Starting OpenBSD Secure Shell server... [ OK ] Started Regular background program processing daemon. [ OK ] Started Daily apt download activities. [ OK ] Started Daily apt upgrade and clean activities. [ OK ] Reached target Timers. [ OK ] Started System Logging Service. [ OK ] Started Permit User Sessions. [ 66.007124][ T6836] sshd (6836) used greatest stack depth: 23296 bytes left [ OK ] Started OpenBSD Secure Shell server. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. Starting Load/Save RF Kill Switch Status... [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Load/Save RF Kill Switch Status. [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.3' (ECDSA) to the list of known hosts. 2020/07/22 22:28:18 fuzzer started 2020/07/22 22:28:19 dialing manager at 10.128.0.26:40683 2020/07/22 22:28:24 syscalls: 118 2020/07/22 22:28:24 code coverage: enabled 2020/07/22 22:28:24 comparison tracing: enabled 2020/07/22 22:28:24 extra coverage: enabled 2020/07/22 22:28:24 setuid sandbox: enabled 2020/07/22 22:28:24 namespace sandbox: enabled 2020/07/22 22:28:24 Android sandbox: /sys/fs/selinux/policy does not exist 2020/07/22 22:28:24 fault injection: enabled 2020/07/22 22:28:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/22 22:28:24 net packet injection: enabled 2020/07/22 22:28:24 net device setup: enabled 2020/07/22 22:28:24 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/07/22 22:28:24 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/22 22:28:24 USB emulation: enabled 22:29:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000080), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)=0xffffffff80000001) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000340)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(cbc(sm4-generic),sha1-ce)\x00'}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="e5f685df99c514120e", 0x9}, {&(0x7f0000000680)}], 0x2, &(0x7f0000000840)=[{0xe8, 0x94fecbf5fb1ae13, 0x1, "60719d5456a3ab83c944b88d1661ef46bd42c095e69362d6de60d5d5508be8b1c2a708c8e7673992345553eee2bdf4d2229b70d2e2b71790a441918bc60bdcfe0fae3ad06143ba9c41fb5eb818a65a7aeb61a4c344f2435a4b8fefbdda4ddf21d6da4c7d345de59a954bf11b13945f6405ae5dcd6d201b00876b037228851c42a0bd99a5b9649c019e9601642dcb4f9e0d1c3933e7d434703b77d935421d67b765c77f86c58bce6e6aefffb514384d12bb6765e824d1fdaf8decb85152403dd6b2599a783ce4048cfdb1f09d10606a4b4d"}, {0xb8, 0x11, 0x7, "d68843cf75520843e619b55c393d08546c2ca85567ff4b910f26bc990fe99af78e36adf7c7012daa12dd4b563fdb68c4f7fbbb852553c7e55e4d6d05555d9dac6aceeec51c0073a0c12eda7bdde6807c78a93970df38d03de02cf4070d3c189aa6c9b708563b81ec906bb817656903f5d44bd5a0f1a57528d3f026b528efae59006882b24939321e2dd88aea06173f89134147fb20de3d7839a72c4af8ae8418799576a1e0"}, {0x28, 0x114, 0x800, "8537e6e5024224bbf9fe393a1fd69ba866a7b5ab8d514dc6"}], 0x1c8}, 0xc050) mkdir(&(0x7f0000000140)='./file0\x00', 0x14) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x0, 0x4, 0x2}}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000006c0)}, {&(0x7f0000000440)="2b64cbc80491dc81c13ba902bd5050a6ddf117555d6f7bf4e5ccafbe4e88c14bd04570b53174dfc000214cc63a04e3729025bf30e93839fd28ab029383f21d810120e75981e2f91fb5087e0683d213289f7e70fd1eb35a9768de4c0c53", 0x5d}, {&(0x7f0000000800)="a29d27dd7f973ff38a06b5dcad6eab7714ee6195", 0x14}], 0x3}, 0x2000c840) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x4) recvmsg(r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x8}, 0xc) syzkaller login: [ 159.531493][ T7011] IPVS: ftp: loaded support on port[0] = 21 22:29:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000180)=0x3f) [ 159.757135][ T7011] chnl_net:caif_netlink_parms(): no params data found [ 159.919670][ T7011] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.931737][ T7011] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.946611][ T7011] device bridge_slave_0 entered promiscuous mode [ 159.961000][ T7011] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.972416][ T7011] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.987900][ T7011] device bridge_slave_1 entered promiscuous mode [ 160.054838][ T7011] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 160.079618][ T7011] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 160.084553][ T7145] IPVS: ftp: loaded support on port[0] = 21 [ 160.137841][ T7011] team0: Port device team_slave_0 added [ 160.151459][ T7011] team0: Port device team_slave_1 added 22:29:39 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0xd4, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x2b, 0x0, 0x1, 0x10, 0x0, 0x180}, 0x25) [ 160.227277][ T7011] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 160.254703][ T7011] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.324599][ T7011] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 160.374950][ T7011] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 160.393110][ T7011] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.464757][ T7011] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 160.565563][ T7189] IPVS: ftp: loaded support on port[0] = 21 22:29:40 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, r1, 0x2}, 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r3, 0x0, 0x0}, 0x10) gettid() [ 160.709085][ T7011] device hsr_slave_0 entered promiscuous mode [ 160.764753][ T7011] device hsr_slave_1 entered promiscuous mode [ 160.998144][ T7145] chnl_net:caif_netlink_parms(): no params data found 22:29:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) close(0xffffffffffffffff) socketpair(0x2, 0x6, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair(0x0, 0x0, 0x9, 0x0) socket$kcm(0xa, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) [ 161.120265][ T7288] IPVS: ftp: loaded support on port[0] = 21 [ 161.460458][ T7145] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.495472][ T7145] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.517047][ T7145] device bridge_slave_0 entered promiscuous mode [ 161.600860][ T7145] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.614860][ T7145] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.646074][ T7145] device bridge_slave_1 entered promiscuous mode [ 161.681293][ T7189] chnl_net:caif_netlink_parms(): no params data found 22:29:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x3}, {0x0, 0x3}, {}]}, @func_proto, @enum]}}, &(0x7f00000002c0)=""/4071, 0x56, 0xfe7, 0x1041}, 0x20) [ 161.907425][ T7145] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 161.978940][ T7145] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.015800][ T7478] IPVS: ftp: loaded support on port[0] = 21 [ 162.140520][ T7011] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 162.250630][ T7288] chnl_net:caif_netlink_parms(): no params data found [ 162.263691][ T7145] team0: Port device team_slave_0 added [ 162.269924][ T7011] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 162.304573][ T7189] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.311950][ T7189] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.327225][ T7189] device bridge_slave_0 entered promiscuous mode [ 162.363799][ T7145] team0: Port device team_slave_1 added [ 162.372027][ T7011] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 162.408074][ T7189] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.416895][ T7189] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.431559][ T7189] device bridge_slave_1 entered promiscuous mode [ 162.490639][ T7011] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 162.579779][ T7591] IPVS: ftp: loaded support on port[0] = 21 [ 162.600347][ T7145] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 162.610306][ T7145] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 162.640353][ T7145] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 162.658885][ T7145] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 162.667492][ T7145] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 162.695758][ T7145] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 162.714374][ T7189] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.731116][ T7189] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.827915][ T7189] team0: Port device team_slave_0 added [ 162.920092][ T7145] device hsr_slave_0 entered promiscuous mode [ 162.974753][ T7145] device hsr_slave_1 entered promiscuous mode [ 163.013397][ T7145] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 163.021566][ T7145] Cannot create hsr debugfs directory [ 163.035649][ T7189] team0: Port device team_slave_1 added [ 163.159568][ T7189] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 163.167055][ T7189] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 163.197465][ T7189] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 163.237305][ T7288] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.245743][ T7288] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.255366][ T7288] device bridge_slave_0 entered promiscuous mode [ 163.269304][ T7189] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 163.278690][ T7189] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 163.306086][ T7189] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 163.342475][ T7288] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.353600][ T7288] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.362014][ T7288] device bridge_slave_1 entered promiscuous mode [ 163.400246][ T7288] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.422496][ T7288] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.579457][ T7189] device hsr_slave_0 entered promiscuous mode [ 163.623683][ T7189] device hsr_slave_1 entered promiscuous mode [ 163.673403][ T7189] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 163.681437][ T7189] Cannot create hsr debugfs directory [ 163.708730][ T7288] team0: Port device team_slave_0 added [ 163.799575][ T7591] chnl_net:caif_netlink_parms(): no params data found [ 163.832328][ T7288] team0: Port device team_slave_1 added [ 163.970779][ T7288] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 163.979350][ T7288] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 164.008546][ T7288] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 164.021357][ T7478] chnl_net:caif_netlink_parms(): no params data found [ 164.072382][ T7011] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.081031][ T7288] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 164.094008][ T7288] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 164.122536][ T7288] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 164.338624][ T7288] device hsr_slave_0 entered promiscuous mode [ 164.394109][ T7288] device hsr_slave_1 entered promiscuous mode [ 164.452916][ T7288] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 164.461685][ T7288] Cannot create hsr debugfs directory [ 164.509370][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.531126][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.628017][ T7011] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.677787][ T7145] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 164.764925][ T7591] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.772230][ T7591] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.784373][ T7591] device bridge_slave_0 entered promiscuous mode [ 164.836671][ T7145] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 164.877578][ T7591] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.886524][ T7591] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.897810][ T7591] device bridge_slave_1 entered promiscuous mode [ 164.914318][ T7478] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.921610][ T7478] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.938471][ T7478] device bridge_slave_0 entered promiscuous mode [ 164.947844][ T7145] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 164.990561][ T7145] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 165.067684][ T7478] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.081724][ T7478] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.091664][ T7478] device bridge_slave_1 entered promiscuous mode [ 165.102065][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.113599][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.124425][ T2744] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.132001][ T2744] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.165202][ T7591] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 