mode [ 3530.016804][ T8] device .2137 left promiscuous mode [ 3530.076411][ T8] device .2138 left promiscuous mode [ 3530.136289][ T8] device .2139 left promiscuous mode [ 3530.216346][ T8] device .2140 left promiscuous mode [ 3530.286561][ T8] device .2141 left promiscuous mode [ 3530.356360][ T8] device .2142 left promiscuous mode [ 3530.426437][ T8] device .2143 left promiscuous mode [ 3530.496656][ T8] device .2144 left promiscuous mode [ 3530.566752][ T8] device .2145 left promiscuous mode [ 3530.638184][ T8] device .2146 left promiscuous mode [ 3530.696414][ T8] device .2147 left promiscuous mode [ 3530.769758][ T8] device .2148 left promiscuous mode [ 3530.826401][ T8] device .2149 left promiscuous mode [ 3530.866403][ T8] device .2150 left promiscuous mode [ 3530.916680][ T8] device .2151 left promiscuous mode [ 3530.986385][ T8] device .2152 left promiscuous mode [ 3531.036524][ T8] device .2153 left promiscuous mode [ 3531.106319][ T8] device .2154 left promiscuous mode [ 3531.166256][ T8] device .2155 left promiscuous mode [ 3531.207407][ T8] device .2156 left promiscuous mode [ 3531.276547][ T8] device .2157 left promiscuous mode [ 3531.346369][ T8] device .2158 left promiscuous mode [ 3531.396356][ T8] device .2159 left promiscuous mode [ 3531.436468][ T8] device .2160 left promiscuous mode [ 3531.486546][ T8] device .2161 left promiscuous mode [ 3531.526662][ T8] device .2162 left promiscuous mode [ 3531.586350][ T8] device .2163 left promiscuous mode [ 3531.627827][ T8] device .2164 left promiscuous mode [ 3531.696317][ T8] device .2165 left promiscuous mode [ 3531.738000][ T8] device .2166 left promiscuous mode [ 3531.806298][ T8] device .2167 left promiscuous mode [ 3531.856392][ T8] device .2168 left promiscuous mode [ 3531.928762][ T8] device .2169 left promiscuous mode [ 3531.977638][ T8] device .2170 left promiscuous mode [ 3532.039156][ T8] device .2171 left promiscuous mode [ 3532.096374][ T8] device .2172 left promiscuous mode [ 3532.156174][ T8] device .2173 left promiscuous mode [ 3532.216169][ T8] device .2174 left promiscuous mode [ 3532.256247][ T8] device .2175 left promiscuous mode [ 3532.306588][ T8] device .2176 left promiscuous mode [ 3532.366114][ T8] device .2177 left promiscuous mode [ 3532.406506][ T8] device .2178 left promiscuous mode [ 3532.476235][ T8] device .2179 left promiscuous mode [ 3532.536215][ T8] device .2180 left promiscuous mode [ 3532.596183][ T8] device .2181 left promiscuous mode [ 3532.656210][ T8] device .2182 left promiscuous mode [ 3532.696895][ T8] device .2183 left promiscuous mode [ 3532.746295][ T8] device .2184 left promiscuous mode [ 3532.806298][ T8] device .2185 left promiscuous mode [ 3532.856155][ T8] device .2186 left promiscuous mode [ 3532.897547][ T8] device .2187 left promiscuous mode [ 3532.956192][ T8] device .2188 left promiscuous mode [ 3532.996399][ T8] device .2189 left promiscuous mode [ 3533.056301][ T8] device .2190 left promiscuous mode [ 3533.106185][ T8] device .2191 left promiscuous mode [ 3533.166138][ T8] device .2192 left promiscuous mode [ 3533.226067][ T8] device .2193 left promiscuous mode [ 3533.266320][ T8] device .2194 left promiscuous mode [ 3533.326081][ T8] device .2195 left promiscuous mode [ 3533.366293][ T8] device .2196 left promiscuous mode [ 3533.416130][ T8] device .2197 left promiscuous mode [ 3533.466262][ T8] device .2198 left promiscuous mode [ 3533.526284][ T8] device .2199 left promiscuous mode [ 3533.586081][ T8] device .2200 left promiscuous mode [ 3533.646123][ T8] device .2201 left promiscuous mode [ 3533.687501][ T8] device .2202 left promiscuous mode [ 3533.746134][ T8] device .2203 left promiscuous mode [ 3533.806249][ T8] device .2204 left promiscuous mode [ 3533.866224][ T8] device .2205 left promiscuous mode [ 3533.926037][ T8] device .2206 left promiscuous mode [ 3533.986097][ T8] device .2207 left promiscuous mode [ 3534.026214][ T8] device .2208 left promiscuous mode [ 3534.086244][ T8] device .2209 left promiscuous mode [ 3534.156093][ T8] device .2210 left promiscuous mode [ 3534.206335][ T8] device .2211 left promiscuous mode [ 3534.256194][ T8] device .2212 left promiscuous mode [ 3534.297546][ T8] device .2213 left promiscuous mode [ 3534.355967][ T8] device .2214 left promiscuous mode [ 3534.426064][ T8] device .2215 left promiscuous mode [ 3534.476147][ T8] device .2216 left promiscuous mode [ 3534.536165][ T8] device .2217 left promiscuous mode [ 3534.596050][ T8] device .2218 left promiscuous mode [ 3534.636258][ T8] device .2219 left promiscuous mode [ 3534.696030][ T8] device .2220 left promiscuous mode [ 3534.756201][ T8] device .2221 left promiscuous mode [ 3534.825965][ T8] device .2222 left promiscuous mode [ 3534.895963][ T8] device .2223 left promiscuous mode [ 3534.976303][ T8] device .2224 left promiscuous mode [ 3535.035991][ T8] device .2225 left promiscuous mode [ 3535.075996][ T8] device .2226 left promiscuous mode [ 3535.117617][ T8] device .2227 left promiscuous mode [ 3535.177471][ T8] device .2228 left promiscuous mode [ 3535.226096][ T8] device .2229 left promiscuous mode [ 3535.276338][ T8] device .2230 left promiscuous mode [ 3535.346021][ T8] device .2231 left promiscuous mode [ 3535.405933][ T8] device .2232 left promiscuous mode [ 3535.446074][ T8] device .2233 left promiscuous mode [ 3535.496182][ T8] device .2234 left promiscuous mode [ 3535.555920][ T8] device .2235 left promiscuous mode [ 3535.596034][ T8] device .2236 left promiscuous mode [ 3535.665919][ T8] device .2237 left promiscuous mode [ 3535.706093][ T8] device .2238 left promiscuous mode [ 3535.756348][ T8] device .2239 left promiscuous mode [ 3535.816095][ T8] device .2240 left promiscuous mode [ 3535.875957][ T8] device .2241 left promiscuous mode [ 3535.935940][ T8] device .2242 left promiscuous mode [ 3535.978600][ T8] device .2243 left promiscuous mode [ 3536.036043][ T8] device .2244 left promiscuous mode [ 3536.098910][ T8] device .2245 left promiscuous mode [ 3536.155949][ T8] device .2246 left promiscuous mode [ 3536.197404][ T8] device .2247 left promiscuous mode [ 3536.255951][ T8] device .2248 left promiscuous mode [ 3536.326020][ T8] device .2249 left promiscuous mode [ 3536.386153][ T8] device .2250 left promiscuous mode [ 3536.465986][ T8] device .2251 left promiscuous mode [ 3536.525989][ T8] device .2252 left promiscuous mode [ 3536.585841][ T8] device .2253 left promiscuous mode [ 3536.645834][ T8] device .2254 left promiscuous mode [ 3536.706075][ T8] device .2255 left promiscuous mode [ 3536.775865][ T8] device .2256 left promiscuous mode [ 3536.826109][ T8] device .2257 left promiscuous mode [ 3536.885953][ T8] device .2258 left promiscuous mode [ 3536.926113][ T8] device .2259 left promiscuous mode [ 3536.977028][ T8] device .2260 left promiscuous mode [ 3537.026242][ T8] device .2261 left promiscuous mode [ 3537.076151][ T8] device .2262 left promiscuous mode [ 3537.126248][ T8] device .2263 left promiscuous mode [ 3537.176125][ T8] device .2264 left promiscuous mode [ 3537.255801][ T8] device .2265 left promiscuous mode [ 3537.305941][ T8] device .2266 left promiscuous mode [ 3537.365789][ T8] device .2267 left promiscuous mode [ 3537.405905][ T8] device .2268 left promiscuous mode [ 3537.455754][ T8] device .2269 left promiscuous mode [ 3537.505956][ T8] device .2270 left promiscuous mode [ 3537.575824][ T8] device .2271 left promiscuous mode [ 3537.635841][ T8] device .2272 left promiscuous mode [ 3537.675924][ T8] device .2273 left promiscuous mode [ 3537.716145][ T8] device .2274 left promiscuous mode [ 3537.766066][ T8] device .2275 left promiscuous mode [ 3537.835930][ T8] device .2276 left promiscuous mode [ 3537.905841][ T8] device .2277 left promiscuous mode [ 3537.956000][ T8] device .2278 left promiscuous mode [ 3538.016206][ T8] device .2279 left promiscuous mode [ 3538.077581][ T8] device .2280 left promiscuous mode [ 3538.136017][ T8] device .2281 left promiscuous mode [ 3538.195699][ T8] device .2282 left promiscuous mode [ 3538.235970][ T8] device .2283 left promiscuous mode [ 3538.305772][ T8] device .2284 left promiscuous mode [ 3538.385771][ T8] device .2285 left promiscuous mode [ 3538.435847][ T8] device .2286 left promiscuous mode [ 3538.475987][ T8] device .2287 left promiscuous mode [ 3538.545755][ T8] device .2288 left promiscuous mode [ 3538.595824][ T8] device .2289 left promiscuous mode [ 3538.646096][ T8] device .2290 left promiscuous mode [ 3538.705967][ T8] device .2291 left promiscuous mode [ 3538.755875][ T8] device .2292 left promiscuous mode [ 3538.806656][ T8] device .2293 left promiscuous mode [ 3538.856032][ T8] device .2294 left promiscuous mode [ 3538.905824][ T8] device .2295 left promiscuous mode [ 3538.946236][ T8] device .2296 left promiscuous mode [ 3539.005847][ T8] device .2297 left promiscuous mode [ 3539.065767][ T8] device .2298 left promiscuous mode [ 3539.125761][ T8] device .2299 left promiscuous mode [ 3539.195581][ T8] device .2300 left promiscuous mode [ 3539.255701][ T8] device .2301 left promiscuous mode [ 3539.325690][ T8] device .2302 left promiscuous mode [ 3539.385837][ T8] device .2303 left promiscuous mode [ 3539.447433][ T8] device .2304 left promiscuous mode [ 3539.505840][ T8] device .2305 left promiscuous mode [ 3539.575634][ T8] device .2306 left promiscuous mode [ 3539.635636][ T8] device .2307 left promiscuous mode [ 3539.685983][ T8] device .2308 left promiscuous mode [ 3539.755674][ T8] device .2309 left promiscuous mode [ 3539.795944][ T8] device .2310 left promiscuous mode [ 3539.846328][ T8] device .2311 left promiscuous mode [ 3539.905639][ T8] device .2312 left promiscuous mode [ 3539.965747][ T8] device .2313 left promiscuous mode [ 3540.025870][ T8] device .2314 left promiscuous mode [ 3540.066214][ T8] device .2315 left promiscuous mode [ 3540.125537][ T8] device .2316 left promiscuous mode [ 3540.185824][ T8] device .2317 left promiscuous mode [ 3540.225861][ T8] device .2318 left promiscuous mode [ 3540.285819][ T8] device .2319 left promiscuous mode [ 3540.345746][ T8] device .2320 left promiscuous mode [ 3540.405594][ T8] device .2321 left promiscuous mode [ 3540.445710][ T8] device .2322 left promiscuous mode [ 3540.505530][ T8] device .2323 left promiscuous mode [ 3540.566011][ T8] device .2324 left promiscuous mode [ 3540.625518][ T8] device .2325 left promiscuous mode [ 3540.675810][ T8] device .2326 left promiscuous mode [ 3540.736873][ T8] device .2327 