{&(0x7f0000000200)=""/63, 0x3f}, {&(0x7f0000002740)=""/4096, 0x1000}], 0x3, &(0x7f00000002c0)=""/4, 0x4}, 0x2000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r1, 0x3) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d000598d95a80648c63940d0124fcd5ec20c60179d54ef0a3953000100002400200a06d053582c13715", 0x2e}], 0x1}, 0x0) close(r8) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) 23:21:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xf203) [ 2935.650801][T27523] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 23:21:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xf402) [ 2935.705922][T27523] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 23:21:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d}) 23:21:10 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11{\xa4\x0f\x00', 0x2}) [ 2935.916402][T27522] device 2178 entered promiscuous mode [ 2935.955617][T27523] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 23:21:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xd2030000}, 0x0) 23:21:10 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x400300, 0x0}, 0x0) 23:21:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r0, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) [ 2936.225169][T27529] device 1093 entered promiscuous mode [ 2936.280372][T27529] validate_nla: 8 callbacks suppressed [ 2936.280417][T27529] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:21:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d}) [ 2936.570647][T27544] device 2179 entered promiscuous mode [ 2936.592057][T27558] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2936.635466][T27529] device 1094 entered promiscuous mode 23:21:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xfa02) 23:21:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000440)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000014c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51f1c3207f3e47f3, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, @perf_bp={&(0x7f0000000400), 0xc}, 0x24800, 0x5, 0x0, 0x0, 0x0, 0x64, 0x667a}, r1, 0xd, 0xffffffffffffffff, 0xd) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r3, 0x3) write$cgroup_int(r3, &(0x7f00000001c0)=0xd013, 0x12) r4 = gettid() r5 = socket$kcm(0x2, 0x5, 0x84) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r5, 0x84, 0x76, &(0x7f0000000ac0)=r6, 0x8) openat$cgroup_ro(r6, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) mkdirat$cgroup(r6, &(0x7f0000000200)='syz1\x00', 0x1ff) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) write$cgroup_pid(r0, &(0x7f0000000180)=r4, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0x8, 0x1, 0x8, &(0x7f0000000080)=[0x0], 0x1}, 0x20) [ 2936.687235][T27558] device 2180 entered promiscuous mode 23:21:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xd4030000}, 0x0) [ 2936.833930][T27564] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2936.901166][T27568] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) 23:21:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000440)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000014c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51f1c3207f3e47f3, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, @perf_bp={&(0x7f0000000400), 0xc}, 0x24800, 0x5, 0x0, 0x0, 0x0, 0x64, 0x667a}, r1, 0xd, 0xffffffffffffffff, 0xd) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r3, 0x3) write$cgroup_int(r3, &(0x7f00000001c0)=0xd013, 0x12) r4 = gettid() r5 = socket$kcm(0x2, 0x5, 0x84) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r5, 0x84, 0x76, &(0x7f0000000ac0)=r6, 0x8) openat$cgroup_ro(r6, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) mkdirat$cgroup(r6, &(0x7f0000000200)='syz1\x00', 0x1ff) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) write$cgroup_pid(r0, &(0x7f0000000180)=r4, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0x8, 0x1, 0x8, &(0x7f0000000080)=[0x0], 0x1}, 0x20) [ 2937.201271][T27564] device 1095 entered promiscuous mode 23:21:11 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11|\xa4\x0f\x00', 0x2}) 23:21:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xfa03) 23:21:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000440)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000014c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51f1c3207f3e47f3, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, @perf_bp={&(0x7f0000000400), 0xc}, 0x24800, 0x5, 0x0, 0x0, 0x0, 0x64, 0x667a}, r1, 0xd, 0xffffffffffffffff, 0xd) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r3, 0x3) write$cgroup_int(r3, &(0x7f00000001c0)=0xd013, 0x12) r4 = gettid() r5 = socket$kcm(0x2, 0x5, 0x84) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r5, 0x84, 0x76, &(0x7f0000000ac0)=r6, 0x8) openat$cgroup_ro(r6, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) mkdirat$cgroup(r6, &(0x7f0000000200)='syz1\x00', 0x1ff) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) write$cgroup_pid(r0, &(0x7f0000000180)=r4, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0x8, 0x1, 0x8, &(0x7f0000000080)=[0x0], 0x1}, 0x20) 23:21:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xfeff) [ 2937.536507][T27568] device 2181 entered promiscuous mode 23:21:12 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0xa00100, 0x0}, 0x0) 23:21:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xda030000}, 0x0) 23:21:12 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) 23:21:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xff7f) 23:21:12 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11}\xa4\x0f\x00', 0x2}) [ 2937.797590][T27606] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xfffe) 23:21:12 executing program 3: r0 = socket$kcm(0x2, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.usage_all\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x76, &(0x7f0000000ac0)=r1, 0x8) openat$cgroup_ro(r1, &(0x7f00000001c0)='m\x9e\x8dj\xd6\x05\x9ci\xb7', 