165.211843][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.227243][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.239963][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.249612][ T2747] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.257242][ T2747] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.271813][ T7591] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 165.362097][ T7189] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 165.418751][ T7478] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 165.435746][ T7478] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 165.446673][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.501582][ T7189] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 165.546252][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.575579][ T7591] team0: Port device team_slave_0 added [ 165.596286][ T7189] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 165.650614][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.661341][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.688698][ T7591] team0: Port device team_slave_1 added [ 165.723230][ T7189] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 165.770294][ T7478] team0: Port device team_slave_0 added [ 165.779010][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.791508][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.802562][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.813942][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.824396][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.848122][ T7591] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 165.855954][ T7591] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.886923][ T7591] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 165.907756][ T7591] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 165.915504][ T7591] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.945516][ T7591] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 165.967562][ T7478] team0: Port device team_slave_1 added [ 165.977345][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.988276][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.007294][ T7011] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.169699][ T7591] device hsr_slave_0 entered promiscuous mode [ 166.214254][ T7591] device hsr_slave_1 entered promiscuous mode [ 166.253056][ T7591] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 166.260743][ T7591] Cannot create hsr debugfs directory [ 166.270234][ T7478] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 166.278028][ T7478] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 166.305472][ T7478] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 166.321542][ T7478] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 166.328958][ T7478] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 166.355941][ T7478] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 166.496261][ T7478] device hsr_slave_0 entered promiscuous mode [ 166.565526][ T7478] device hsr_slave_1 entered promiscuous mode [ 166.632806][ T7478] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 166.640382][ T7478] Cannot create hsr debugfs directory [ 166.731681][ T7288] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 166.864507][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 166.872517][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 166.887585][ T7288] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 166.949369][ T7288] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 167.019890][ T7011] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.057985][ T7288] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 167.368377][ T7145] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.421502][ T7591] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 167.469633][ T7591] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 167.517735][ T7591] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 167.580651][ T7591] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 167.668974][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 167.681414][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 167.698807][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.708157][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.739020][ T7145] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.833398][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.849709][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.859819][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.867524][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.913427][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.923739][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 167.934803][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.946740][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.958371][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.971154][ T2484] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.979169][ T2484] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.990042][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 168.000631][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 168.017101][ T7011] device veth0_vlan entered promiscuous mode [ 168.057901][ T7189] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.141664][ T7478] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 168.178299][ T7478] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 168.236747][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 168.274890][ T7011] device veth1_vlan entered promiscuous mode [ 168.286952][ T7478] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 168.345722][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 168.356027][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.365896][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.376625][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.392406][ T7189] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.427343][ T7478] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 168.516707][ T7288] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.527849][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 168.538825][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.550953][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.561563][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.572930][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.584955][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.594891][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.639568][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.651532][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 168.662334][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 168.674862][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.691110][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.704837][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.715933][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.723720][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.788772][ T7288] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.796350][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.811204][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.821278][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.840950][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.854258][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 168.867186][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.877884][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.949296][ T7145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.976177][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.988871][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 169.011819][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.034761][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.077365][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 169.086653][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 169.096869][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.113036][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.124870][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.133269][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.151259][ T7011] device veth0_macvtap entered promiscuous mode [ 169.204695][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 169.218846][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 169.230456][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.246064][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.254847][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.261883][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.279110][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.289565][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.304171][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 169.312229][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 169.338992][ T7011] device veth1_macvtap entered promiscuous mode [ 169.376288][ T7145] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 169.389897][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 169.406148][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.416682][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.426008][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.435688][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 169.445035][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.481079][ T7189] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 169.516200][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.549236][ T7591] 8021q: adding VLAN 0 to HW filter on device bond0 [ 169.570324][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 169.580629][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.590934][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 169.601800][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 169.623031][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.631836][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.643337][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.652381][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.662578][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.689866][ T7011] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 169.739937][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 169.750024][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 169.760524][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 169.770690][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.782028][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.791838][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.807792][ T7288] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 169.835705][ T7591] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.855749][ T7011] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 169.888426][ T7145] device veth0_vlan entered promiscuous mode [ 169.913343][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 169.922454][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 169.935696][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.946184][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.955769][ T2484] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.963049][ T2484] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.973649][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 169.982179][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 169.991288][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.000499][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.009822][ T2484] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.017999][ T2484] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.029920][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 170.041071][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 170.051681][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.062344][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 170.071813][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 170.092263][ T7011] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 170.104616][ T7011] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 170.117025][ T7011] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 170.135266][ T7011] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 170.156459][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.182183][ T7145] device veth1_vlan entered promiscuous mode [ 170.239104][ T7189] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.258973][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 170.270482][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 170.288608][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 170.299079][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.328727][ T7288] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.386834][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 170.398474][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.411125][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.423594][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.457164][ T7478] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.532502][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 170.544940][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.611580][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.621662][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.638447][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.650453][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.664288][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 170.680679][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 170.720652][ T7478] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.740987][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.751603][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.821849][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 170.834466][ T2484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 170.871015][ T7591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.889132][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 170.900244][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 170.911107][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.922401][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.936917][ T8256] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.944421][ T8256] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.958178][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.086249][ T7145] device veth0_macvtap entered promiscuous mode [ 171.107086][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 171.119758][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.142186][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.182309][ T2744] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.190045][ T2744] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.265354][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 171.298992][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.328299][ C1] hrtimer: interrupt took 25150 ns [ 171.333542][ T7189] device veth0_vlan entered promiscuous mode [ 171.341713][ T7145] device veth1_macvtap entered promiscuous mode [ 171.364100][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 171.379543][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.389809][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.407812][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 171.417388][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 171.426367][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.451353][ T7189] device veth1_vlan entered promiscuous mode [ 171.503749][ T8267] device lo entered promiscuous mode [ 172.068365][ T7591] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.104310][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 172.123377][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.140706][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 172.180722][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 172.189934][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 172.213349][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 172.233919][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 172.246751][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 22:29:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000080), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)=0xffffffff80000001) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000340)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(cbc(sm4-generic),sha1-ce)\x00'}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="e5f685df99c514120e", 0x9}, {&(0x7f0000000680)}], 0x2, &(0x7f0000000840)=[{0xe8, 0x94fecbf5fb1ae13, 0x1, "60719d5456a3ab83c944b88d1661ef46bd42c095e69362d6de60d5d5508be8b1c2a708c8e7673992345553eee2bdf4d2229b70d2e2b71790a441918bc60bdcfe0fae3ad06143ba9c41fb5eb818a65a7aeb61a4c344f2435a4b8fefbdda4ddf21d6da4c7d345de59a954bf11b13945f6405ae5dcd6d201b00876b037228851c42a0bd99a5b9649c019e9601642dcb4f9e0d1c3933e7d434703b77d935421d67b765c77f86c58bce6e6aefffb514384d12bb6765e824d1fdaf8decb85152403dd6b2599a783ce4048cfdb1f09d10606a4b4d"}, {0xb8, 0x11, 0x7, "d68843cf75520843e619b55c393d08546c2ca85567ff4b910f26bc990fe99af78e36adf7c7012daa12dd4b563fdb68c4f7fbbb852553c7e55e4d6d05555d9dac6aceeec51c0073a0c12eda7bdde6807c78a93970df38d03de02cf4070d3c189aa6c9b708563b81ec906bb817656903f5d44bd5a0f1a57528d3f026b528efae59006882b24939321e2dd88aea06173f89134147fb20de3d7839a72c4af8ae8418799576a1e0"}, {0x28, 0x114, 0x800, "8537e6e5024224bbf9fe393a1fd69ba866a7b5ab8d514dc6"}], 0x1c8}, 0xc050) mkdir(&(0x7f0000000140)='./file0\x00', 0x14) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x0, 0x4, 0x2}}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000006c0)}, {&(0x7f0000000440)="2b64cbc80491dc81c13ba902bd5050a6ddf117555d6f7bf4e5ccafbe4e88c14bd04570b53174dfc000214cc63a04e3729025bf30e93839fd28ab029383f21d810120e75981e2f91fb5087e0683d213289f7e70fd1eb35a9768de4c0c53", 0x5d}, {&(0x7f0000000800)="a29d27dd7f973ff38a06b5dcad6eab7714ee6195", 0x14}], 0x3}, 0x2000c840) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x4) recvmsg(r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x8}, 0xc) [ 172.357004][ T7288] device veth0_vlan entered promiscuous mode [ 172.384717][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 172.397056][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 172.427953][ T8256] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 172.560730][ T7288] device veth1_vlan entered promiscuous mode [ 172.570728][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 172.589527][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 172.621295][ T7145] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.636586][ T7145] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.659008][ T7145] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 172.800202][ T2750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 172.824367][ T2750] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 172.836213][ T2750] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 172.846382][ T2750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.860006][ T7478] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 173.474566][ T7145] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 173.504362][ T7145] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 22:29:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000080), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)=0xffffffff80000001) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000340)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(cbc(sm4-generic),sha1-ce)\x00'}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="e5f685df99c514120e", 0x9}, {&(0x7f0000000680)}], 0x2, &(0x7f0000000840)=[{0xe8, 0x94fecbf5fb1ae13, 0x1, "60719d5456a3ab83c944b88d1661ef46bd42c095e69362d6de60d5d5508be8b1c2a708c8e7673992345553eee2bdf4d2229b70d2e2b71790a441918bc60bdcfe0fae3ad06143ba9c41fb5eb818a65a7aeb61a4c344f2435a4b8fefbdda4ddf21d6da4c7d345de59a954bf11b13945f6405ae5dcd6d201b00876b037228851c42a0bd99a5b9649c019e9601642dcb4f9e0d1c3933e7d434703b77d935421d67b765c77f86c58bce6e6aefffb514384d12bb6765e824d1fdaf8decb85152403dd6b2599a783ce4048cfdb1f09d10606a4b4d"}, {0xb8, 0x11, 0x7, "d68843cf75520843e619b55c393d08546c2ca85567ff4b910f26bc990fe99af78e36adf7c7012daa12dd4b563fdb68c4f7fbbb852553c7e55e4d6d05555d9dac6aceeec51c0073a0c12eda7bdde6807c78a93970df38d03de02cf4070d3c189aa6c9b708563b81ec906bb817656903f5d44bd5a0f1a57528d3f026b528efae59006882b24939321e2dd88aea06173f89134147fb20de3d7839a72c4af8ae8418799576a1e0"}, {0x28, 0x114, 0x800, "8537e6e5024224bbf9fe393a1fd69ba866a7b5ab8d514dc6"}], 0x1c8}, 0xc050) mkdir(&(0x7f0000000140)='./file0\x00', 0x14) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x0, 0x4, 0x2}}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000006c0)}, {&(0x7f0000000440)="2b64cbc80491dc81c13ba902bd5050a6ddf117555d6f7bf4e5ccafbe4e88c14bd04570b53174dfc000214cc63a04e3729025bf30e93839fd28ab029383f21d810120e75981e2f91fb5087e0683d213289f7e70fd1eb35a9768de4c0c53", 0x5d}, {&(0x7f0000000800)="a29d27dd7f973ff38a06b5dcad6eab7714ee6195", 0x14}], 0x3}, 0x2000c840) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x4) recvmsg(r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x8}, 0xc) [ 173.552650][ T7145] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 173.576912][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 173.594130][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 173.626499][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 173.653698][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 173.671776][ T7189] device veth0_macvtap entered promiscuous mode [ 173.740913][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 173.754423][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 173.784268][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 173.794790][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 173.831178][ T7189] device veth1_macvtap entered promiscuous mode [ 173.862151][ T7145] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 173.884107][ T7145] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 173.900916][ T7145] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 173.910709][ T7145] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 174.028816][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 174.038709][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 174.065355][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 22:29:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000080), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)=0xffffffff80000001) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000340)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(cbc(sm4-generic),sha1-ce)\x00'}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="e5f685df99c514120e", 0x9}, {&(0x7f0000000680)}], 0x2, &(0x7f0000000840)=[{0xe8, 0x94fecbf5fb1ae13, 0x1, "60719d5456a3ab83c944b88d1661ef46bd42c095e69362d6de60d5d5508be8b1c2a708c8e7673992345553eee2bdf4d2229b70d2e2b71790a441918bc60bdcfe0fae3ad06143ba9c41fb5eb818a65a7aeb61a4c344f2435a4b8fefbdda4ddf21d6da4c7d345de59a954bf11b13945f6405ae5dcd6d201b00876b037228851c42a0bd99a5b9649c019e9601642dcb4f9e0d1c3933e7d434703b77d935421d67b765c77f86c58bce6e6aefffb514384d12bb6765e824d1fdaf8decb85152403dd6b2599a783ce4048cfdb1f09d10606a4b4d"}, {0xb8, 0x11, 0x7, "d68843cf75520843e619b55c393d08546c2ca85567ff4b910f26bc990fe99af78e36adf7c7012daa12dd4b563fdb68c4f7fbbb852553c7e55e4d6d05555d9dac6aceeec51c0073a0c12eda7bdde6807c78a93970df38d03de02cf4070d3c189aa6c9b708563b81ec906bb817656903f5d44bd5a0f1a57528d3f026b528efae59006882b24939321e2dd88aea06173f89134147fb20de3d7839a72c4af8ae8418799576a1e0"}, {0x28, 0x114, 0x800, "8537e6e5024224bbf9fe393a1fd69ba866a7b5ab8d514dc6"}], 0x1c8}, 0xc050) mkdir(&(0x7f0000000140)='./file0\x00', 0x14) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x0, 0x4, 0x2}}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000006c0)}, {&(0x7f0000000440)="2b64cbc80491dc81c13ba902bd5050a6ddf117555d6f7bf4e5ccafbe4e88c14bd04570b53174dfc000214cc63a04e3729025bf30e93839fd28ab029383f21d810120e75981e2f91fb5087e0683d213289f7e70fd1eb35a9768de4c0c53", 0x5d}, {&(0x7f0000000800)="a29d27dd7f973ff38a06b5dcad6eab7714ee6195", 0x14}], 0x3}, 0x2000c840) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x4) recvmsg(r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x8}, 0xc) [ 174.090884][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 174.139140][ T7288] device veth0_macvtap entered promiscuous mode [ 174.175381][ T7591] device veth0_vlan entered promiscuous mode [ 174.221450][ T2750] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 174.238241][ T2750] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 174.291377][ T2750] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 174.315119][ T2750] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 174.325205][ T2750] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 