left promiscuous mode [ 3540.805665][ T8] device .2328 left promiscuous mode [ 3540.845663][ T8] device .2329 left promiscuous mode [ 3540.905660][ T8] device .2330 left promiscuous mode [ 3540.950863][ T8] device .2331 left promiscuous mode [ 3541.017055][ T8] device .2332 left promiscuous mode [ 3541.075514][ T8] device .2333 left promiscuous mode [ 3541.145494][ T8] device .2334 left promiscuous mode [ 3541.205488][ T8] device .2335 left promiscuous mode [ 3541.255615][ T8] device .2336 left promiscuous mode [ 3541.308424][ T8] device .2337 left promiscuous mode [ 3541.365623][ T8] device .2338 left promiscuous mode [ 3541.435443][ T8] device .2339 left promiscuous mode [ 3541.495459][ T8] device .2340 left promiscuous mode [ 3541.542809][ T8] device .2341 left promiscuous mode [ 3541.595495][ T8] device .2342 left promiscuous mode [ 3541.635551][ T8] device .2343 left promiscuous mode [ 3541.695642][ T8] device .2344 left promiscuous mode [ 3541.755350][ T8] device .2345 left promiscuous mode [ 3541.795553][ T8] device .2346 left promiscuous mode [ 3541.845409][ T8] device .2347 left promiscuous mode [ 3541.915636][ T8] device .2348 left promiscuous mode [ 3541.975626][ T8] device .2349 left promiscuous mode [ 3542.035503][ T8] device .2350 left promiscuous mode [ 3542.095674][ T8] device .2351 left promiscuous mode [ 3542.165456][ T8] device .2352 left promiscuous mode [ 3542.215647][ T8] device .2353 left promiscuous mode [ 3542.275478][ T8] device .2354 left promiscuous mode [ 3542.335352][ T8] device .2355 left promiscuous mode [ 3542.375683][ T8] device .2356 left promiscuous mode [ 3542.445467][ T8] device .2357 left promiscuous mode [ 3542.485985][ T8] device .2358 left promiscuous mode [ 3542.555486][ T8] device .2359 left promiscuous mode [ 3542.615398][ T8] device .2360 left promiscuous mode [ 3542.655625][ T8] device .2361 left promiscuous mode [ 3542.715334][ T8] device .2362 left promiscuous mode [ 3542.785478][ T8] device .2363 left promiscuous mode [ 3542.855719][ T8] device .2364 left promiscuous mode [ 3542.915510][ T8] device .2365 left promiscuous mode [ 3542.975684][ T8] device .2366 left promiscuous mode [ 3543.045464][ T8] device .2367 left promiscuous mode [ 3543.115373][ T8] device .2368 left promiscuous mode [ 3543.155685][ T8] device .2369 left promiscuous mode [ 3543.235549][ T8] device .2370 left promiscuous mode [ 3543.285813][ T8] device .2371 left promiscuous mode [ 3543.365400][ T8] device .2372 left promiscuous mode [ 3543.426560][ T8] device .2373 left promiscuous mode [ 3543.465536][ T8] device .2374 left promiscuous mode [ 3543.505974][ T8] device .2375 left promiscuous mode [ 3543.566991][ T8] device .2376 left promiscuous mode [ 3543.625360][ T8] device .2377 left promiscuous mode [ 3543.708881][ T8] device .2378 left promiscuous mode [ 3543.765443][ T8] device .2379 left promiscuous mode [ 3543.846556][ T8] device .2380 left promiscuous mode [ 3543.905361][ T8] device .2381 left promiscuous mode [ 3543.976434][ T8] device .2382 left promiscuous mode [ 3544.035336][ T8] device .2383 left promiscuous mode [ 3544.086049][ T8] device .2384 left promiscuous mode [ 3544.145382][ T8] device .2385 left promiscuous mode [ 3544.185572][ T8] device .2386 left promiscuous mode [ 3544.225441][ T8] device .2387 left promiscuous mode [ 3544.265443][ T8] device .2388 left promiscuous mode [ 3544.305470][ T8] device .2389 left promiscuous mode [ 3544.365254][ T8] device .2390 left promiscuous mode [ 3544.425212][ T8] device .2391 left promiscuous mode [ 3544.465324][ T8] device .2392 left promiscuous mode [ 3544.535409][ T8] device .2393 left promiscuous mode [ 3544.605224][ T8] device .2394 left promiscuous mode [ 3544.645438][ T8] device .2395 left promiscuous mode [ 3544.705465][ T8] device .2396 left promiscuous mode [ 3544.775258][ T8] device .2397 left promiscuous mode [ 3544.835214][ T8] device .2398 left promiscuous mode [ 3544.875365][ T8] device .2399 left promiscuous mode [ 3544.935238][ T8] device .2400 left promiscuous mode [ 3545.015338][ T8] device .2401 left promiscuous mode [ 3545.065670][ T8] device .2402 left promiscuous mode [ 3545.135498][ T8] device .2403 left promiscuous mode [ 3545.197919][ T8] device .2404 left promiscuous mode [ 3545.265305][ T8] device .2405 left promiscuous mode [ 3545.318786][ T8] device .2406 left promiscuous mode [ 3545.375171][ T8] device .2407 left promiscuous mode [ 3545.415538][ T8] device .2408 left promiscuous mode [ 3545.457192][ T8] device .2409 left promiscuous mode [ 3545.515298][ T8] device .2410 left promiscuous mode [ 3545.555381][ T8] device .2411 left promiscuous mode [ 3545.615184][ T8] device .2412 left promiscuous mode [ 3545.657920][ T8] device .2413 left promiscuous mode [ 3545.715329][ T8] device .2414 left promiscuous mode [ 3545.785163][ T8] device .2415 left promiscuous mode [ 3545.855423][ T8] device .2416 left promiscuous mode [ 3545.915319][ T8] device .2417 left promiscuous mode [ 3545.975215][ T8] device .2418 left promiscuous mode [ 3546.035232][ T8] device .2419 left promiscuous mode [ 3546.097536][ T8] device .2420 left promiscuous mode [ 3546.155232][ T8] device .2421 left promiscuous mode [ 3546.195442][ T8] device .2422 left promiscuous mode [ 3546.235776][ T8] device .2423 left promiscuous mode [ 3546.285696][ T8] device .2424 left promiscuous mode [ 3546.335423][ T8] device .2425 left promiscuous mode [ 3546.375279][ T8] device .2426 left promiscuous mode [ 3546.425611][ T8] device .2427 left promiscuous mode [ 3546.485429][ T8] device .2428 left promiscuous mode [ 3546.545159][ T8] device .2429 left promiscuous mode [ 3546.605171][ T8] device .2430 left promiscuous mode [ 3546.665071][ T8] device .2431 left promiscuous mode [ 3546.733970][ T8] device .2432 left promiscuous mode [ 3546.785152][ T8] device .2433 left promiscuous mode [ 3546.845197][ T8] device .2434 left promiscuous mode [ 3546.895209][ T8] device .2435 left promiscuous mode [ 3546.935250][ T8] device .2436 left promiscuous mode [ 3546.986704][ T8] device .2437 left promiscuous mode [ 3547.055073][ T8] device .2438 left promiscuous mode [ 3547.095259][ T8] device .2439 left promiscuous mode [ 3547.138246][ T8] device .2440 left promiscuous mode [ 3547.195163][ T8] device .2441 left promiscuous mode [ 3547.235401][ T8] device .2442 left promiscuous mode [ 3547.275557][ T8] device .2443 left promiscuous mode [ 3547.335004][ T8] device .2444 left promiscuous mode [ 3547.375109][ T8] device .2445 left promiscuous mode [ 3547.436535][ T8] device .2446 left promiscuous mode [ 3547.495118][ T8] device .2447 left promiscuous mode [ 3547.555106][ T8] device .2448 left promiscuous mode [ 3547.595107][ T8] device .2449 left promiscuous mode [ 3547.635423][ T8] device .2450 left promiscuous mode [ 3547.697772][ T8] device .2451 left promiscuous mode [ 3547.755239][ T8] device .2452 left promiscuous mode [ 3547.795280][ T8] device .2453 left promiscuous mode [ 3547.865214][ T8] device .2454 left promiscuous mode [ 3547.905286][ T8] device .2455 left promiscuous mode [ 3547.945393][ T8] device .2456 left promiscuous mode [ 3547.985623][ T8] device .2457 left promiscuous mode [ 3548.025558][ T8] device .2458 left promiscuous mode [ 3548.075288][ T8] device .2459 left promiscuous mode [ 3548.135274][ T8] device .2460 left promiscuous mode [ 3548.215081][ T8] device .2461 left promiscuous mode [ 3548.275179][ T8] device .2462 left promiscuous mode [ 3548.335001][ T8] device .2463 left promiscuous mode [ 3548.395031][ T8] device .2464 left promiscuous mode [ 3548.435295][ T8] device .2465 left promiscuous mode [ 3548.505004][ T8] device .2466 left promiscuous mode [ 3548.555196][ T8] device .2467 left promiscuous mode [ 3548.595436][ T8] device .2468 left promiscuous mode [ 3548.655405][ T8] device .2469 left promiscuous mode [ 3548.727446][ T8] device .2470 left promiscuous mode [ 3548.785049][ T8] device .2471 left promiscuous mode [ 3548.825121][ T8] device .2472 left promiscuous mode [ 3548.875149][ T8] device .2473 left promiscuous mode [ 3548.925380][ T8] device .2474 left promiscuous mode [ 3548.985187][ T8] device .2475 left promiscuous mode [ 3549.045045][ T8] device .2476 left promiscuous mode [ 3549.104940][ T8] device .2477 left promiscuous mode [ 3549.164874][ T8] device .2478 left promiscuous mode [ 3549.205472][ T8] device .2479 left promiscuous mode [ 3549.295033][ T8] device .2480 left promiscuous mode [ 3549.335066][ T8] device .2481 left promiscuous mode [ 3549.365005][ T1653] INFO: task kworker/0:1:7 blocked for more than 143 seconds. [ 3549.372512][ T1653] Not tainted 5.10.0-rc6-syzkaller #0 [ 3549.385471][ T1653] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3549.395008][ T8] device .2482 left promiscuous mode [ 3549.399003][ T1653] task:kworker/0:1 state:D stack:26096 pid: 7 ppid: 2 flags:0x00004000 [ 3549.415974][ T1653] Workqueue: events ovs_dp_masks_rebalance [ 3549.422328][ T1653] Call Trace: [ 3549.425773][ T1653] __schedule+0x893/0x2130 [ 3549.432035][ T1653] ? io_schedule_timeout+0x140/0x140 [ 3549.439119][ T1653] ? _raw_spin_unlock_irq+0x1f/0x40 [ 3549.444447][ T1653] ? lockdep_hardirqs_on+0x79/0x100 [ 3549.457274][ T1653] schedule+0xcf/0x270 [ 3549.461393][ T1653] schedule_preempt_disabled+0xf/0x20 [ 3549.468706][ T1653] __mutex_lock+0x3e2/0x10e0 [ 3549.481607][ T1653] ? ovs_dp_masks_rebalance+0x20/0xf0 [ 3549.490931][ T1653] ? mutex_lock_io_nested+0xf60/0xf60 [ 3549.496794][ T1653] ovs_dp_masks_rebalance+0x20/0xf0 [ 3549.502120][ T1653] process_one_work+0x933/0x15a0 [ 3549.511066][ T1653] ? lock_release+0x710/0x710 [ 3549.520002][ T1653] ? pwq_dec_nr_in_flight+0x320/0x320 [ 3549.532004][ T1653] ? rwlock_bug.part.0+0x90/0x90 [ 3549.540375][ T1653] ? _raw_spin_lock_irq+0x41/0x50 [ 3549.545817][ T1653] worker_thread+0x64c/0x1120 [ 3549.550517][ T1653] ? process_one_work+0x15a0/0x15a0 [ 3549.559894][ T1653] kthread+0x3b1/0x4a0 [ 3549.567909][ T1653] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 3549.573819][ T1653] ret_from_fork+0x1f/0x30 [ 3549.580356][ T1653] INFO: task kworker/0:2:3003 blocked for more than 143 seconds. [ 3549.592166][ T1653] Not tainted 5.10.0-rc6-syzkaller #0 [ 3549.600200][ T1653] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3549.609314][ T1653] task:kworker/0:2 state:D stack:25728 pid: 3003 ppid: 2 flags:0x00004000 [ 3549.622720][ T1653] Workqueue: events ovs_dp_masks_rebalance [ 3549.629920][ T1653] Call Trace: [ 3549.636704][ T1653] __schedule+0x893/0x2130 [ 