0x26e1, 0x0) openat$cgroup(r1, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x72871e7fb3d51021, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x2b811230ae46c0aa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) 23:21:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000440)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000014c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51f1c3207f3e47f3, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, @perf_bp={&(0x7f0000000400), 0xc}, 0x24800, 0x5, 0x0, 0x0, 0x0, 0x64, 0x667a}, r1, 0xd, 0xffffffffffffffff, 0xd) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r3, 0x3) write$cgroup_int(r3, &(0x7f00000001c0)=0xd013, 0x12) r4 = gettid() r5 = socket$kcm(0x2, 0x5, 0x84) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r5, 0x84, 0x76, &(0x7f0000000ac0)=r6, 0x8) openat$cgroup_ro(r6, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) mkdirat$cgroup(r6, &(0x7f0000000200)='syz1\x00', 0x1ff) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) write$cgroup_pid(r0, &(0x7f0000000180)=r4, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0x8, 0x1, 0x8, &(0x7f0000000080)=[0x0], 0x1}, 0x20) [ 2938.110214][T27623] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2938.222441][T27606] device 2182 entered promiscuous mode 23:21:13 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r0, 0x3) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='me\xff\x01\x00\x00+\xd9\xf4d\xe8\xdd\xaa\x00', 0x7a05, 0x1700) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="7e4a7a006386dd20bfa6"], 0x9213) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00', 0x4000}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x5, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x6, 0x3}, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x8, 0x8, 0x1}, &(0x7f0000000200)=0x3f, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x46}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r3}, 0xc) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) [ 2938.275133][T27627] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0x0, 0x8}) [ 2938.343624][T27623] device 1096 entered promiscuous mode 23:21:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x40000) [ 2938.462394][T27627] device 2183 entered promiscuous mode 23:21:13 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x1000000, 0x0}, 0x0) 23:21:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xdc030000}, 0x0) 23:21:13 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x4}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0xffffffff}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d000598d95a80648c63940d0124fcd5ec20c60179d54ef0a3953000100002400200a06d053582c13715", 0x2e}], 0x1}, 0x0) sendmsg$inet(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000080)="deff76e98e36274257fbfc7ab1dfe57b32507e52ee11464763fb85b3ee9eb0eb2ec9", 0x22}, {&(0x7f0000000100)="f2bfe2defd4ef2e9cc32308420de", 0xe}, {&(0x7f0000000180)="16dff9d4478435021d2686e224cf3803af36c72d6580f147ac3b2622864ee8c0d2445fd4e187d1c8b16ad584fb3b6736d2035fc8ed78059b3ad4763d09a4c464cf21ad03dfb71fcb9aecb5e091381d06702b03f0d4b7c70d8941d61cb84206480c20055c151b51795104733537cbac64cc5c23df5ec9b770114dc1f10d243fd9998a20ae416ab2253560a0da09d80840478cb0afc683c462dd70623a660dac016ce3ec3c0aa4c969154cd4d30f4dba6cb084f92d92066b5d", 0xb8}], 0x3, &(0x7f0000000280)=[@ip_retopts={{0xc0, 0x0, 0x7, {[@cipso={0x86, 0x47, 0x4d1, [{0x0, 0x2}, {0x6, 0xb, "953cbb1190763390a4"}, {0x7, 0xe, "3bd4cfd77e9eb38ea0d41880"}, {0x6, 0x5, "14465c"}, {0x5, 0x2}, {0x7, 0x7, "619d396a27"}, {0x0, 0xe, "63cc85da0487b64f82488692"}, {0x5, 0x5, "32bdd1"}, {0x0, 0x5, "628701"}]}, @rr={0x7, 0x2b, 0xac, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x24}, @loopback, @broadcast, @multicast2, @remote, @remote, @multicast1, @local]}, @ssrr={0x89, 0x3, 0x9}, @end, @generic={0x86, 0xb, "874253ed58ad2a4694"}, @timestamp={0x44, 0x2c, 0x7, 0x1, 0x6, [{[], 0x100000}, {[], 0xfffffffc}, {[@initdev={0xac, 0x1e, 0x1, 0x0}], 0x81}, {[], 0x1}, {[@local], 0x5}, {[], 0x4040000}, {[@multicast1], 0x7fff}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0xd8}, 0x4000000) 23:21:13 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11~\xa4\x0f\x00', 0x2}) [ 2938.590072][T27642] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2938.641710][T27646] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2938.727819][T27642] device 1097 entered promiscuous mode 23:21:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xf0ffff) [ 2938.804488][T27656] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 23:21:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x1000000) 23:21:13 executing program 5 (fault-call:9 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2938.964889][T27664] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:21:13 executing program 3: socketpair(0xe, 0x4, 0x20, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.stat\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000200)={r1}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0xf, 0x3, 0x3f, &(0x7f0000000180)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = gettid() perf_event_open(0x0, r5, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) write$cgroup_pid(r4, &(0x7f0000000240)=r5, 0xfffffffffffffeca) [ 2939.054064][T27646] device 2184 entered promiscuous mode 23:21:13 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'hwsim0\x00'}) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7e4a7a006386dd20bfa6"], 0x9213) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{0x3, 0x6, 0x7, 0x5}, {0x5, 0x42, 0x5, 0x4}, {0x3b5, 0x80, 0x2}, {0x40, 0x20, 0xe2, 0x4}, {0x1, 0x7, 0xb2, 0x6}, {0x7ff, 0x2, 0x9, 0x1ab}, {0x93, 0x7, 0x7f, 0x8000}, {0x80, 0x9, 0xa8, 0x9}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) 23:21:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xe2030000}, 