174.390101][ T7288] device veth1_macvtap entered promiscuous mode [ 174.410387][ T7478] 8021q: adding VLAN 0 to HW filter on device batadv0 22:29:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000080), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)=0xffffffff80000001) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000340)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(cbc(sm4-generic),sha1-ce)\x00'}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="e5f685df99c514120e", 0x9}, {&(0x7f0000000680)}], 0x2, &(0x7f0000000840)=[{0xe8, 0x94fecbf5fb1ae13, 0x1, "60719d5456a3ab83c944b88d1661ef46bd42c095e69362d6de60d5d5508be8b1c2a708c8e7673992345553eee2bdf4d2229b70d2e2b71790a441918bc60bdcfe0fae3ad06143ba9c41fb5eb818a65a7aeb61a4c344f2435a4b8fefbdda4ddf21d6da4c7d345de59a954bf11b13945f6405ae5dcd6d201b00876b037228851c42a0bd99a5b9649c019e9601642dcb4f9e0d1c3933e7d434703b77d935421d67b765c77f86c58bce6e6aefffb514384d12bb6765e824d1fdaf8decb85152403dd6b2599a783ce4048cfdb1f09d10606a4b4d"}, {0xb8, 0x11, 0x7, "d68843cf75520843e619b55c393d08546c2ca85567ff4b910f26bc990fe99af78e36adf7c7012daa12dd4b563fdb68c4f7fbbb852553c7e55e4d6d05555d9dac6aceeec51c0073a0c12eda7bdde6807c78a93970df38d03de02cf4070d3c189aa6c9b708563b81ec906bb817656903f5d44bd5a0f1a57528d3f026b528efae59006882b24939321e2dd88aea06173f89134147fb20de3d7839a72c4af8ae8418799576a1e0"}, {0x28, 0x114, 0x800, "8537e6e5024224bbf9fe393a1fd69ba866a7b5ab8d514dc6"}], 0x1c8}, 0xc050) mkdir(&(0x7f0000000140)='./file0\x00', 0x14) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x0, 0x4, 0x2}}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000006c0)}, {&(0x7f0000000440)="2b64cbc80491dc81c13ba902bd5050a6ddf117555d6f7bf4e5ccafbe4e88c14bd04570b53174dfc000214cc63a04e3729025bf30e93839fd28ab029383f21d810120e75981e2f91fb5087e0683d213289f7e70fd1eb35a9768de4c0c53", 0x5d}, {&(0x7f0000000800)="a29d27dd7f973ff38a06b5dcad6eab7714ee6195", 0x14}], 0x3}, 0x2000c840) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x4) recvmsg(r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x8}, 0xc) [ 174.514209][ T7189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 174.537975][ T7189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 174.563780][ T7189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 174.581898][ T7189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 174.595906][ T7189] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 174.613941][ T7591] device veth1_vlan entered promiscuous mode [ 174.635626][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 174.649784][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 174.690682][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 174.781527][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 175.635239][ T7189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 175.646690][ T7189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.658321][ T7189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 175.675152][ T7189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.724781][ T7189] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 175.756365][ T7288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 175.770821][ T7288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.781674][ T7288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 175.793556][ T7288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.807952][ T7288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 175.820064][ T7288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.852360][ T7288] batman_adv: batadv0: Interface activated: batadv_slave_0 22:29:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000080), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)=0xffffffff80000001) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000340)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(cbc(sm4-generic),sha1-ce)\x00'}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="e5f685df99c514120e", 0x9}, {&(0x7f0000000680)}], 0x2, &(0x7f0000000840)=[{0xe8, 0x94fecbf5fb1ae13, 0x1, "60719d5456a3ab83c944b88d1661ef46bd42c095e69362d6de60d5d5508be8b1c2a708c8e7673992345553eee2bdf4d2229b70d2e2b71790a441918bc60bdcfe0fae3ad06143ba9c41fb5eb818a65a7aeb61a4c344f2435a4b8fefbdda4ddf21d6da4c7d345de59a954bf11b13945f6405ae5dcd6d201b00876b037228851c42a0bd99a5b9649c019e9601642dcb4f9e0d1c3933e7d434703b77d935421d67b765c77f86c58bce6e6aefffb514384d12bb6765e824d1fdaf8decb85152403dd6b2599a783ce4048cfdb1f09d10606a4b4d"}, {0xb8, 0x11, 0x7, "d68843cf75520843e619b55c393d08546c2ca85567ff4b910f26bc990fe99af78e36adf7c7012daa12dd4b563fdb68c4f7fbbb852553c7e55e4d6d05555d9dac6aceeec51c0073a0c12eda7bdde6807c78a93970df38d03de02cf4070d3c189aa6c9b708563b81ec906bb817656903f5d44bd5a0f1a57528d3f026b528efae59006882b24939321e2dd88aea06173f89134147fb20de3d7839a72c4af8ae8418799576a1e0"}, {0x28, 0x114, 0x800, "8537e6e5024224bbf9fe393a1fd69ba866a7b5ab8d514dc6"}], 0x1c8}, 0xc050) mkdir(&(0x7f0000000140)='./file0\x00', 0x14) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x0, 0x4, 0x2}}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000006c0)}, {&(0x7f0000000440)="2b64cbc80491dc81c13ba902bd5050a6ddf117555d6f7bf4e5ccafbe4e88c14bd04570b53174dfc000214cc63a04e3729025bf30e93839fd28ab029383f21d810120e75981e2f91fb5087e0683d213289f7e70fd1eb35a9768de4c0c53", 0x5d}, {&(0x7f0000000800)="a29d27dd7f973ff38a06b5dcad6eab7714ee6195", 0x14}], 0x3}, 0x2000c840) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x4) recvmsg(r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x8}, 0xc) [ 175.907303][ T7680] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 175.928869][ T8314] BPF:Unsupported section found [ 175.939913][ T7680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 175.994446][ T7680] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 176.008933][ T7680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 176.038420][ T7189] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 176.078219][ T7189] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 176.100174][ T7189] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 176.132496][ T7189] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 176.578039][ T8321] BPF:Unsupported section found [ 176.951440][ T7288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 176.972450][ T7288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 176.985294][ T7288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 176.999425][ T7288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.011498][ T7288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 177.024486][ T7288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.041848][ T7288] batman_adv: batadv0: Interface activated: batadv_slave_1 22:29:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000002000000140000001400000002000000000000000100000804001b0000007b3cd6458fb1c207e240e552000000dc73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5379ed17b7cca0885ac841e36b166dc2d490a370e0a8ae14f0118e225eb75ea04059d7eceb2675a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037faa23d11432efc5c700dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc47702dd24f1fe9f3465838c242abef25881b37830f9452a2951f7db76f4e7023daf15e22aefd67cb3587e435bd363df0449016ee76f13b89a10856fd0d7756d84fc61ffae79ba18c2df871093ff00fd9cb4482b00cd262339b66bcac38cf26ae524985be22739f6dfcfd41f0b0bd8c82c2d65fe4ddc4ff7e12057b6df5a8a1568c23fcd526763f049e071085d812880e7dd2aa018bd5a68cd09015efd1b12af4dabb6e75940fc3980411829ac2417bd734a2e3b33fdd4c821aec64968036100000000000000000000000000000000000000000000177867ce2fd2f045e8b2ab19666a29318acef4ed2c970307e82162b771ee5ad43cba9416cebd861ea7237dc818c46fe993d64569e79ea62a34ad0f49d2e80593e9f1862ab03618390513ec117e1cfe08db279a0ffcfa29133f74527a9b39107ba2103b61ced240d87506bed737a4181f8155160e7cafa64896288b7c0c8843c3e4c5e322b5d71bf3d2fafd4bff22a848f049d310bc7e6e591148489d2181176d75c741b9d9b5cc716e7bdc452a614a3eec6786ee635f66a12fced6ee684c7b943945c3cb3c9b69e408f117234c077fdda744c69c75ce53dc31ade93eef18732d83efa141e7878e2a977a194b516cfc83857ecdeda583"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000180)=0x3f) 22:29:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000080), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)=0xffffffff80000001) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000340)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(cbc(sm4-generic),sha1-ce)\x00'}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="e5f685df99c514120e", 0x9}, {&(0x7f0000000680)}], 0x2, &(0x7f0000000840)=[{0xe8, 0x94fecbf5fb1ae13, 0x1, "60719d5456a3ab83c944b88d1661ef46bd42c095e69362d6de60d5d5508be8b1c2a708c8e7673992345553eee2bdf4d2229b70d2e2b71790a441918bc60bdcfe0fae3ad06143ba9c41fb5eb818a65a7aeb61a4c344f2435a4b8fefbdda4ddf21d6da4c7d345de59a954bf11b13945f6405ae5dcd6d201b00876b037228851c42a0bd99a5b9649c019e9601642dcb4f9e0d1c3933e7d434703b77d935421d67b765c77f86c58bce6e6aefffb514384d12bb6765e824d1fdaf8decb85152403dd6b2599a783ce4048cfdb1f09d10606a4b4d"}, {0xb8, 0x11, 0x7, "d68843cf75520843e619b55c393d08546c2ca85567ff4b910f26bc990fe99af78e36adf7c7012daa12dd4b563fdb68c4f7fbbb852553c7e55e4d6d05555d9dac6aceeec51c0073a0c12eda7bdde6807c78a93970df38d03de02cf4070d3c189aa6c9b708563b81ec906bb817656903f5d44bd5a0f1a57528d3f026b528efae59006882b24939321e2dd88aea06173f89134147fb20de3d7839a72c4af8ae8418799576a1e0"}, {0x28, 0x114, 0x800, "8537e6e5024224bbf9fe393a1fd69ba866a7b5ab8d514dc6"}], 0x1c8}, 0xc050) mkdir(&(0x7f0000000140)='./file0\x00', 0x14) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x0, 0x4, 0x2}}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000006c0)}, {&(0x7f0000000440)="2b64cbc80491dc81c13ba902bd5050a6ddf117555d6f7bf4e5ccafbe4e88c14bd04570b53174dfc000214cc63a04e3729025bf30e93839fd28ab029383f21d810120e75981e2f91fb5087e0683d213289f7e70fd1eb35a9768de4c0c53", 0x5d}, {&(0x7f0000000800)="a29d27dd7f973ff38a06b5dcad6eab7714ee6195", 0x14}], 0x3}, 0x2000c840) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x4) recvmsg(r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x8}, 0xc) [ 177.106452][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.133854][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.146765][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 177.169104][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 177.204098][ T7288] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.228683][ T7288] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.255223][ T7288] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.287182][ T7288] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.333178][ T7680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 177.377163][ T7680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 177.407159][ T7591] device veth0_macvtap entered promiscuous mode [ 177.420426][ T8330] BPF:Unsupported section found 22:29:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000180)=0x3f) [ 178.276993][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 178.387295][ T7591] device veth1_macvtap entered promiscuous mode [ 178.495481][ T8340] BPF:Unsupported section found [ 178.626243][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 178.667174][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 178.738336][ T2750] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 178.763936][ T2750] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 22:29:58 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0xd4, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x2b, 0x0, 0x1, 0x10, 0x0, 0x180}, 0x25) [ 178.850441][ T7478] device veth0_vlan entered promiscuous mode [ 178.942437][ T7591] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 178.977354][ T7591] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.041333][ T7591] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 179.087452][ T7591] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.138656][ T7591] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 179.187365][ T7591] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.230061][ T7591] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 179.277076][ T7591] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.353458][ T7591] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 179.388402][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 179.439090][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 