3549.641159][ T1653] ? io_schedule_timeout+0x140/0x140 [ 3549.648949][ T1653] ? _raw_spin_unlock_irq+0x1f/0x40 [ 3549.655450][ T1653] ? lockdep_hardirqs_on+0x79/0x100 [ 3549.660729][ T1653] schedule+0xcf/0x270 [ 3549.664990][ T1653] schedule_preempt_disabled+0xf/0x20 [ 3549.670377][ T1653] __mutex_lock+0x3e2/0x10e0 [ 3549.675320][ T1653] ? ovs_dp_masks_rebalance+0x20/0xf0 [ 3549.681438][ T1653] ? mutex_lock_io_nested+0xf60/0xf60 [ 3549.687662][ T1653] ? do_raw_spin_lock+0x120/0x2b0 [ 3549.692730][ T1653] ovs_dp_masks_rebalance+0x20/0xf0 [ 3549.700341][ T1653] process_one_work+0x933/0x15a0 [ 3549.706310][ T1653] ? lock_release+0x710/0x710 [ 3549.711911][ T1653] ? pwq_dec_nr_in_flight+0x320/0x320 [ 3549.717677][ T1653] ? rwlock_bug.part.0+0x90/0x90 [ 3549.723165][ T1653] ? _raw_spin_lock_irq+0x41/0x50 [ 3549.730647][ T1653] worker_thread+0x64c/0x1120 [ 3549.737633][ T1653] ? process_one_work+0x15a0/0x15a0 [ 3549.742968][ T1653] kthread+0x3b1/0x4a0 [ 3549.749209][ T1653] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 3549.756930][ T1653] ret_from_fork+0x1f/0x30 [ 3549.763413][ T1653] INFO: task kworker/0:4:9791 blocked for more than 143 seconds. [ 3549.772478][ T1653] Not tainted 5.10.0-rc6-syzkaller #0 [ 3549.782197][ T1653] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3549.791274][ T1653] task:kworker/0:4 state:D stack:25832 pid: 9791 ppid: 2 flags:0x00004000 [ 3549.803067][ T1653] Workqueue: events ovs_dp_masks_rebalance [ 3549.809459][ T1653] Call Trace: [ 3549.812780][ T1653] __schedule+0x893/0x2130 [ 3549.818649][ T1653] ? io_schedule_timeout+0x140/0x140 [ 3549.828300][ T1653] ? mark_lock+0xf7/0x1730 [ 3549.832742][ T1653] ? _raw_spin_unlock_irq+0x25/0x40 [ 3549.839273][ T1653] schedule+0xcf/0x270 [ 3549.843645][ T1653] schedule_preempt_disabled+0xf/0x20 [ 3549.859560][ T1653] __mutex_lock+0x3e2/0x10e0 [ 3549.864194][ T1653] ? ovs_dp_masks_rebalance+0x20/0xf0 [ 3549.874148][ T1653] ? mutex_lock_io_nested+0xf60/0xf60 [ 3549.880798][ T1653] ovs_dp_masks_rebalance+0x20/0xf0 [ 3549.886408][ T1653] process_one_work+0x933/0x15a0 [ 3549.891374][ T1653] ? lock_release+0x710/0x710 [ 3549.897299][ T1653] ? pwq_dec_nr_in_flight+0x320/0x320 [ 3549.903330][ T1653] ? rwlock_bug.part.0+0x90/0x90 [ 3549.909874][ T1653] ? _raw_spin_lock_irq+0x41/0x50 [ 3549.918790][ T1653] worker_thread+0x64c/0x1120 [ 3549.923499][ T1653] ? __kthread_parkme+0x13f/0x1e0 [ 3549.932767][ T1653] ? process_one_work+0x15a0/0x15a0 [ 3549.939205][ T1653] kthread+0x3b1/0x4a0 [ 3549.945249][ T1653] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 3549.951188][ T1653] ret_from_fork+0x1f/0x30 [ 3549.957578][ T1653] INFO: task kworker/0:11:23748 blocked for more than 143 seconds. [ 3549.966461][ T1653] Not tainted 5.10.0-rc6-syzkaller #0 [ 3549.972370][ T1653] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3549.982171][ T1653] task:kworker/0:11 state:D stack:26440 pid:23748 ppid: 2 flags:0x00004000 [ 3549.993007][ T1653] Workqueue: events ovs_dp_masks_rebalance [ 3549.999849][ T1653] Call Trace: [ 3550.003171][ T1653] __schedule+0x893/0x2130 [ 3550.009207][ T1653] ? io_schedule_timeout+0x140/0x140 [ 3550.018209][ T1653] ? _raw_spin_unlock_irq+0x1f/0x40 [ 3550.024476][ T1653] ? lockdep_hardirqs_on+0x79/0x100 [ 3550.030432][ T1653] schedule+0xcf/0x270 [ 3550.034958][ T1653] schedule_preempt_disabled+0xf/0x20 [ 3550.042404][ T1653] __mutex_lock+0x3e2/0x10e0 [ 3550.047612][ T1653] ? ovs_dp_masks_rebalance+0x20/0xf0 [ 3550.053276][ T1653] ? mutex_lock_io_nested+0xf60/0xf60 [ 3550.060892][ T1653] ovs_dp_masks_rebalance+0x20/0xf0 [ 3550.069952][ T1653] process_one_work+0x933/0x15a0 [ 3550.078164][ T1653] ? lock_release+0x710/0x710 [ 3550.082928][ T1653] ? pwq_dec_nr_in_flight+0x320/0x320 [ 3550.092585][ T1653] ? rwlock_bug.part.0+0x90/0x90 [ 3550.100093][ T1653] ? _raw_spin_lock_irq+0x41/0x50 [ 3550.105689][ T1653] worker_thread+0x64c/0x1120 [ 3550.110382][ T1653] ? process_one_work+0x15a0/0x15a0 [ 3550.118280][ T1653] kthread+0x3b1/0x4a0 [ 3550.123660][ T1653] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 3550.130311][ T1653] ret_from_fork+0x1f/0x30 [ 3550.136147][ T1653] INFO: task kworker/0:0:9011 blocked for more than 144 seconds. [ 3550.143866][ T1653] Not tainted 5.10.0-rc6-syzkaller #0 [ 3550.152722][ T8] device .2483 left promiscuous mode [ 3550.159402][ T1653] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3550.170863][ T1653] task:kworker/0:0 state:D stack:27376 pid: 9011 ppid: 2 flags:0x00004000 [ 3550.180920][ T1653] Workqueue: events ovs_dp_masks_rebalance [ 3550.191271][ T1653] Call Trace: [ 3550.196686][ T1653] __schedule+0x893/0x2130 [ 3550.201138][ T1653] ? io_schedule_timeout+0x140/0x140 [ 3550.207966][ T1653] ? _raw_spin_unlock_irq+0x1f/0x40 [ 3550.215275][ T1653] ? lockdep_hardirqs_on+0x79/0x100 [ 3550.220497][ T1653] schedule+0xcf/0x270 [ 3550.224898][ T1653] schedule_preempt_disabled+0xf/0x20 [ 3550.230646][ T1653] __mutex_lock+0x3e2/0x10e0 [ 3550.235612][ T1653] ? ovs_dp_masks_rebalance+0x20/0xf0 [ 3550.241006][ T1653] ? mutex_lock_io_nested+0xf60/0xf60 [ 3550.248944][ T1653] ovs_dp_masks_rebalance+0x20/0xf0 [ 3550.255311][ T1653] process_one_work+0x933/0x15a0 [ 3550.260271][ T1653] ? lock_release+0x710/0x710 [ 3550.268557][ T1653] ? pwq_dec_nr_in_flight+0x320/0x320 [ 3550.276405][ T1653] ? rwlock_bug.part.0+0x90/0x90 [ 3550.282225][ T1653] ? _raw_spin_lock_irq+0x41/0x50 [ 3550.289045][ T1653] worker_thread+0x64c/0x1120 [ 3550.293773][ T1653] ? __kthread_parkme+0x13f/0x1e0 [ 3550.300068][ T1653] ? process_one_work+0x15a0/0x15a0 [ 3550.307951][ T1653] kthread+0x3b1/0x4a0 [ 3550.312043][ T1653] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 3550.318366][ T1653] ret_from_fork+0x1f/0x30 [ 3550.330468][ T1653] INFO: task kworker/0:3:22737 blocked for more than 144 seconds. [ 3550.339384][ T1653] Not tainted 5.10.0-rc6-syzkaller #0 [ 3550.345814][ T1653] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3550.355302][ T1653] task:kworker/0:3 state:D stack:28536 pid:22737 ppid: 2 flags:0x00004000 [ 3550.364633][ T1653] Workqueue: events ovs_dp_masks_rebalance [ 3550.370826][ T1653] Call Trace: [ 3550.375991][ T1653] __schedule+0x893/0x2130 [ 3550.380498][ T1653] ? io_schedule_timeout+0x140/0x140 [ 3550.388074][ T1653] ? _raw_spin_unlock_irq+0x1f/0x40 [ 3550.393292][ T1653] ? lockdep_hardirqs_on+0x79/0x100 [ 3550.400151][ T1653] schedule+0xcf/0x270 [ 3550.404243][ T1653] schedule_preempt_disabled+0xf/0x20 [ 3550.410198][ T1653] __mutex_lock+0x3e2/0x10e0 [ 3550.418174][ T1653] ? ovs_dp_masks_rebalance+0x20/0xf0 [ 3550.424180][ T1653] ? mutex_lock_io_nested+0xf60/0xf60 [ 3550.430097][ T1653] ovs_dp_masks_rebalance+0x20/0xf0 [ 3550.436345][ T1653] process_one_work+0x933/0x15a0 [ 3550.441312][ T1653] ? lock_release+0x710/0x710 [ 3550.448695][ T1653] ? pwq_dec_nr_in_flight+0x320/0x320 [ 3550.456621][ T1653] ? rwlock_bug.part.0+0x90/0x90 [ 3550.461594][ T1653] ? _raw_spin_lock_irq+0x41/0x50 [ 3550.468672][ T1653] worker_thread+0x64c/0x1120 [ 3550.473510][ T1653] ? __kthread_parkme+0x13f/0x1e0 [ 3550.479344][ T1653] ? process_one_work+0x15a0/0x15a0 [ 3550.485272][ T1653] kthread+0x3b1/0x4a0 [ 3550.489830][ T1653] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 3550.497531][ T1653] ret_from_fork+0x1f/0x30 [ 3550.502087][ T1653] INFO: task syz-executor.1:2193 blocked for more than 144 seconds. [ 3550.513274][ T8] device .2484 left promiscuous mode [ 3550.513347][ T1653] Not tainted 5.10.0-rc6-syzkaller #0 [ 3550.530973][ T1653] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3550.543086][ T1653] task:syz-executor.1 state:D stack:27624 pid: 2193 ppid: 8486 flags:0x00004004 [ 3550.555609][ T1653] Call Trace: [ 3550.559618][ T1653] __schedule+0x893/0x2130 [ 3550.564059][ T1653] ? io_schedule_timeout+0x140/0x140 [ 3550.569774][ T1653] schedule+0xcf/0x270 [ 3550.573891][ T1653] schedule_preempt_disabled+0xf/0x20 [ 3550.579453][ T1653] __mutex_lock+0x3e2/0x10e0 [ 3550.585299][ T1653] ? ovs_dp_cmd_new+0x4c4/0xec0 [ 3550.590210][ T1653] ? mutex_lock_io_nested+0xf60/0xf60 [ 3550.596180][ T1653] ? rcu_read_lock_sched_held+0x3a/0x70 [ 3550.602150][ T1653] ? trace_kmalloc_node+0xc1/0xf0 [ 3550.607926][ T1653] ? nr_free_zone_pages+0xcc/0x200 [ 3550.613835][ T1653] ovs_dp_cmd_new+0x4c4/0xec0 [ 3550.620829][ T1653] ? ovs_vport_cmd_new+0xc60/0xc60 [ 3550.627349][ T1653] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1b7/0x280 [ 3550.636458][ T1653] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 3550.643802][ T1653] genl_family_rcv_msg_doit+0x228/0x320 [ 3550.652924][ T1653] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 3550.661041][ T1653] ? ns_capable+0xde/0x100 [ 3550.667695][ T1653] genl_rcv_msg+0x328/0x580 [ 3550.673191][ T1653] ? genl_get_cmd+0x480/0x480 [ 3550.678398][ T1653] ? ovs_vport_cmd_new+0xc60/0xc60 [ 3550.683944][ T1653] ? lock_release+0x710/0x710 [ 3550.690202][ T1653] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 3550.696801][ T1653] netlink_rcv_skb+0x153/0x420 [ 3550.702636][ T1653] ? genl_get_cmd+0x480/0x480 [ 3550.707790][ T1653] ? netlink_ack+0xaa0/0xaa0 [ 3550.712444][ T1653] genl_rcv+0x24/0x40 [ 3550.718254][ T1653] netlink_unicast+0x533/0x7d0 [ 3550.723047][ T1653] ? netlink_attachskb+0x810/0x810 [ 3550.729864][ T1653] ? __phys_addr_symbol+0x2c/0x70 [ 3550.735747][ T1653] ? __check_object_size+0x171/0x3f0 [ 3550.741187][ T1653] netlink_sendmsg+0x856/0xd90 [ 3550.749052][ T1653] ? netlink_unicast+0x7d0/0x7d0 [ 3550.757565][ T1653] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 3550.764938][ T1653] ? netlink_unicast+0x7d0/0x7d0 [ 3550.775182][ T1653] sock_sendmsg+0xcf/0x120 [ 3550.779596][ T1653] ____sys_sendmsg+0x6e8/0x810 [ 3550.784374][ T1653] ? kernel_sendmsg+0x50/0x50 [ 3550.789365][ T1653] ? do_recvmmsg+0x6c0/0x6c0 [ 3550.793974][ T1653] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 3550.805744][ T1653] ___sys_sendmsg+0xf3/0x170 [ 3550.810495][ T1653] ? sendmsg_copy_msghdr+0x160/0x160 [ 3550.821480][ T1653] ? __fget_files+0x272/0x400 [ 3550.827658][ T1653] ? lock_downgrade+0x6d0/0x6d0 [ 3550.832525][ T1653] ? find_held_lock+0x2d/0x110 [ 3550.838844][ T1653] ? __fget_files+0x294/0x400 [ 3550.843671][ T1653] ? __fget_light+0xea/0x280 [ 3550.851103][ T1653] __sys_sendmsg+0xe5/0x1b0 [ 3550.858736][ T1653] ? __sys_sendmsg_sock+0xb0/0xb0 [ 3550.863961][ T1653] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3550.877614][ T1653] do_syscall_64+0x2d/0x70 [ 3550.883702][ T1653] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3550.890031][ T1653] RIP: 0033:0x45e159 [ 3550.894372][ T1653] RSP: 002b:00007f2daa3acc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3550.909502][ T1653] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e159 [ 3550.918762][ T1653] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 3550.928042][ T1653] RBP: 000000000119c068 R08: 0000000000000000 R09: 0000000000000000 [ 3550.939634][ T1653] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119c034 [ 3550.947962][ T1653] R13: 00007ffe02dfd04f R14: 00007f2daa3ad9c0 R15: 000000000119c034 [ 3550.962419][ T1653] INFO: task kworker/0:5:2220 blocked for more than 144 seconds. [ 3550.971238][ T1653] Not tainted 5.10.0-rc6-syzkaller #0 [ 3550.980177][ T1653] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3550.988945][ T1653] task:kworker/0:5 state:D stack:29576 pid: 2220 ppid: 2 flags:0x00004000 [ 3550.999447][ T1653] Workqueue: events ovs_dp_masks_rebalance [ 3551.006802][ T1653] Call Trace: [ 3551.010117][ T1653] __schedule+0x893/0x2130 [ 3551.015026][ T1653] ? io_schedule_timeout+0x140/0x140 [ 3551.022839][ T1653] ? _raw_spin_unlock_irq+0x1f/0x40 [ 3551.028452][ T1653] ? lockdep_hardirqs_on+0x79/0x100 [ 3551.035290][ T1653] schedule+0xcf/0x270 [ 3551.039381][ T1653] schedule_preempt_disabled+0xf/0x20 [ 3551.046015][ T1653] __mutex_lock+0x3e2/0x10e0 [ 3551.046036][ T1653] ? ovs_dp_masks_rebalance+0x20/0xf0 [ 3551.046058][ T1653] ? mutex_lock_io_nested+0xf60/0xf60 [ 3551.046100][ T1653] ovs_dp_masks_rebalance+0x20/0xf0 [ 3551.046119][ T1653] process_one_work+0x933/0x15a0 [ 3551.046154][ T1653] ? lock_release+0x710/0x710 [ 3551.078878][ T1653] ? pwq_dec_nr_in_flight+0x320/0x320 [ 3551.086934][ T1653] ? rwlock_bug.part.0+0x90/0x90 [ 3551.091883][ T1653] ? _raw_spin_lock_irq+0x41/0x50 [ 3551.100096][ T1653] worker_thread+0x64c/0x1120 [ 3551.105720][ T1653] ? __kthread_parkme+0x13f/0x1e0 [ 3551.110773][ T1653] ? process_one_work+0x15a0/0x15a0 [ 3551.116394][ T1653] kthread+0x3b1/0x4a0 [ 3551.120750][ T1653] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 3551.128679][ T1653] ret_from_fork+0x1f/0x30 [ 3551.136821][ T1653] [ 3551.136821][ T1653] Showing all locks held in the system: [ 3551.144989][ T1653] 3 locks held by kworker/0:1/7: [ 3551.150403][ T1653] #0: ffff888010064d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x821/0x15a0 [ 3551.161906][ T1653] #1: ffffc90000cc7da8 ((work_completion)(&(&ovs_net->masks_rebalance)->work)){+.+.}-{0:0}, at: process_one_work+0x854/0x15a0 [ 3551.174246][ T8] device .2485 left promiscuous mode [ 3551.177270][ T1653] #2: ffffffff8cd39b68 (ovs_mutex){+.+.}-{3:3}, at: ovs_dp_masks_rebalance+0x20/0xf0 [ 3551.192838][ T1653] 6 locks held by kworker/u4:0/8: [ 3551.200438][ T1653] #0: ffff88814079b138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x821/0x15a0 [ 3551.213313][ T1653] #1: ffffc90000cd7da8 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x854/0x15a0 [ 3551.224735][ T1653] #2: ffffffff8c91ac90 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa00 [ 3551.235727][ T1653] #3: ffffffff8cd39b68 (ovs_mutex){+.+.}-{3:3}, at: ovs_exit_net+0x1de/0xba0 [ 3551.246075][ T1653] #4: ffffffff8c92ce48 (rtnl_mutex){+.+.}-{3:3}, at: internal_dev_destroy+0x6f/0x150 [ 3551.258222][ T1653] #5: ffffffff8b3400e8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x4f2/0x610 [ 3551.269564][ T1653] 1 lock held by khungtaskd/1653: [ 3551.278121][ T1653] #0: ffffffff8b337a20 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 [ 3551.291947][ T1653] 3 locks held by kworker/0:2/3003: [ 3551.300957][ T1653] #0: ffff888010064d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x821/0x15a0 [ 3551.312746][ T1653] #1: ffffc900018ffda8 ((work_completion)(&(&ovs_net->masks_rebalance)->work)){+.+.}-{0:0}, at: process_one_work+0x854/0x15a0 [ 3551.327757][ T1653] #2: ffffffff8cd39b68 (ovs_mutex){+.+.}-{3:3}, at: ovs_dp_masks_rebalance+0x20/0xf0 [ 3551.339765][ T1653] 2 locks held by systemd-journal/4884: [ 3551.345688][ T1653] #0: ffff8880b9f34998 (&rq->lock){-.-.}-{2:2}, at: newidle_balance+0x789/0xe50 [ 3551.356292][ T1653] #1: ffff888011708158 (&ep->lock){.-.-}-{2:2}, at: __might_fault+0xa3/0x180 [ 3551.366548][ T1653] 1 lock held by in:imklog/8166: [ 3551.371488][ T1653] #0: ffff8880132feff0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 [ 3551.381992][ T1653] 3 locks held by kworker/0:4/9791: [ 3551.388221][ T1653] #0: ffff888010064d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x821/0x15a0 [ 3551.399860][ T1653] #1: ffffc9000bbc7da8 ((work_completion)(&(&ovs_net->masks_rebalance)->work)){+.+.}-{0:0}, at: process_one_work+0x854/0x15a0 [ 3551.413197][ T1653] #2: ffffffff8cd39b68 (ovs_mutex){+.+.}-{3:3}, at: ovs_dp_masks_rebalance+0x20/0xf0 [ 3551.423905][ T1653] 3 locks held by kworker/0:11/23748: [ 3551.429517][ T1653] #0: ffff888010064d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x821/0x15a0 [ 3551.440773][ T1653] #1: ffffc9000199fda8 ((work_completion)(&(&ovs_net->masks_rebalance)->work)){+.+.}-{0:0}, at: process_one_work+0x854/0x15a0 [ 3551.456758][ T1653] #2: ffffffff8cd39b68 (ovs_mutex){+.+.}-{3:3}, at: ovs_dp_masks_rebalance+0x20/0xf0 [ 3551.469105][ T1653] 3 locks held by kworker/1:3/667: [ 3551.474217][ T1653] #0: ffff888010064d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x821/0x15a0 [ 3551.487403][ T1653] #1: ffffc90001abfda8 ((work_completion)(&(&ovs_net->masks_rebalance)->work)){+.