0x0) [ 2939.221858][T27664] device 1098 entered promiscuous mode [ 2939.229192][T27669] FAULT_INJECTION: forcing a failure. [ 2939.229192][T27669] name failslab, interval 1, probability 0, space 0, times 0 [ 2939.269504][T27669] CPU: 0 PID: 27669 Comm: syz-executor.5 Not tainted 5.4.0-rc3+ #0 [ 2939.277442][T27669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2939.287597][T27669] Call Trace: [ 2939.287624][T27669] dump_stack+0x172/0x1f0 [ 2939.287646][T27669] should_fail.cold+0xa/0x15 [ 2939.287666][T27669] ? fault_create_debugfs_attr+0x180/0x180 [ 2939.287686][T27669] ? ___might_sleep+0x163/0x2c0 [ 2939.287703][T27669] __should_failslab+0x121/0x190 [ 2939.287722][T27669] should_failslab+0x9/0x14 [ 2939.319997][T27669] kmem_cache_alloc+0x2aa/0x710 [ 2939.324893][T27669] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2939.331163][T27669] ? iov_iter_alignment+0x1c9/0x830 [ 2939.336394][T27669] do_blockdev_direct_IO+0x378/0x8420 [ 2939.341796][T27669] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2939.347361][T27669] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2939.353809][T27669] ? ___might_sleep+0x163/0x2c0 [ 2939.358665][T27669] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2939.364899][T27669] ? mark_buffer_dirty+0x190/0x6c0 [ 2939.370003][T27669] ? bget_one+0x30/0x30 [ 2939.374173][T27669] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2939.380692][T27669] ? sb_init_dio_done_wq+0x80/0x80 [ 2939.385816][T27669] ? __kasan_check_read+0x11/0x20 [ 2939.390829][T27669] ? __lock_acquire+0x16f2/0x4a00 [ 2939.395867][T27669] ? lock_downgrade+0x920/0x920 [ 2939.400709][T27669] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2939.407202][T27669] __blockdev_direct_IO+0xa1/0xca [ 2939.412225][T27669] ? __blockdev_direct_IO+0xa1/0xca [ 2939.417419][T27669] ? bget_one+0x30/0x30 [ 2939.421571][T27669] ext4_direct_IO+0xc0d/0x1c50 [ 2939.426335][T27669] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2939.432845][T27669] generic_file_direct_write+0x20a/0x4a0 [ 2939.438494][T27669] __generic_file_write_iter+0x2ee/0x630 [ 2939.444141][T27669] ext4_file_write_iter+0x317/0x13c0 [ 2939.449432][T27669] ? ext4_release_file+0x380/0x380 [ 2939.454529][T27669] ? mark_lock+0xc2/0x1220 [ 2939.458937][T27669] ? __kasan_check_read+0x11/0x20 [ 2939.463946][T27669] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2939.470183][T27669] ? iov_iter_init+0xee/0x220 [ 2939.474858][T27669] new_sync_write+0x4d3/0x770 [ 2939.479613][T27669] ? new_sync_read+0x800/0x800 [ 2939.484386][T27669] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2939.490540][T27669] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2939.495820][T27669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2939.502071][T27669] __vfs_write+0xe1/0x110 [ 2939.506394][T27669] vfs_write+0x268/0x5d0 [ 2939.510862][T27669] ksys_write+0x14f/0x290 [ 2939.515181][T27669] ? __ia32_sys_read+0xb0/0xb0 [ 2939.519944][T27669] ? do_syscall_64+0x26/0x760 [ 2939.524615][T27669] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2939.530698][T27669] ? do_syscall_64+0x26/0x760 [ 2939.535364][T27669] __x64_sys_write+0x73/0xb0 [ 2939.539941][T27669] do_syscall_64+0xfa/0x760 [ 2939.544537][T27669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2939.550434][T27669] RIP: 0033:0x459f49 [ 2939.554323][T27669] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2939.574365][T27669] RSP: 002b:00007f2421607c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2939.583995][T27669] RAX: ffffffffffffffda RBX: 00007f2421607c90 RCX: 0000000000459f49 [ 2939.592519][T27669] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000008 [ 2939.600497][T27669] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2939.608475][T27669] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24216086d4 23:21:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x2000000) [ 2939.617422][T27669] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000009 23:21:14 executing program 5 (fault-call:9 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2939.888662][T27682] device 2185 entered promiscuous mode [ 2939.924681][T27690] FAULT_INJECTION: forcing a failure. [ 2939.924681][T27690] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2939.938816][T27690] CPU: 0 PID: 27690 Comm: syz-executor.5 Not tainted 5.4.0-rc3+ #0 [ 2939.938827][T27690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2939.938832][T27690] Call Trace: [ 2939.938857][T27690] dump_stack+0x172/0x1f0 [ 2939.938881][T27690] should_fail.cold+0xa/0x15 [ 2939.938902][T27690] ? fault_create_debugfs_attr+0x180/0x180 [ 2939.938920][T27690] ? __kasan_check_read+0x11/0x20 [ 2939.938934][T27690] ? __lock_acquire+0x16f2/0x4a00 [ 2939.938956][T27690] should_fail_alloc_page+0x50/0x60 [ 2939.938968][T27690] __alloc_pages_nodemask+0x1a1/0x900 [ 2939.938989][T27690] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2939.957124][T27690] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2939.957143][T27690] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2939.957171][T27690] ? fault_create_debugfs_attr+0x180/0x180 [ 2939.957192][T27690] cache_grow_begin+0x90/0xd20 [ 2939.957213][T27690] ? do_blockdev_direct_IO+0x378/0x8420 [ 2939.964821][T27690] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2939.964841][T27690] kmem_cache_alloc+0x64e/0x710 [ 2939.964859][T27690] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2939.964884][T27690] do_blockdev_direct_IO+0x378/0x8420 [ 2939.964904][T27690] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2939.964926][T27690] ? retint_kernel+0x2b/0x2b [ 2939.975454][T27690] ? bget_one+0x30/0x30 [ 2939.975470][T27690] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2939.975494][T27690] ? sb_init_dio_done_wq+0x80/0x80 [ 2939.975509][T27690] ? __kasan_check_read+0x11/0x20 [ 2939.975525][T27690] ? mark_lock+0xc2/0x1220 [ 