22:29:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000080), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)=0xffffffff80000001) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000340)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(cbc(sm4-generic),sha1-ce)\x00'}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="e5f685df99c514120e", 0x9}, {&(0x7f0000000680)}], 0x2, &(0x7f0000000840)=[{0xe8, 0x94fecbf5fb1ae13, 0x1, "60719d5456a3ab83c944b88d1661ef46bd42c095e69362d6de60d5d5508be8b1c2a708c8e7673992345553eee2bdf4d2229b70d2e2b71790a441918bc60bdcfe0fae3ad06143ba9c41fb5eb818a65a7aeb61a4c344f2435a4b8fefbdda4ddf21d6da4c7d345de59a954bf11b13945f6405ae5dcd6d201b00876b037228851c42a0bd99a5b9649c019e9601642dcb4f9e0d1c3933e7d434703b77d935421d67b765c77f86c58bce6e6aefffb514384d12bb6765e824d1fdaf8decb85152403dd6b2599a783ce4048cfdb1f09d10606a4b4d"}, {0xb8, 0x11, 0x7, "d68843cf75520843e619b55c393d08546c2ca85567ff4b910f26bc990fe99af78e36adf7c7012daa12dd4b563fdb68c4f7fbbb852553c7e55e4d6d05555d9dac6aceeec51c0073a0c12eda7bdde6807c78a93970df38d03de02cf4070d3c189aa6c9b708563b81ec906bb817656903f5d44bd5a0f1a57528d3f026b528efae59006882b24939321e2dd88aea06173f89134147fb20de3d7839a72c4af8ae8418799576a1e0"}, {0x28, 0x114, 0x800, "8537e6e5024224bbf9fe393a1fd69ba866a7b5ab8d514dc6"}], 0x1c8}, 0xc050) mkdir(&(0x7f0000000140)='./file0\x00', 0x14) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x0, 0x4, 0x2}}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000006c0)}, {&(0x7f0000000440)="2b64cbc80491dc81c13ba902bd5050a6ddf117555d6f7bf4e5ccafbe4e88c14bd04570b53174dfc000214cc63a04e3729025bf30e93839fd28ab029383f21d810120e75981e2f91fb5087e0683d213289f7e70fd1eb35a9768de4c0c53", 0x5d}, {&(0x7f0000000800)="a29d27dd7f973ff38a06b5dcad6eab7714ee6195", 0x14}], 0x3}, 0x2000c840) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x4) recvmsg(r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x8}, 0xc) [ 179.498673][ T7591] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.511684][ T7591] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.522074][ T7591] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.544647][ T7591] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.567042][ T7591] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.578047][ T7591] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.590370][ T7591] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.602276][ T7591] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.630854][ T7591] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 179.683206][ T2750] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 179.695131][ T2750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 179.711452][ T8357] device lo entered promiscuous mode [ 180.460408][ T7478] device veth1_vlan entered promiscuous mode [ 180.485969][ T7591] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 180.497835][ T7591] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 180.542836][ T7591] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 180.562884][ T7591] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 180.860676][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 180.880691][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 180.940646][ T7478] device veth0_macvtap entered promiscuous mode [ 180.969797][ T7478] device veth1_macvtap entered promiscuous mode [ 181.019974][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 181.037123][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.051032][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 181.065647][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.079346][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 181.094921][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.123022][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 181.146064][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.173011][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 181.186148][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.201143][ T7478] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 181.226903][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 181.244898][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 181.257860][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 181.277371][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.289900][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.301362][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.312549][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.324904][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.336924][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.348822][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.359908][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.370102][ T7478] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.382016][ T7478] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.398165][ T7478] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 181.408399][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 181.418416][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 181.429980][ T7478] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 181.439308][ T7478] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 181.456860][ T7478] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 181.468143][ T7478] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 22:30:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) close(0xffffffffffffffff) socketpair(0x2, 0x6, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair(0x0, 0x0, 0x9, 0x0) socket$kcm(0xa, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 22:30:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000180)=0x3f) 22:30:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000002000000140000001400000002000000000000000100000804001b0000007b3cd6458fb1c207e240e552000000dc73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5379ed17b7cca0885ac841e36b166dc2d490a370e0a8ae14f0118e225eb75ea04059d7eceb2675a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037faa23d11432efc5c700dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc47702dd24f1fe9f3465838c242abef25881b37830f9452a2951f7db76f4e7023daf15e22aefd67cb3587e435bd363df0449016ee76f13b89a10856fd0d7756d84fc61ffae79ba18c2df871093ff00fd9cb4482b00cd262339b66bcac38cf26ae524985be22739f6dfcfd41f0b0bd8c82c2d65fe4ddc4ff7e12057b6df5a8a1568c23fcd526763f049e071085d812880e7dd2aa018bd5a68cd09015efd1b12af4dabb6e75940fc3980411829ac2417bd734a2e3b33fdd4c821aec64968036100000000000000000000000000000000000000000000177867ce2fd2f045e8b2ab19666a29318acef4ed2c970307e82162b771ee5ad43cba9416cebd861ea7237dc818c46fe993d64569e79ea62a34ad0f49d2e80593e9f1862ab03618390513ec117e1cfe08db279a0ffcfa29133f74527a9b39107ba2103b61ced240d87506bed737a4181f8155160e7cafa64896288b7c0c8843c3e4c5e322b5d71bf3d2fafd4bff22a848f049d310bc7e6e591148489d2181176d75c741b9d9b5cc716e7bdc452a614a3eec6786ee635f66a12fced6ee684c7b943945c3cb3c9b69e408f117234c077fdda744c69c75ce53dc31ade93eef18732d83efa141e7878e2a977a194b516cfc83857ecdeda583"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000180)=0x3f) 22:30:01 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0xd4, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x2b, 0x0, 0x1, 0x10, 0x0, 0x180}, 0x25) 22:30:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000080), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)=0xffffffff80000001) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000340)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(cbc(sm4-generic),sha1-ce)\x00'}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="e5f685df99c514120e", 0x9}, {&(0x7f0000000680)}], 0x2, &(0x7f0000000840)=[{0xe8, 0x94fecbf5fb1ae13, 0x1, "60719d5456a3ab83c944b88d1661ef46bd42c095e69362d6de60d5d5508be8b1c2a708c8e7673992345553eee2bdf4d2229b70d2e2b71790a441918bc60bdcfe0fae3ad06143ba9c41fb5eb818a65a7aeb61a4c344f2435a4b8fefbdda4ddf21d6da4c7d345de59a954bf11b13945f6405ae5dcd6d201b00876b037228851c42a0bd99a5b9649c019e9601642dcb4f9e0d1c3933e7d434703b77d935421d67b765c77f86c58bce6e6aefffb514384d12bb6765e824d1fdaf8decb85152403dd6b2599a783ce4048cfdb1f09d10606a4b4d"}, {0xb8, 0x11, 0x7, "d68843cf75520843e619b55c393d08546c2ca85567ff4b910f26bc990fe99af78e36adf7c7012daa12dd4b563fdb68c4f7fbbb852553c7e55e4d6d05555d9dac6aceeec51c0073a0c12eda7bdde6807c78a93970df38d03de02cf4070d3c189aa6c9b708563b81ec906bb817656903f5d44bd5a0f1a57528d3f026b528efae59006882b24939321e2dd88aea06173f89134147fb20de3d7839a72c4af8ae8418799576a1e0"}, {0x28, 0x114, 0x800, "8537e6e5024224bbf9fe393a1fd69ba866a7b5ab8d514dc6"}], 0x1c8}, 0xc050) mkdir(&(0x7f0000000140)='./file0\x00', 0x14) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x0, 0x4, 0x2}}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000006c0)}, {&(0x7f0000000440)="2b64cbc80491dc81c13ba902bd5050a6ddf117555d6f7bf4e5ccafbe4e88c14bd04570b53174dfc000214cc63a04e3729025bf30e93839fd28ab029383f21d810120e75981e2f91fb5087e0683d213289f7e70fd1eb35a9768de4c0c53", 0x5d}, {&(0x7f0000000800)="a29d27dd7f973ff38a06b5dcad6eab7714ee6195", 0x14}], 0x3}, 0x2000c840) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x4) recvmsg(r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x8}, 0xc) 22:30:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x1}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xd, 0x4, 0x4, 0x123, 0xd, r0, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8]}, 0x40) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 182.288634][ T8392] BPF:Unsupported section found [ 182.317877][ T8395] BPF:Unsupported section found 22:30:02 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0xd4, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x2b, 0x0, 0x1, 0x10, 0x0, 0x180}, 0x25) 22:30:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x1}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xd, 0x4, 0x4, 0x123, 0xd, r0, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8]}, 0x40) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:30:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) close(0xffffffffffffffff) socketpair(0x2, 0x6, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair(0x0, 0x0, 0x9, 0x0) socket$kcm(0xa, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 22:30:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x1}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xd, 0x4, 0x4, 0x123, 0xd, r0, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8]}, 0x40) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:30:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000180)=0x3f) 22:30:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) close(0xffffffffffffffff) socketpair(0x2, 0x6, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair(0x0, 0x0, 0x9, 0x0) socket$kcm(0xa, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 22:30:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x1}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xd, 0x4, 0x4, 0x123, 0xd, r0, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8]}, 0x40) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:30:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000080), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)=0xffffffff80000001) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000340)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(cbc(sm4-generic),sha1-ce)\x00'}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="e5f685df99c514120e", 0x9}, {&(0x7f0000000680)}], 0x2, &(0x7f0000000840)=[{0xe8, 0x94fecbf5fb1ae13, 0x1, "60719d5456a3ab83c944b88d1661ef46bd42c095e69362d6de60d5d5508be8b1c2a708c8e7673992345553eee2bdf4d2229b70d2e2b71790a441918bc60bdcfe0fae3ad06143ba9c41fb5eb818a65a7aeb61a4c344f2435a4b8fefbdda4ddf21d6da4c7d345de59a954bf11b13945f6405ae5dcd6d201b00876b037228851c42a0bd99a5b9649c019e9601642dcb4f9e0d1c3933e7d434703b77d935421d67b765c77f86c58bce6e6aefffb514384d12bb6765e824d1fdaf8decb85152403dd6b2599a783ce4048cfdb1f09d10606a4b4d"}, {0xb8, 0x11, 0x7, "d68843cf75520843e619b55c393d08546c2ca85567ff4b910f26bc990fe99af78e36adf7c7012daa12dd4b563fdb68c4f7fbbb852553c7e55e4d6d05555d9dac6aceeec51c0073a0c12eda7bdde6807c78a93970df38d03de02cf4070d3c189aa6c9b708563b81ec906bb817656903f5d44bd5a0f1a57528d3f026b528efae59006882b24939321e2dd88aea06173f89134147fb20de3d7839a72c4af8ae8418799576a1e0"}, {0x28, 0x114, 0x800, "8537e6e5024224bbf9fe393a1fd69ba866a7b5ab8d514dc6"}], 0x1c8}, 0xc050) mkdir(&(0x7f0000000140)='./file0\x00', 0x14) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x0, 0x4, 0x2}}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000006c0)}, {&(0x7f0000000440)="2b64cbc80491dc81c13ba902bd5050a6ddf117555d6f7bf4e5ccafbe4e88c14bd04570b53174dfc000214cc63a04e3729025bf30e93839fd28ab029383f21d810120e75981e2f91fb5087e0683d213289f7e70fd1eb35a9768de4c0c53", 