+.}-{0:0}, at: process_one_work+0x854/0x15a0 [ 3551.500824][ T1653] #2: ffffffff8cd39b68 (ovs_mutex){+.+.}-{3:3}, at: ovs_dp_masks_rebalance+0x20/0xf0 [ 3551.512583][ T1653] 3 locks held by kworker/0:0/9011: [ 3551.519137][ T1653] #0: ffff888010064d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x821/0x15a0 [ 3551.530400][ T1653] #1: ffffc9000b167da8 ((work_completion)(&(&ovs_net->masks_rebalance)->work)){+.+.}-{0:0}, at: process_one_work+0x854/0x15a0 [ 3551.547070][ T1653] #2: ffffffff8cd39b68 (ovs_mutex){+.+.}-{3:3}, at: ovs_dp_masks_rebalance+0x20/0xf0 [ 3551.557068][ T1653] 3 locks held by kworker/0:3/22737: [ 3551.562344][ T1653] #0: ffff888010064d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x821/0x15a0 [ 3551.575424][ T1653] #1: ffffc9000207fda8 ((work_completion)(&(&ovs_net->masks_rebalance)->work)){+.+.}-{0:0}, at: process_one_work+0x854/0x15a0 [ 3551.589384][ T1653] #2: ffffffff8cd39b68 (ovs_mutex){+.+.}-{3:3}, at: ovs_dp_masks_rebalance+0x20/0xf0 [ 3551.599081][ T1653] 2 locks held by syz-executor.1/2193: [ 3551.604920][ T1653] #0: ffffffff8c9b4bb0 (cb_lock){++++}-{3:3}, at: genl_rcv+0x15/0x40 [ 3551.613155][ T1653] #1: ffffffff8cd39b68 (ovs_mutex){+.+.}-{3:3}, at: ovs_dp_cmd_new+0x4c4/0xec0 [ 3551.622584][ T1653] 3 locks held by kworker/0:5/2220: [ 3551.627996][ T1653] #0: ffff888010064d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x821/0x15a0 [ 3551.638792][ T1653] #1: ffffc90001f9fda8 ((work_completion)(&(&ovs_net->masks_rebalance)->work)){+.+.}-{0:0}, at: process_one_work+0x854/0x15a0 [ 3551.652165][ T1653] #2: ffffffff8cd39b68 (ovs_mutex){+.+.}-{3:3}, at: ovs_dp_masks_rebalance+0x20/0xf0 [ 3551.663081][ T1653] 2 locks held by kworker/0:6/2222: [ 3551.668683][ T1653] #0: ffff888010066538 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x821/0x15a0 [ 3551.680986][ T1653] #1: ffffc9000216fda8 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x854/0x15a0 [ 3551.693655][ T1653] 2 locks held by syz-executor.4/2472: [ 3551.701640][ T1653] #0: ffffffff8c9b4bb0 (cb_lock){++++}-{3:3}, at: genl_rcv+0x15/0x40 [ 3551.710365][ T1653] #1: ffffffff8cd39b68 (ovs_mutex){+.+.}-{3:3}, at: ovs_dp_cmd_new+0x4c4/0xec0 [ 3551.720692][ T1653] [ 3551.729871][ T1653] ============================================= [ 3551.729871][ T1653] [ 3551.740763][ T1653] NMI backtrace for cpu 0 [ 3551.745230][ T1653] CPU: 0 PID: 1653 Comm: khungtaskd Not tainted 5.10.0-rc6-syzkaller #0 [ 3551.754320][ T1653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3551.764389][ T1653] Call Trace: [ 3551.767685][ T1653] dump_stack+0x107/0x163 [ 3551.772007][ T1653] nmi_cpu_backtrace.cold+0x44/0xd7 [ 3551.777189][ T1653] ? lapic_can_unplug_cpu+0x80/0x80 [ 3551.782377][ T1653] nmi_trigger_cpumask_backtrace+0x1b3/0x230 [ 3551.788358][ T1653] watchdog+0xd43/0xfa0 [ 3551.792507][ T1653] ? reset_hung_task_detector+0x30/0x30 [ 3551.798121][ T1653] kthread+0x3b1/0x4a0 [ 3551.802196][ T1653] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 3551.808083][ T1653] ret_from_fork+0x1f/0x30 [ 3551.813992][ T1653] Sending NMI from CPU 0 to CPUs 1: [ 3551.820257][ C1] NMI backtrace for cpu 1 [ 3551.820265][ C1] CPU: 1 PID: 4884 Comm: systemd-journal Not tainted 5.10.0-rc6-syzkaller #0 [ 3551.820273][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3551.820277][ C1] RIP: 0033:0x7f610d313f70 [ 3551.820291][ C1] Code: 68 07 00 00 00 e9 70 ff ff ff ff 25 8a f9 1d 00 68 08 00 00 00 e9 60 ff ff ff ff 25 82 f9 1d 00 68 09 00 00 00 e9 50 ff ff ff 25 7a f9 1d 00 68 0a 00 00 00 e9 40 ff ff ff ff 25 72 f9 1d 00 [ 3551.820297][ C1] RSP: 002b:00007ffcf5a5cd58 EFLAGS: 00000246 [ 3551.820307][ C1] RAX: 000055a46d46e1e0 RBX: 00007ffcf5a5cd70 RCX: 0000000000000000 [ 3551.820313][ C1] RDX: 00007ffcf5a5cd68 RSI: 00007ffcf5a5cd70 RDI: 0000000000000000 [ 3551.820320][ C1] RBP: 00007ffcf5a5cd68 R08: 000055a46d470570 R09: 00007ffcf5b670f0 [ 3551.820326][ C1] R10: 00000000000ab6d4 R11: 0000000000000202 R12: 000055a46d46e780 [ 3551.820332][ C1] R13: 00007ffcf5a5ce68 R14: 000055a46cf0c958 R15: 0005b62d536d4f22 [ 3551.820338][ C1] FS: 00007f610d70d8c0 GS: 0000000000000000 [ 3551.822711][ T1653] Kernel panic - not syncing: hung_task: blocked tasks [ 3551.927745][ T1653] CPU: 0 PID: 1653 Comm: khungtaskd Not tainted 5.10.0-rc6-syzkaller #0 [ 3551.936066][ T1653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3551.946116][ T1653] Call Trace: [ 3551.949413][ T1653] dump_stack+0x107/0x163 [ 3551.954510][ T1653] panic+0x306/0x73d [ 3551.959387][ T1653] ? __warn_printk+0xf3/0xf3 [ 3551.965145][ T1653] ? lapic_can_unplug_cpu+0x80/0x80 [ 3551.970351][ T1653] ? preempt_schedule_thunk+0x16/0x18 [ 3551.975729][ T1653] ? watchdog.cold+0x5/0x158 [ 3551.981250][ T1653] ? watchdog+0xa80/0xfa0 [ 3551.986601][ T1653] watchdog.cold+0x16/0x158 [ 3551.991114][ T1653] ? reset_hung_task_detector+0x30/0x30 [ 3551.996669][ T1653] kthread+0x3b1/0x4a0 [ 3552.000745][ T1653] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 3552.006648][ T1653] ret_from_fork+0x1f/0x30 [ 3552.011984][ T1653] Kernel Offset: disabled [ 3552.016401][ T1653] Rebooting in 86400 seconds..