2939.975542][T27690] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2939.975567][T27690] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2939.990283][T27690] ? retint_kernel+0x2b/0x2b [ 2939.990299][T27690] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2939.990335][T27690] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2939.990350][T27690] ? bget_one+0x30/0x30 [ 2939.990366][T27690] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2939.990382][T27690] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2939.990401][T27690] __blockdev_direct_IO+0xa1/0xca [ 2939.990414][T27690] ? __blockdev_direct_IO+0xa1/0xca [ 2939.990432][T27690] ? bget_one+0x30/0x30 [ 2940.002067][T27690] ext4_direct_IO+0xc0d/0x1c50 [ 2940.002087][T27690] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2940.002114][T27690] generic_file_direct_write+0x20a/0x4a0 [ 2940.002136][T27690] __generic_file_write_iter+0x2ee/0x630 [ 2940.002158][T27690] ext4_file_write_iter+0x317/0x13c0 [ 2940.002171][T27690] ? __kasan_check_read+0x11/0x20 [ 2940.002190][T27690] ? ext4_release_file+0x380/0x380 [ 2940.002204][T27690] ? mark_lock+0xc2/0x1220 [ 2940.002223][T27690] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2940.013590][T27690] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2940.013607][T27690] ? iov_iter_init+0xee/0x220 [ 2940.013624][T27690] new_sync_write+0x4d3/0x770 [ 2940.013641][T27690] ? new_sync_read+0x800/0x800 [ 2940.013668][T27690] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2940.013690][T27690] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2940.013705][T27690] ? __sb_start_write+0x290/0x460 [ 2940.013721][T27690] __vfs_write+0xe1/0x110 [ 2940.013737][T27690] vfs_write+0x268/0x5d0 [ 2940.025359][T27690] ksys_write+0x14f/0x290 [ 2940.025376][T27690] ? __ia32_sys_read+0xb0/0xb0 [ 2940.025400][T27690] __x64_sys_write+0x73/0xb0 [ 2940.025417][T27690] ? do_syscall_64+0x5b/0x760 [ 2940.025433][T27690] do_syscall_64+0xfa/0x760 [ 2940.025455][T27690] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2940.025470][T27690] RIP: 0033:0x459f49 [ 2940.035743][T27690] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2940.035751][T27690] RSP: 002b:00007f2421628c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2940.035765][T27690] RAX: ffffffffffffffda RBX: 00007f2421628c90 RCX: 0000000000459f49 [ 2940.035774][T27690] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000008 [ 2940.035782][T27690] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2940.035791][T27690] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24216296d4 [ 2940.035799][T27690] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000009 [ 2940.416442][T27686] device 1099 entered promiscuous mode 23:21:15 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x2000000, 0x0}, 0x0) 23:21:15 executing program 5 (fault-call:9 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:15 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x10\x00', 0x2}) 23:21:15 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7e4a7a006386dd20bfa6"], 0x9213) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000040)) 23:21:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x2010000) [ 2940.558226][T27691] device 2186 entered promiscuous mode 23:21:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xe4030000}, 0x0) [ 2940.681572][T27700] FAULT_INJECTION: forcing a failure. [ 2940.681572][T27700] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2940.694829][T27700] CPU: 0 PID: 27700 Comm: syz-executor.5 Not tainted 5.4.0-rc3+ #0 [ 2940.702734][T27700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2940.712803][T27700] Call Trace: [ 2940.716115][T27700] dump_stack+0x172/0x1f0 [ 2940.720469][T27700] should_fail.cold+0xa/0x15 [ 2940.725074][T27700] ? __kasan_check_read+0x11/0x20 [ 2940.730111][T27700] ? fault_create_debugfs_attr+0x180/0x180 [ 2940.735936][T27700] ? __kasan_check_read+0x11/0x20 [ 2940.740981][T27700] ? __lock_acquire+0x16f2/0x4a00 [ 2940.746017][T27700] should_fail_alloc_page+0x50/0x60 [ 2940.751238][T27700] __alloc_pages_nodemask+0x1a1/0x900 [ 2940.751253][T27700] ? ____cache_alloc_node+0x160/0x1d0 [ 2940.751267][T27700] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2940.751284][T27700] ? ____cache_alloc_node+0x160/0x1d0 [ 2940.762009][T27700] ? lock_downgrade+0x920/0x920 [ 2940.762033][T27700] cache_grow_begin+0x90/0xd20 [ 2940.762049][T27700] ? __kasan_check_read+0x11/0x20 [ 2940.762063][T27700] ? do_raw_spin_unlock+0x57/0x270 [ 2940.762081][T27700] ____cache_alloc_node+0x17a/0x1d0 [ 2940.762098][T27700] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2940.762112][T27700] kmem_cache_alloc+0x1ef/0x710 [ 2940.762127][T27700] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2940.762150][T27700] do_blockdev_direct_IO+0x378/0x8420 [ 2940.762167][T27700] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2940.762182][T27700] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2940.762196][T27700] ? ___might_sleep+0x163/0x2c0 [ 2940.762214][T27700] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2940.762230][T27700] ? mark_buffer_dirty+0x190/0x6c0 [ 2940.762246][T27700] ? bget_one+0x30/0x30 [ 2940.762261][T27700] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2940.762279][T27700] ? sb_init_dio_done_wq+0x80/0x80 [ 2940.762297][T27700] ? __kasan_check_read+0x11/0x20 [ 2940.773367][T27700] ? mark_lock+0xc2/0x1220 [ 2940.773382][T27700] ? __lock_acquire+0x16f2/0x4a00 [ 2940.773410][T27700] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 2940.773426][T27700] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2940.773458][T27700] ? retint_kernel+0x2b/0x2b [ 2940.788068][T27700] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2940.788090][T27700] __blockdev_direct_IO+0xa1/0xca [ 2940.788106][T27700] ? __blockdev_direct_IO+0xa1/0xca [ 2940.788120][T27700] ? bget_one+0x30/0x30 [ 2940.788139][T27700] ext4_direct_IO+0xc0d/0x1c50 [ 