0x5d}, {&(0x7f0000000800)="a29d27dd7f973ff38a06b5dcad6eab7714ee6195", 0x14}], 0x3}, 0x2000c840) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x4) recvmsg(r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x8}, 0xc) 22:30:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x1}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xd, 0x4, 0x4, 0x123, 0xd, r0, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8]}, 0x40) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:30:03 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x24, 0x4, 0x1, 0x0, r0}, 0x40) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 183.632305][ T8432] BPF:Unsupported section found 22:30:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x1}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xd, 0x4, 0x4, 0x123, 0xd, r0, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8]}, 0x40) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:30:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x1}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xd, 0x4, 0x4, 0x123, 0xd, r0, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x8]}, 0x40) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:30:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0xa0}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffffb}, 0x48) 22:30:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000002000000140000001400000002000000000000000100000804001b0000007b3cd6458fb1c207e240e552000000dc73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5379ed17b7cca0885ac841e36b166dc2d490a370e0a8ae14f0118e225eb75ea04059d7eceb2675a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037faa23d11432efc5c700dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc47702dd24f1fe9f3465838c242abef25881b37830f9452a2951f7db76f4e7023daf15e22aefd67cb3587e435bd363df0449016ee76f13b89a10856fd0d7756d84fc61ffae79ba18c2df871093ff00fd9cb4482b00cd262339b66bcac38cf26ae524985be22739f6dfcfd41f0b0bd8c82c2d65fe4ddc4ff7e12057b6df5a8a1568c23fcd526763f049e071085d812880e7dd2aa018bd5a68cd09015efd1b12af4dabb6e75940fc3980411829ac2417bd734a2e3b33fdd4c821aec64968036100000000000000000000000000000000000000000000177867ce2fd2f045e8b2ab19666a29318acef4ed2c970307e82162b771ee5ad43cba9416cebd861ea7237dc818c46fe993d64569e79ea62a34ad0f49d2e80593e9f1862ab03618390513ec117e1cfe08db279a0ffcfa29133f74527a9b39107ba2103b61ced240d87506bed737a4181f8155160e7cafa64896288b7c0c8843c3e4c5e322b5d71bf3d2fafd4bff22a848f049d310bc7e6e591148489d2181176d75c741b9d9b5cc716e7bdc452a614a3eec6786ee635f66a12fced6ee684c7b943945c3cb3c9b69e408f117234c077fdda744c69c75ce53dc31ade93eef18732d83efa141e7878e2a977a194b516cfc83857ecdeda583"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000180)=0x3f) 22:30:03 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b04, &(0x7f0000000000)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\b\xde\xbbg\xc18\x84,:f\xcb\xe8oOArYZ\xe1\x1b\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c,\xe8\xff^9P\xee\x8aG\xdd\x00\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW\xdc\xcf\xe9\x8d\xe8\xcf\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\x8a\xe3\x9c\x96\xf5\xf8\xb5\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xa05\xdc\x12\x86\xb9\xf93\xac\x14\x1fXf\xfd\xde0\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xc2\x00\x00\x00\x10\x00\x00\xaf\xf6\xbd2') 22:30:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000003c0)="d800000018008100e00f80ecdb4cb904020265ef0b007c05e87c55a1bc000900b8000699030000000500150007008178a80016004000014002000000d67f6f94007134cf6efb0f40a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4eff0100000000000000360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0dd6e4edef3d93452a92307f27260e970358337446d6e7006742ea86fc4ee4f1ac588b", 0xd8}], 0x1}, 0x0) 22:30:03 executing program 1: r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2}, r0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r2, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @remote}}}], 0x20}, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 22:30:03 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x100000000002, 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="39000000140081ae00002c507000050001872c546fabcae5e574050e00007c355fee27a0977e0592616675e285af71583c7d22b51749008000", 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x0) recvmsg$kcm(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) [ 184.447862][ T8452] BPF:Unsupported section found 22:30:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x4000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNGETIFF(r2, 0x400454cb, &(0x7f0000000080)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000040)=0x8) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 22:30:04 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008106e00f80ecdb4cb904021d65ef0b007c09e8fe55a10a0015000200142603000e1208000f0000000001a800160008000300e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) 22:30:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x100000000002, 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="39000000140081ae00002c507000050001872c546fabcae5e574050e00007c355fee27a0977e0592616675e285af71583c7d22b51749008000", 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x0) recvmsg$kcm(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) 22:30:04 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b04, &(0x7f0000000000)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\b\xde\xbbg\xc18\x84,:f\xcb\xe8oOArYZ\xe1\x1b\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c,\xe8\xff^9P\xee\x8aG\xdd\x00\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW\xdc\xcf\xe9\x8d\xe8\xcf\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\x8a\xe3\x9c\x96\xf5\xf8\xb5\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xa05\xdc\x12\x86\xb9\xf93\xac\x14\x1fXf\xfd\xde0\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xc2\x00\x00\x00\x10\x00\x00\xaf\xf6\xbd2') [ 184.844021][ T8476] netlink: 'syz-executor.4': attribute type 21 has an invalid length. [ 184.879936][ T8476] netlink: 156 bytes leftover after parsing attributes in process `syz-executor.4'. 22:30:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x100000000002, 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="39000000140081ae00002c507000050001872c546fabcae5e574050e00007c355fee27a0977e0592616675e285af71583c7d22b51749008000", 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x0) recvmsg$kcm(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) 22:30:04 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffbc, 0x10}, [@ldst={0x7, 0xff05, 0x0, 0x0, 0xa}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0xa}, 0x48) socket$kcm(0x21, 0x0, 0x2) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001440)=""/164, 0xa4}, 0x0) 22:30:04 executing program 1: socket$kcm(0x10, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000017c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x400000000) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) 22:30:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = socket$kcm(0x10, 0x100000000002, 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="39000000140081ae00002c507000050001872c546fabcae5e574050e00007c355fee27a0977e0592616675e285af71583c7d22b51749008000", 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x0) recvmsg$kcm(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) [ 185.268733][ T8485] netlink: 'syz-executor.4': attribute type 21 has an invalid length. [ 185.288235][ T8485] netlink: 156 bytes leftover after parsing attributes in process `syz-executor.4'. 22:30:04 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b04, &(0x7f0000000000)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\b\xde\xbbg\xc18\x84,:f\xcb\xe8oOArYZ\xe1\x1b\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c,\xe8\xff^9P\xee\x8aG\xdd\x00\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW\xdc\xcf\xe9\x8d\xe8\xcf\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\x8a\xe3\x9c\x96\xf5\xf8\xb5\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xa05\xdc\x12\x86\xb9\xf93\xac\x14\x1fXf\xfd\xde0\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xc2\x00\x00\x00\x10\x00\x00\xaf\xf6\xbd2') 22:30:05 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed009064d60010002e000080", 0x14}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 22:30:05 executing program 4: socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xf, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 22:30:05 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffbc, 0x10}, [@ldst={0x7, 0xff05, 0x0, 0x0, 0xa}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0xa}, 0x48) socket$kcm(0x21, 0x0, 0x2) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001440)=""/164, 0xa4}, 0x0) 22:30:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x4000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNGETIFF(r2, 0x400454cb, &(0x7f0000000080)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000040)=0x8) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 22:30:05 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed009064d60010002e000080", 0x14}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 22:30:05 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xb, 0x100, 0x209e20, 0x2, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000140)=""/130}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000300), 0x0}, 0x20) 22:30:05 executing program 1: socket$kcm(0x10, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000017c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x400000000) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) 22:30:05 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffbc, 0x10}, [@ldst={0x7, 0xff05, 0x0, 0x0, 0xa}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0xa}, 0x48) socket$kcm(0x21, 0x0, 0x2) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001440)=""/164, 0xa4}, 0x0) 22:30:05 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b04, &(0x7f0000000000)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\b\xde\xbbg\xc18\x84,:f\xcb\xe8oOArYZ\xe1\x1b\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c,\xe8\xff^9P\xee\x8aG\xdd\x00\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW\xdc\xcf\xe9\x8d\xe8\xcf\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\x8a\xe3\x9c\x96\xf5\xf8\xb5\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xa05\xdc\x12\x86\xb9\xf93\xac\x14\x1fXf\xfd\xde0\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xc2\x00\x00\x00\x10\x00\x00\xaf\xf6\xbd2') 22:30:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x4000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNGETIFF(r2, 0x400454cb, &(0x7f0000000080)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000040)=0x8) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 22:30:05 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed009064d60010002e000080", 0x14}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 22:30:06 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffbc, 0x10}, [@ldst={0x7, 0xff05, 0x0, 0x0, 0xa}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0xa}, 0x48) socket$kcm(0x21, 0x0, 0x2) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001440)=""/164, 0xa4}, 0x0) 22:30:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x10e, 0xc, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="2e000000120081c3293869a8f14eac1e070000000100"/46, 0x2e}], 0x1}, 0x0) 22:30:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000480)={0x4, 0x70, 0x16, 0x80, 0x3, 0x40, 0x0, 0x1, 0x40, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xc4, 0x2, @perf_bp={&(0x7f0000000340), 0x2}, 0x2200, 0x800, 0x5, 0x2, 0x7, 0x80, 0x6}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x8, 0x4, 0x4, 0xf3}, 0x15) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r3, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x11, 0x3, 0xf5, 0x5, 0x1, r3, 0xfffffff7, [], 0x0, r2, 0x1, 0x3, 0x2}, 0x40) socket$kcm(0x29, 0x6, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000005600)=""/102380, 0x18fec}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000200)=""/163, 0xa3}, {&(0x7f0000000400)=""/111, 0x6f}, {0x0}], 0x4, &(0x7f0000000740)=""/242, 0xf2}, 0x40010062) 22:30:06 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed009064d60010002e000080", 0x14}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 186.749254][ T8556] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. 22:30:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x4000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x20000005402}) ioctl$TUNGETIFF(r2, 0x400454cb, &(0x7f0000000080)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000040)=0x8) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 186.830627][ T8559] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. 22:30:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a08, 0x1700) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x45, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:30:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000480)={0x4, 0x70, 0x16, 0x80, 0x3, 0x40, 0x0, 0x1, 0x40, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xc4, 0x2, @perf_bp={&(0x7f0000000340), 0x2}, 0x2200, 0x800, 0x5, 0x2, 0x7, 0x80, 0x6}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x8, 0x4, 0x4, 0xf3}, 0x15) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r3, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x11, 0x3, 0xf5, 0x5, 0x1, r3, 0xfffffff7, [], 0x0, r2, 0x1, 0x3, 0x2}, 0x40) socket$kcm(0x29, 0x6, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000005600)=""/102380, 0x18fec}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000200)=""/163, 0xa3}, {&(0x7f0000000400)=""/111, 0x6f}, {0x0}], 0x4, &(0x7f0000000740)=""/242, 0xf2}, 0x40010062) 22:30:06 executing program 1: socket$kcm(0x10, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000017c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x400000000) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) 22:30:06 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x4d}, 0x20) 22:30:06 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001400)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8916, &(0x7f0000000040)={'lo\x00', @random="02000000de07"}) 22:30:07 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x4d}, 0x20) [ 188.054993][ T29] audit: type=1804 audit(1595457007.610:2): pid=8577 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir651419409/syzkaller.c4DBjK/10/memory.events" dev="sda1" ino=15773 res=1 22:30:07 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x4d}, 0x20) 22:30:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0xe80, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874588a8ffffffff00000000122e25d386dd", 0x0, 0x3b, 0x0, 0x22d}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) [ 188.241271][ T29] audit: type=1800 audit(1595457007.650:3): pid=8577 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=15773 res=0 22:30:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000480)={0x4, 0x70, 0x16, 0x80, 0x3, 0x40, 0x0, 0x1, 0x40, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xc4, 0x2, @perf_bp={&(0x7f0000000340), 0x2}, 0x2200, 0x800, 0x5, 0x2, 0x7, 0x80, 0x6}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x8, 0x4, 0x4, 0xf3}, 0x15) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r3, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x11, 0x3, 0xf5, 0x5, 0x1, r3, 0xfffffff7, [], 0x0, r2, 0x1, 0x3, 0x2}, 0x40) socket$kcm(0x29, 0x6, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000005600)=""/102380, 0x18fec}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000200)=""/163, 0xa3}, {&(0x7f0000000400)=""/111, 0x6f}, {0x0}], 0x4, &(0x7f0000000740)=""/242, 0xf2}, 0x40010062) 22:30:08 executing program 1: socket$kcm(0x10, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000017c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x400000000) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) 22:30:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001400)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8916, &(0x7f0000000040)={'lo\x00', @random="02000000de07"}) 22:30:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454da, 0x400014) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'\x00', 0x1}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x1}) 22:30:08 executing program 3: r0 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 22:30:08 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x4d}, 0x20) 22:30:08 executing program 3: r0 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 22:30:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000480)={0x4, 0x70, 0x16, 0x80, 0x3, 0x40, 0x0, 0x1, 0x40, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xc4, 0x2, @perf_bp={&(0x7f0000000340), 0x2}, 0x2200, 0x800, 0x5, 0x2, 0x7, 0x80, 0x6}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x8, 0x4, 0x4, 0xf3}, 0x15) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r3, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x11, 0x3, 0xf5, 0x5, 0x1, r3, 0xfffffff7, [], 0x0, r2, 0x1, 0x3, 0x2}, 0x40) socket$kcm(0x29, 0x6, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000005600)=""/102380, 0x18fec}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000200)=""/163, 0xa3}, {&(0x7f0000000400)=""/111, 0x6f}, {0x0}], 0x4, &(0x7f0000000740)=""/242, 0xf2}, 0x40010062) 22:30:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000100)=""/249, 0x37, 0xf9, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000000000009500000000000000e3f52f22c704dc3dc9e209c8bbaf7161f89241515a2b41ef80fb719721c62d4bc7d4bcb484f16f3b5fa0878ca74d78bc7ef924d74de48e83c69d98b0b9344d7fbd394e955eacaab8e2cda8a6fb11b62dba417ed424fbee837ca2bcb175cd18bb04dd"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, 0x0, 0x2, 0x2b, 0x0, 0xffffffffffffff7f}, 0x70) 22:30:08 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001400)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8916, &(0x7f0000000040)={'lo\x00', @random="02000000de07"}) 22:30:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x54}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x287b361ae6c523fa, 0x10, &(0x7f0000000000), 0x128}, 0x48) 22:30:09 executing program 3: r0 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 22:30:09 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, 0x0, 0x1d) 22:30:09 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001400)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8916, &(0x7f0000000040)={'lo\x00', @random="02000000de07"}) 22:30:09 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000025000511d25a80648c63940d0424fc6004000e6c0a0003000200008037153e370a00178000000000d1bd", 0x2e}], 0x1}, 0x0) 22:30:09 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x3, 0x1, &(0x7f0000000080)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) 22:30:09 executing program 3: r0 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 22:30:09 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) sendmsg$kcm(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x24000084) [ 190.015559][ T8655] netlink: 'syz-executor.2': attribute type 23 has an invalid length. 22:30:09 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) sendmsg$kcm(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x24000084) 22:30:09 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x3, 0x1, &(0x7f0000000080)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) 22:30:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6000, &(0x7f0000000100)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207a07e4f1e000000880306fb0a000e00030ada1b40d805000304c50083b8", 0x2e}], 0x1}, 0x0) 22:30:09 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x246c3}], 0x1}, 0x60) 22:30:10 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80, 0x0}, 0x20008041) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000480)=0x1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r2, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000400)) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="1968e93cff84c009be2abb63374e1af29583c54fd9e34cd0a9a5050a56fcb85e583dfbedd800d809d41e646faa485cbdfa828f0edc9f06c57c84cce5caa7abec2f2ff0ae890c933844fc7d80cfe0151cb6b0da2e66e45f6e520d16688136342bd8049c4156a43b0df77f4918a3fcbb7d517ca41d0fb3501960722caa41be8f410a242b095f5936194f2902620a61289ada986da885e54827b4ca4f41c38efb5eb200"/175], &(0x7f0000000240)='syzkaller\x00', 0xf8000000, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1a, r4, 0x8, &(0x7f0000000280)={0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x0, 0x3fc, 0x1}, 0x10, r3}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={0xffffffffffffffff, 0x10, &(0x7f0000000b00)={0x0}}, 0x10) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000003c0)) close(r0) [ 190.444695][ T8670] netlink: 'syz-executor.2': attribute type 23 has an invalid length. [ 190.456659][ T8673] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. 22:30:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6000, &(0x7f0000000100)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207a07e4f1e000000880306fb0a000e00030ada1b40d805000304c50083b8", 0x2e}], 0x1}, 0x0) 22:30:10 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000025000511d25a80648c63940d0424fc6004000e6c0a0003000200008037153e370a00178000000000d1bd", 0x2e}], 0x1}, 0x0) 22:30:10 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) sendmsg$kcm(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x24000084) 22:30:10 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x246c3}], 0x1}, 0x60) 22:30:10 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x3, 0x1, &(0x7f0000000080)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) 22:30:10 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80, 0x0}, 0x20008041) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000480)=0x1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r2, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000400)) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="1968e93cff84c009be2abb63374e1af29583c54fd9e34cd0a9a5050a56fcb85e583dfbedd800d809d41e646faa485cbdfa828f0edc9f06c57c84cce5caa7abec2f2ff0ae890c933844fc7d80cfe0151cb6b0da2e66e45f6e520d16688136342bd8049c4156a43b0df77f4918a3fcbb7d517ca41d0fb3501960722caa41be8f410a242b095f5936194f2902620a61289ada986da885e54827b4ca4f41c38efb5eb200"/175], &(0x7f0000000240)='syzkaller\x00', 0xf8000000, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1a, r4, 0x8, &(0x7f0000000280)={0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x0, 0x3fc, 0x1}, 0x10, r3}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={0xffffffffffffffff, 0x10, &(0x7f0000000b00)={0x0}}, 0x10) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000003c0)) close(r0) [ 190.826455][ T8694] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. [ 190.863867][ T8696] netlink: 'syz-executor.2': attribute type 23 has an invalid length. 22:30:10 executing program 0: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) sendmsg$kcm(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x24000084) 22:30:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6000, &(0x7f0000000100)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207a07e4f1e000000880306fb0a000e00030ada1b40d805000304c50083b8", 0x2e}], 0x1}, 0x0) 22:30:10 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x246c3}], 0x1}, 0x60) 22:30:10 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000025000511d25a80648c63940d0424fc6004000e6c0a0003000200008037153e370a00178000000000d1bd", 0x2e}], 0x1}, 0x0) 22:30:10 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x3, 0x1, &(0x7f0000000080)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) 22:30:10 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80, 0x0}, 0x20008041) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000480)=0x1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r2, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000400)) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="1968e93cff84c009be2abb63374e1af29583c54fd9e34cd0a9a5050a56fcb85e583dfbedd800d809d41e646faa485cbdfa828f0edc9f06c57c84cce5caa7abec2f2ff0ae890c933844fc7d80cfe0151cb6b0da2e66e45f6e520d16688136342bd8049c4156a43b0df77f4918a3fcbb7d517ca41d0fb3501960722caa41be8f410a242b095f5936194f2902620a61289ada986da885e54827b4ca4f41c38efb5eb200"/175], &(0x7f0000000240)='syzkaller\x00', 0xf8000000, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1a, r4, 0x8, &(0x7f0000000280)={0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x0, 0x3fc, 0x1}, 0x10, r3}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={0xffffffffffffffff, 0x10, &(0x7f0000000b00)={0x0}}, 0x10) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000003c0)) close(r0) [ 191.282967][ T8718] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. 