2940.798433][T27700] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2940.798461][T27700] generic_file_direct_write+0x20a/0x4a0 [ 2940.798484][T27700] __generic_file_write_iter+0x2ee/0x630 [ 2940.798505][T27700] ext4_file_write_iter+0x317/0x13c0 [ 2940.798526][T27700] ? ext4_release_file+0x380/0x380 [ 2940.809608][T27700] ? retint_kernel+0x2b/0x2b [ 2940.809634][T27700] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2940.809651][T27700] ? iov_iter_init+0xee/0x220 [ 2940.809670][T27700] new_sync_write+0x4d3/0x770 [ 2940.809685][T27700] ? new_sync_read+0x800/0x800 [ 2940.809710][T27700] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2940.809730][T27700] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2940.821308][T27700] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2940.821328][T27700] __vfs_write+0xe1/0x110 [ 2940.821346][T27700] vfs_write+0x268/0x5d0 [ 2940.821366][T27700] ksys_write+0x14f/0x290 [ 2940.821381][T27700] ? __ia32_sys_read+0xb0/0xb0 [ 2940.821403][T27700] __x64_sys_write+0x73/0xb0 [ 2940.821418][T27700] ? do_syscall_64+0x5b/0x760 [ 2940.821435][T27700] do_syscall_64+0xfa/0x760 [ 2940.833114][T27700] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2940.833127][T27700] RIP: 0033:0x459f49 [ 2940.833142][T27700] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2940.833150][T27700] RSP: 002b:00007f2421628c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2940.833164][T27700] RAX: ffffffffffffffda RBX: 00007f2421628c90 RCX: 0000000000459f49 [ 2940.833173][T27700] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000008 [ 2940.833181][T27700] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2940.833189][T27700] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24216296d4 [ 2940.833196][T27700] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000009 23:21:15 executing program 5 (fault-call:9 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2941.126324][T27711] device 1100 entered promiscuous mode [ 2941.315166][T27712] device 2187 entered promiscuous mode [ 2941.355556][T27718] FAULT_INJECTION: forcing a failure. [ 2941.355556][T27718] name failslab, interval 1, probability 0, space 0, times 0 [ 2941.379539][T27718] CPU: 1 PID: 27718 Comm: syz-executor.5 Not tainted 5.4.0-rc3+ #0 [ 2941.387466][T27718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2941.390012][T27709] device 1101 entered promiscuous mode [ 2941.397524][T27718] Call Trace: [ 2941.397626][T27718] dump_stack+0x172/0x1f0 [ 2941.410775][T27718] should_fail.cold+0xa/0x15 [ 2941.415382][T27718] ? fault_create_debugfs_attr+0x180/0x180 [ 2941.421202][T27718] ? ___might_sleep+0x163/0x2c0 [ 2941.426062][T27718] __should_failslab+0x121/0x190 [ 2941.431019][T27718] should_failslab+0x9/0x14 [ 2941.435551][T27718] __kmalloc+0x2e0/0x770 [ 2941.439828][T27718] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2941.445988][T27718] ? ext4_find_extent+0x76e/0x9d0 [ 2941.451024][T27718] ext4_find_extent+0x76e/0x9d0 [ 2941.455881][T27718] ? audit_add_tree_rule+0x1c0/0xbe0 [ 2941.461160][T27718] ext4_ext_map_blocks+0x1dc/0x3ac0 [ 2941.461176][T27718] ? retint_kernel+0x2b/0x2b [ 2941.461196][T27718] ? ext4_ext_release+0x10/0x10 [ 2941.461212][T27718] ? lock_acquire+0x20b/0x410 [ 2941.461233][T27718] ? __kasan_check_write+0x14/0x20 [ 2941.461247][T27718] ? down_read+0x109/0x430 [ 2941.461263][T27718] ? down_read_killable+0x490/0x490 [ 2941.461278][T27718] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2941.461290][T27718] ? ext4_es_lookup_extent+0x426/0xd40 [ 2941.461306][T27718] ? __kasan_check_write+0x14/0x20 [ 2941.512119][T27718] ext4_map_blocks+0xdc7/0x17e0 [ 2941.512146][T27718] ? ext4_issue_zeroout+0x190/0x190 [ 2941.512176][T27718] _ext4_get_block+0x242/0x5f0 [ 2941.512192][T27718] ? ext4_map_blocks+0x17e0/0x17e0 [ 2941.512210][T27718] ? ext4_journal_check_start+0x1ba/0x260 [ 2941.512228][T27718] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2941.512244][T27718] ? __ext4_journal_start_sb+0x146/0x4d0 [ 2941.512264][T27718] ext4_get_block_trans+0x17b/0x2b0 23:21:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xea030000}, 0x0) 23:21:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3000000) [ 2941.512283][T27718] ? ext4_dio_get_block_overwrite+0x140/0x140 [ 2941.512310][T27718] ext4_dio_get_block+0x78/0xc0 [ 2941.537990][T27718] do_blockdev_direct_IO+0x1227/0x8420 [ 2941.538017][T27718] ? ___might_sleep+0x163/0x2c0 [ 2941.538050][T27718] ? sb_init_dio_done_wq+0x80/0x80 [ 2941.538070][T27718] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2941.586668][T27718] ? ext4_direct_IO+0x99b/0x1c50 [ 2941.591642][T27718] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2941.598174][T27718] ? lock_downgrade+0x920/0x920 [ 2941.603049][T27718] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2941.606256][T27725] validate_nla: 6 callbacks suppressed [ 2941.606283][T27725] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2941.609559][T27718] __blockdev_direct_IO+0xa1/0xca [ 2941.609574][T27718] ? __blockdev_direct_IO+0xa1/0xca [ 2941.609589][T27718] ? bget_one+0x30/0x30 [ 2941.609606][T27718] ext4_direct_IO+0xc0d/0x1c50 [ 2941.609624][T27718] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2941.609649][T27718] generic_file_direct_write+0x20a/0x4a0 [ 2941.609669][T27718] __generic_file_write_iter+0x2ee/0x630 [ 2941.609689][T27718] ext4_file_write_iter+0x317/0x13c0 [ 2941.609711][T27718] ? ext4_release_file+0x380/0x380 [ 2941.609726][T27718] ? mark_lock+0xc2/0x1220 [ 2941.609754][T27718] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2941.609770][T27718] ? iov_iter_init+0xee/0x220 [ 2941.609787][T27718] new_sync_write+0x4d3/0x770 [ 2941.609803][T27718] ? new_sync_read+0x800/0x800 [ 2941.609830][T27718] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2941.609857][T27718] ? rcu_read_lock_bh_held+0xb0/0xb0 23:21:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xec030000}, 0x0) [ 