22:30:10 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80, 0x0}, 0x20008041) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000480)=0x1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r2, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000400)) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="1968e93cff84c009be2abb63374e1af29583c54fd9e34cd0a9a5050a56fcb85e583dfbedd800d809d41e646faa485cbdfa828f0edc9f06c57c84cce5caa7abec2f2ff0ae890c933844fc7d80cfe0151cb6b0da2e66e45f6e520d16688136342bd8049c4156a43b0df77f4918a3fcbb7d517ca41d0fb3501960722caa41be8f410a242b095f5936194f2902620a61289ada986da885e54827b4ca4f41c38efb5eb200"/175], &(0x7f0000000240)='syzkaller\x00', 0xf8000000, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1a, r4, 0x8, &(0x7f0000000280)={0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x0, 0x3fc, 0x1}, 0x10, r3}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={0xffffffffffffffff, 0x10, &(0x7f0000000b00)={0x0}}, 0x10) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000003c0)) close(r0) [ 191.380014][ T8723] netlink: 'syz-executor.2': attribute type 23 has an invalid length. 22:30:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6000, &(0x7f0000000100)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207a07e4f1e000000880306fb0a000e00030ada1b40d805000304c50083b8", 0x2e}], 0x1}, 0x0) 22:30:11 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x246c3}], 0x1}, 0x60) [ 191.549479][ T8734] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. 22:30:11 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000025000511d25a80648c63940d0424fc6004000e6c0a0003000200008037153e370a00178000000000d1bd", 0x2e}], 0x1}, 0x0) 22:30:11 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80, 0x0}, 0x20008041) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000480)=0x1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r2, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000400)) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="1968e93cff84c009be2abb63374e1af29583c54fd9e34cd0a9a5050a56fcb85e583dfbedd800d809d41e646faa485cbdfa828f0edc9f06c57c84cce5caa7abec2f2ff0ae890c933844fc7d80cfe0151cb6b0da2e66e45f6e520d16688136342bd8049c4156a43b0df77f4918a3fcbb7d517ca41d0fb3501960722caa41be8f410a242b095f5936194f2902620a61289ada986da885e54827b4ca4f41c38efb5eb200"/175], &(0x7f0000000240)='syzkaller\x00', 0xf8000000, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1a, r4, 0x8, &(0x7f0000000280)={0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x0, 0x3fc, 0x1}, 0x10, r3}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={0xffffffffffffffff, 0x10, &(0x7f0000000b00)={0x0}}, 0x10) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000003c0)) close(r0) 22:30:11 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80, 0x0}, 0x20008041) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000480)=0x1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r2, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000400)) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="1968e93cff84c009be2abb63374e1af29583c54fd9e34cd0a9a5050a56fcb85e583dfbedd800d809d41e646faa485cbdfa828f0edc9f06c57c84cce5caa7abec2f2ff0ae890c933844fc7d80cfe0151cb6b0da2e66e45f6e520d16688136342bd8049c4156a43b0df77f4918a3fcbb7d517ca41d0fb3501960722caa41be8f410a242b095f5936194f2902620a61289ada986da885e54827b4ca4f41c38efb5eb200"/175], &(0x7f0000000240)='syzkaller\x00', 0xf8000000, 0x0, 0x0, 0x40f00, 0x8, [], 0x0, 0x1a, r4, 0x8, &(0x7f0000000280)={0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x0, 0x3fc, 0x1}, 0x10, r3}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={0xffffffffffffffff, 0x10, &(0x7f0000000b00)={0x0}}, 0x10) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000003c0)) close(r0) 22:30:11 executing program 1: r0 = socket$kcm(0x2, 0x200000000000006, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) close(r0) 22:30:11 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x10, &(0x7f0000000ac0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 191.855771][ T8745] netlink: 'syz-executor.2': attribute type 23 has an invalid length. [ 191.956352][ T8753] sctp: [Deprecated]: syz-executor.4 (pid 8753) Use of struct sctp_assoc_value in delayed_ack socket option. [ 191.956352][ T8753] Use struct sctp_sack_info instead 22:30:11 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x1804, 0x80000000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80, 0x0}, 0x20008041) socket$kcm(0x2, 0x2, 0x0) socketpair(0x18, 0x0, 0x80000000, &(0x7f0000000080)) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpu.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x17, &(0x7f0000000200)=r2, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="140000003100050fd25a80648c63940d0d24", 0x12}], 0x1}, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, 0x0) socket$kcm(0x2b, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x17, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz1\x00', 0x200002, 0x0) [ 192.149186][ T8753] ================================================================== [ 192.159545][ T8753] BUG: KASAN: slab-out-of-bounds in sctp_setsockopt+0x9488/0x95e0 [ 192.167482][ T8753] Write of size 4 at addr ffff88809916e3c8 by task syz-executor.4/8753 [ 192.176311][ T8753] [ 192.178768][ T8753] CPU: 1 PID: 8753 Comm: syz-executor.4 Not tainted 5.8.0-rc4-syzkaller #0 [ 192.187415][ T8753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.197548][ T8753] Call Trace: [ 192.200983][ T8753] dump_stack+0x18f/0x20d [ 192.205642][ T8753] ? sctp_setsockopt+0x9488/0x95e0 [ 192.211115][ T8753] ? sctp_setsockopt+0x9488/0x95e0 [ 192.216514][ T8753] print_address_description.constprop.0.cold+0xae/0x436 [ 192.223924][ T8753] ? printk+0xba/0xed [ 192.228098][ T8753] ? lockdep_hardirqs_off+0x66/0xa0 [ 192.233406][ T8753] ? vprintk_func+0x97/0x1a6 [ 192.238149][ T8753] ? sctp_setsockopt+0x9488/0x95e0 [ 192.243394][ T8753] kasan_report.cold+0x1f/0x37 [ 192.248410][ T8753] ? sctp_setsockopt+0x9488/0x95e0 [ 192.253640][ T8753] sctp_setsockopt+0x9488/0x95e0 [ 192.258705][ T8753] ? aa_af_perm+0x230/0x230 [ 192.263379][ T8753] ? __sctp_setsockopt_connectx+0x140/0x140 [ 192.269404][ T8753] ? sock_common_recvmsg+0x1a0/0x1a0 [ 192.275285][ T8753] __sys_setsockopt+0x337/0x6a0 [ 192.280250][ T8753] ? __ia32_sys_recv+0x100/0x100 [ 192.285355][ T8753] ? ns_to_timespec64+0xc0/0xc0 [ 192.290364][ T8753] ? lock_is_held_type+0xb0/0xe0 [ 192.295423][ T8753] ? __x64_sys_clock_gettime+0x165/0x240 [ 192.301187][ T8753] ? lock_is_held_type+0xb0/0xe0 [ 192.306314][ T8753] __x64_sys_setsockopt+0xba/0x150 [ 192.311532][ T8753] ? lockdep_hardirqs_on+0x6a/0xe0 [ 192.316738][ T8753] do_syscall_64+0x60/0xe0 [ 192.321229][ T8753] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 192.327130][ T8753] RIP: 0033:0x45c1f9 [ 192.331032][ T8753] Code: Bad RIP value. [ 192.335094][ T8753] RSP: 002b:00007f52dd4cdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 192.344068][ T8753] RAX: ffffffffffffffda RBX: 0000000000030700 RCX: 000000000045c1f9 [ 192.353787][ T8753] RDX: 0000000000000010 RSI: 0000000000000084 RDI: 0000000000000003 [ 192.365517][ T8753] RBP: 000000000078bf50 R08: 0000000000000008 R09: 0000000000000000 [ 192.375298][ T8753] R10: 0000000020000ac0 R11: 0000000000000246 R12: 000000000078bf0c [ 192.388365][ T8753] R13: 00007ffd6668cc2f R14: 00007f52dd4ce9c0 R15: 000000000078bf0c [ 192.398095][ T8753] [ 192.400580][ T8753] Allocated by task 8753: [ 192.405168][ T8753] save_stack+0x1b/0x40 [ 192.409564][ T8753] __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 192.418649][ T8753] __kmalloc_track_caller+0x178/0x330 [ 192.425068][ T8753] memdup_user+0x22/0xd0 [ 192.431119][ T8753] sctp_setsockopt+0x17a/0x95e0 [ 192.437597][ T8753] __sys_setsockopt+0x337/0x6a0 [ 192.443232][ T8753] __x64_sys_setsockopt+0xba/0x150 [ 192.450249][ T8753] do_syscall_64+0x60/0xe0 [ 192.455384][ T8753] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 192.462388][ T8753] [ 192.466353][ T8753] Freed by task 6952: [ 192.470590][ T8753] save_stack+0x1b/0x40 [ 192.475022][ T8753] __kasan_slab_free+0xf5/0x140 [ 192.481349][ T8753] kfree+0x103/0x2c0 [ 192.485556][ T8753] tomoyo_path_perm+0x234/0x3f0 [ 192.491615][ T8753] security_inode_getattr+0xcf/0x140 [ 192.497199][ T8753] vfs_statx+0x170/0x390 [ 192.501451][ T8753] __do_sys_newfstatat+0x96/0x120 [ 192.506500][ T8753] do_syscall_64+0x60/0xe0 [ 192.510921][ T8753] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 192.517032][ T8753] [ 192.519799][ T8753] The buggy address belongs to the object at ffff88809916e3c0 [ 192.519799][ T8753] which belongs to the cache kmalloc-32 of size 32 [ 192.537877][ T8753] The buggy address is located 8 bytes inside of [ 192.537877][ T8753] 32-byte region [ffff88809916e3c0, ffff88809916e3e0) [ 192.553226][ T8753] The buggy address belongs to the page: [ 192.559985][ T8753] page:ffffea0002645b80 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88809916efc1 [ 192.570847][ T8753] flags: 0xfffe0000000200(slab) [ 192.575773][ T8753] raw: 00fffe0000000200 ffffea000266c1c8 ffff8880aa001250 ffff8880aa0001c0 [ 192.584435][ T8753] raw: ffff88809916efc1 ffff88809916e000 000000010000003f 0000000000000000 [ 192.593074][ T8753] page dumped because: kasan: bad access detected [ 192.599698][ T8753] [ 192.602080][ T8753] Memory state around the buggy address: [ 192.607831][ T8753] ffff88809916e280: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 192.616457][ T8753] ffff88809916e300: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 192.624592][ T8753] >ffff88809916e380: fb fb fb fb fc fc fc fc 00 fc fc fc fc fc fc fc [ 192.633182][ T8753] ^ [ 192.639857][ T8753] ffff88809916e400: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 192.648074][ T8753] ffff88809916e480: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 192.656182][ T8753] ================================================================== [ 192.664418][ T8753] Disabling lock debugging due to kernel taint [ 192.726581][ T8753] Kernel panic - not syncing: panic_on_warn set ... [ 192.733402][ T8753] CPU: 0 PID: 8753 Comm: syz-executor.4 Tainted: G B 5.8.0-rc4-syzkaller #0 [ 192.733455][ T8758] sctp: [Deprecated]: syz-executor.4 (pid 8758) Use of struct sctp_assoc_value in delayed_ack socket option. [ 192.733455][ T8758] Use struct sctp_sack_info instead [ 192.743458][ T8753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.743474][ T8753] Call Trace: [ 192.743548][ T8753] dump_stack+0x18f/0x20d [ 192.743574][ T8753] ? sctp_setsockopt+0x9480/0x95e0 [ 192.743598][ T8753] panic+0x2e3/0x75c [ 192.743611][ T8753] ? __warn_printk+0xf3/0xf3 [ 192.743631][ T8753] ? preempt_schedule_common+0x59/0xc0 [ 192.743642][ T8753] ? sctp_setsockopt+0x9488/0x95e0 [ 192.743662][ T8753] ? preempt_schedule_thunk+0x16/0x18 [ 192.743678][ T8753] ? trace_hardirqs_on+0x55/0x220 [ 192.743689][ T8753] ? sctp_setsockopt+0x9488/0x95e0 [ 192.743699][ T8753] ? sctp_setsockopt+0x9488/0x95e0 [ 192.743717][ T8753] end_report+0x4d/0x53 [ 192.743731][ T8753] kasan_report.cold+0xd/0x37 [ 192.743742][ T8753] ? sctp_setsockopt+0x9488/0x95e0 [ 192.743753][ T8753] sctp_setsockopt+0x9488/0x95e0 [ 192.743781][ T8753] ? aa_af_perm+0x230/0x230 [ 192.743795][ T8753] ? __sctp_setsockopt_connectx+0x140/0x140 [ 192.743835][ T8753] ? sock_common_recvmsg+0x1a0/0x1a0 [ 192.860831][ T8753] __sys_setsockopt+0x337/0x6a0 [ 192.867531][ T8753] ? __ia32_sys_recv+0x100/0x100 [ 192.872854][ T8753] ? ns_to_timespec64+0xc0/0xc0 [ 192.877796][ T8753] ? lock_is_held_type+0xb0/0xe0 [ 192.882834][ T8753] ? __x64_sys_clock_gettime+0x165/0x240 [ 192.888651][ T8753] ? lock_is_held_type+0xb0/0xe0 [ 192.893840][ T8753] __x64_sys_setsockopt+0xba/0x150 [ 192.899786][ T8753] ? lockdep_hardirqs_on+0x6a/0xe0 [ 192.904991][ T8753] do_syscall_64+0x60/0xe0 [ 192.909484][ T8753] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 192.915585][ T8753] RIP: 0033:0x45c1f9 [ 192.919532][ T8753] Code: Bad RIP value. [ 192.923643][ T8753] RSP: 002b:00007f52dd4cdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 192.932100][ T8753] RAX: ffffffffffffffda RBX: 0000000000030700 RCX: 000000000045c1f9 [ 192.940124][ T8753] RDX: 0000000000000010 RSI: 0000000000000084 RDI: 0000000000000003 [ 192.948330][ T8753] RBP: 000000000078bf50 R08: 0000000000000008 R09: 0000000000000000 [ 192.956655][ T8753] R10: 0000000020000ac0 R11: 0000000000000246 R12: 000000000078bf0c [ 192.965829][ T8753] R13: 00007ffd6668cc2f R14: 00007f52dd4ce9c0 R15: 000000000078bf0c [ 192.975224][ T8753] Kernel Offset: disabled [ 192.979986][ T8753] Rebooting in 86400 seconds..