2941.706675][T27718] ? __this_cpu_preempt_check+0x3a/0x210 [ 2941.712325][T27718] __vfs_write+0xe1/0x110 [ 2941.716666][T27718] vfs_write+0x268/0x5d0 [ 2941.720918][T27718] ksys_write+0x14f/0x290 [ 2941.725250][T27718] ? __ia32_sys_read+0xb0/0xb0 [ 2941.730031][T27718] __x64_sys_write+0x73/0xb0 [ 2941.734636][T27718] ? do_syscall_64+0x5b/0x760 [ 2941.739322][T27718] do_syscall_64+0xfa/0x760 [ 2941.743834][T27718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2941.749737][T27718] RIP: 0033:0x459f49 [ 2941.753640][T27718] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2941.773249][T27718] RSP: 002b:00007f2421628c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2941.773264][T27718] RAX: ffffffffffffffda RBX: 00007f2421628c90 RCX: 0000000000459f49 [ 2941.773272][T27718] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000008 [ 2941.773278][T27718] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2941.773286][T27718] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24216296d4 [ 2941.773293][T27718] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000009 [ 2941.793337][T27731] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:16 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x5450, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='trustedsecurityposix_acl_access\'%$$keyring\x00') write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) 23:21:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x4000000) [ 2942.047982][T27725] device 1102 entered promiscuous mode [ 2942.185656][T27741] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2942.340116][T27731] device 2188 entered promiscuous mode [ 2942.417805][T27741] device 1103 entered promiscuous mode 23:21:17 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x3000000, 0x0}, 0x0) 23:21:17 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x00\x01\x00', 0x2}) 23:21:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r0, 0x3) openat$cgroup_ro(r0, &(0x7f0000000040)='entq\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x88\b,\xb7*_-2\xf2\xedn\x8f\x7f!!\xb2\xf5\xdf\xa4\t66\xd8=\xed\x05w\xc285B\xc20\xe6G\x85\x90\xba\xb39\x03p\xc6\xdf\xacw\xb5b9\r\xec\xa1:\x8do&\xb2\xed\x8fB<\n%\xebT{\f\x95?\xf2', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = socket$kcm(0x2, 0x5, 0x84) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0)=r4, 0x8) r5 = openat$cgroup_ro(r4, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r5, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x70, 0x4, 0x7, 0x9, 0x7b, 0x0, 0x6, 0x4000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xae2, 0x1, @perf_config_ext={0x9, 0x1}, 0x100, 0x9, 0x5a2, 0x5ca502665b18ffbd, 0x4ca, 0x8, 0x5}, r5, 0xe, r1, 0x17) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) 23:21:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 23:21:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x5000000) [ 2942.520396][T27754] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:17 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x80000001) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x5450, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x81, 0x6, 0x2, 0x7, 0x0, 0x5, 0x400c6, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16d, 0x2, @perf_config_ext={0x6e8, 0xbec9}, 0x1000, 0x20, 0x8, 0x4, 0x5, 0x100, 0x7fff}) [ 2942.574600][T27760] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2942.855506][T27754] device 2189 entered promiscuous mode [ 2942.908458][T27769] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:17 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x5450, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = gettid() perf_event_open(0x0, r1, 0x2, 0xffffffffffffffff, 0xa6f54f15e4426114) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) [ 2943.052381][T27760] device 1104 entered promiscuous mode 23:21:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100000002) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xf2030000}, 0x0) [ 2943.114354][T27760] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2943.130781][T27769] device 2190 entered promiscuous mode 23:21:17 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x00\x02\x00', 0x2}) [ 2943.261088][T27760] device 1105 entered promiscuous mode [ 2943.286118][T27780] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x6000000) 23:21:18 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x4000000, 0x0}, 0x0) 23:21:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) r1 = socket$kcm(0x2, 0x5, 0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x76, &(0x7f0000000ac0)=r2, 0x8) r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r3, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r3, 0x4) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000100)) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) [ 2943.394148][T27787] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2943.584453][T27787] device 1106 entered promiscuous mode 23:21:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x6020000) 23:21:18 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = socket$kcm(0x2, 0x5, 0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x76, &(0x7f0000000ac0)=r2, 0x8) openat$cgroup_ro(r2, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r2, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x7, 0x5}, 0x0, 0x0, &(0x7f0000000200)={0x5, 0x9, 0x3, 0x7}, &(0x7f0000000240)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x1}}, 0x10) r3 = gettid() perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x5450, 0xffffffffffffffff) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x5450, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x5450, 0xffffffffffffffff) r7 = perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x7, 0x6, 0xf6, 0x8, 0x0, 0x3, 0x20, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x2, 0xffff, 0x3, 0x1, 0x4de, 0x1}, r3, 0x2, r4, 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r0) [ 2943.769328][T27803] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:21:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100000003) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2943.874201][T27780] device 2191 entered promiscuous mode [ 2943.968479][T27803] device 1107 entered promiscuous mode 23:21:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x7000000) [ 2944.045429][T27808] device 2192 entered promiscuous mode 23:21:18 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000440)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51f1c3207f3e47f3, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x7f, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x100000001, 0x0, 0x1, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x4, @perf_bp={&(0x7f0000000400), 0xc}, 0x25818, 0x5, 0x9, 0x7, 0x0, 0x64, 0x667a}, r1, 0xd, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x5450, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r2, 0x0, 0x11, &(0x7f0000000080)='+mime_typeeth0${\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x20, 0x20, 0x0, 0x20, 0x0, 0xffffffff, 0x40000, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x1ff, 0x1}, 0x4000, 0x347, 0x1, 0x3, 0x6, 0x9, 0x1000}, r3, 0xa, 0xffffffffffffffff, 0x0) 23:21:18 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x01\x02\x00', 0x2}) 23:21:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xfa010000}, 0x0) [ 2944.280298][T27818] device 1108 entered promiscuous mode 23:21:19 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x5000000, 0x0}, 0x0) 23:21:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x8000000) 23:21:19 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r1, 0x3) openat$cgroup_ro(r1, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d000598d95a80648c63940d0124fcd5ec20c60179d54ef0a3953000100002400200a06d053582c13715", 0x2e}], 0x1}, 0x0) sendmsg(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1, &(0x7f0000000180)=[{0x80, 0x1, 0x401, "2e5e72e2790e63dce57f8ff31125d333882807ec3949d93551dd2d9bbd5d50ec67da1a2b7a5767b86cc1df73256220ad4927eb7a73e257723a95929a46d9f2808ca7ba12dcfdc9f3f2a122a8df7e5a767e11f17bf6964185d1501a550087df0fe5e2fe7ea467c11f3346b4"}], 0x80}, 0x800) [ 2944.676720][T27828] device 2193 entered promiscuous mode 23:21:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100000004) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xfa030000}, 0x0) [ 2944.760821][T27848] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2944.938652][T27839] device 1109 entered promiscuous mode 23:21:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x9000000) 23:21:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0xe31f03d9a03f5cd5}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={0x0, r1, 0x1}, 0x10) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d000598d95a80648c63940d0124fcd5ec20c60179d54ef0a3953000100002400200a06d053582c13715", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000880)={&(0x7f0000000180)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000200)="f6a0a0728c687bdcdcdfb8b0b0a40c4a4a76b0f21b2d9419afb4200242d82ac2871e608e17d795cbc8bc6102aa1fa7380f4eea83faaf357373815790c534d924bf59f2c20762c77bc2d8ffad8a11780f21415946f9b35ce968f6c7fea8a2906b776fbe1ee745db505271426401101ecbf3d3c2c8d0f61e922e3ff3e6bbd318871468456c744275f84139ce2bdd11a2f9b1e1b1cfb6", 0x95}, {&(0x7f00000002c0)='h', 0x1}, {&(0x7f0000000300)="3f92942f883cb7d68c1dbeeb49203743a3872a60f27fde62ef23ecc84450a5caea8214c697f29caa2f6487bf8014028814d8e0dbb1a4a80a40f3476673e81d41fc0f4d116c1d2f4ba3767607ddfe4ef4ac00fedd6a03b90373580184b3", 0x5d}, {&(0x7f0000000380)="b47df34a08895ca815bc34983b4bdab7a3a6adc934234962e5e5f747a6ec9dc9029460a09bf6ca53a836bdcc393299085e65dd150b9fa082b7fd4275b09ac0633b95ef31a6ce69b2d856b3beae12b153a0a974824c333494dcfe5ba73142ba189c4ba6ff3f7bf4f741dad6114dc9b1d79c6c918a7ea4c89e80a1e39a8118d2f0721afec74b9901fa", 0x88}, {&(0x7f0000000440)="712882d59d988a6e9209e3e5edde26db0cc3cbda035eabbaad", 0x19}, {&(0x7f0000000480)="d36ac1cff66d2e0710bd2a534394fec17f6706427637a15773feb6222f51bda4e31bcb1c1f756e767d1b020dace9f77a4bacfa36e2b3ee80d15fd1", 0x3b}, {&(0x7f00000004c0)="0f2778004d1df78b5c62e098e894e3af06a1bc6fd3002920b1455044b1b35ac1e175fe3d844c7b5171eabb74d9da3ca75dc855cfa452f3b525b528570aa85aaf499c6ee0e214c8f691e782fe947e44783434", 0x52}, {&(0x7f0000000540)="70822e59d24fffadd628d967e91bb8172760e51b8f912e83b260f9754c7938de633935495b4a3c333f6b23eca6c1fc58da3787eaf26bbda995f175f06e1024d6f385c56dccf4b0c62f19a8de32e075166dab57e31a7d0f19530d15351dfca945228df280139ad271af2decfba5ed50a6a19de5c2786415d7bbdcee35af3486c6aa38ed342cafb34e96cbb2531da9c5425795e77a0558841c", 0x98}, {&(0x7f0000000600)="1385", 0x2}], 0x9, &(0x7f0000000700)=[{0x40, 0xff, 0xff, "64ef8d21f3781b811a5de202ca43bd04dfdd79384e8599d8b9a1732c181d2066dc2eda2dbe494957f5e8d86e11a5"}, {0xd0, 0x94, 0x8, "5763d207b7aec90137e65aff5853dc62274988b113d3e4914ba6eb61a780d8b1a6a04d807d4e7f4ffe8a412b926a5c74b99bda6a4ea4440e22cdbaea551d61366c779e840f00fff0e9fd738f6c4e8ba6f4a0812424b4f5ff1d4931e83f431746e2a22db85f762a598edc3ab94961eaddb88b1e4618475613ff4bfadb7fe8f5525d03d09fa4d3b44447f4fb61208f82ebab4dd3dfa0db15afbcd6fa58e32cf00e5dd8f8029e0cc81c45d8146f7bf19e4ba8ddd8adba6b777382"}, {0x48, 0x0, 0x0, "06edbcc0c79204fa1c4216692eb643f68578099cafa7abf9d74a9e492fbcb3a0e976ccc770ac1ce1e644351ca4f6eaa0cbf39f"}], 0x158}, 0xc080000) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) [ 2945.208246][T27854] device 2194 entered promiscuous mode 23:21:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100000005) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:20 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x00\x03\x00', 0x2}) [ 2945.258055][T27867] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2945.346330][T27862] device 1110 entered promiscuous mode [ 2945.369392][T27867] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2945.422825][T27866] device 2195 entered promiscuous mode 23:21:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xa000000) 23:21:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xfc000000}, 0x0) 23:21:20 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x6000000, 0x0}, 0x0) 23:21:20 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) 23:21:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r2, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x4d49) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r2, &(0x7f0000000040)="560f3f7b16078cdfab080e3831c34ffcf54948c70dd009b6bcd9dc7f2a56aea82410233705f6254f055a", &(0x7f0000000080)=""/39, 0x6}, 0x20) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d000598d95a80648c63940d0124fcd5ec20c60179d54ef0a3953000100002400200a06d053582c13715", 0x2e}], 0x1}, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x5450, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0xbc, 0x49, 0x8, 0x0, 0xff, 0x18, 0x19, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x800, 0x1, @perf_config_ext={0x80000000, 0x1}, 0x79b5f24cbb63ce88, 0x3f, 0x7, 0x3b1674112326ddbc, 0xdb, 0x8, 0x7ff}, 0x0, 0x8, r4, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) close(r3) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000140)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) recvmsg$kcm(r8, &(0x7f0000000280)={&(0x7f0000006700)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000006780)=""/4096, 0x1000}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037, 0x20, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r9, r7}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xa, 0xffffffff, 0x6, 0xfff, 0x2, r1, 0x2, [], r9, r2, 0x3, 0x3}, 0x3c) 23:21:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100000006) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2945.962232][T27897] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2945.991083][T27883] device 1111 entered promiscuous mode 23:21:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xa010000) 23:21:21 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) [ 2946.293257][T27885] device 2196 entered promiscuous mode 23:21:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100000007) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2946.540273][T27909] device 1112 entered promiscuous mode 23:21:21 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x00\x04\x00', 0x2}) 23:21:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xa030000) [ 2946.597005][T27911] device 2197 entered promiscuous mode 23:21:21 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x6a, 0x16, 0x81, 0x89, 0x0, 0xfffffffffffffffa, 0x1000, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401, 0x7}, 0x10000, 0x0, 0xe7, 0x4, 0xccc, 0x8, 0x401}, 0x0, 0xc, 0xffffffffffffffff, 0xf) setsockopt$sock_attach_bpf(r0, 0x84, 0x76, &(0x7f0000000ac0)=r1, 0x8) openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x12) 23:21:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xfeff0000}, 0x0) 23:21:21 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x7000000, 0x0}, 0x0) [ 2946.745947][T27928] validate_nla: 11 callbacks suppressed [ 2946.745957][T27928] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:21:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x5, 0x5, 0x6, 0x2, 0x0, 0xfffffffffffffff9, 0x540, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x7, @perf_bp={&(0x7f0000000100), 0x4}, 0x228a, 0x401, 0x2f, 0x2, 0xfffffffffffffff9, 0x20, 0x2}, 0xffffffffffffffff, 0xf, r0, 0x2) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x6, 0x40, 0x0, 0x2, 0x0, 0x0, 0x2000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x108, 0xfffffffffffffffc, 0x2, 0x7, 0x3, 0x400006, 0x22d}, 0xffffffffffffffff, 0x1, r1, 0x1d) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0x10000, 0x5d48ee1365756c72}, 0xc) [ 2946.921989][T27940] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100000008) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2947.094663][T27928] device 1113 entered promiscuous mode 23:21:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xc030000) 23:21:21 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='%r`P\xe4\x0f\x90\xe6\x8f*\xb6\x96\x7f\xaa\xb3\xd26?\xa4\xedi\xa1\xc8\xc7\xb0\xc7tD\xd9\x7f\xf2\xe1\xd5\xf2\xa0Y\xb4p\x10\x0fCJ\xf1\x16_\xf3\xfc\x1b\xb3\xda?\xdc\xee\xf6Eu\xfc\xffb\x13`V\xf2\xb0\x03\xc2\x8cT/\x93\x18\"\xa2\n\xd6\xbeH\xa1\x11vd\xadl\xac\xf9', 0x7a05, 0x1700) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r2}, 0xc) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r2, 0xff, 0x68f0d5ad2768ae44}, 0xc) close(r3) write$cgroup_pid(r0, &(0x7f0000000000), 0x1) [ 2947.285708][T27957] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:21:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100000009) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2947.510106][T27940] device 2198 entered promiscuous mode 23:21:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xff7f0000}, 0x0) [ 2947.594551][T27957] device 1114 entered promiscuous mode 23:21:22 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x00\x05\x00', 0x2}) 23:21:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xe000000) 23:21:22 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x8000000, 0x0}, 0x0) [ 2947.771504][T27975] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2947.879776][T27981] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:21:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000a) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:22 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = socket$kcm(0x2, 0x5, 0x84) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000440)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000014c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51f1c3207f3e47f3, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, @perf_bp={&(0x7f0000000400), 0xc}, 0x24800, 0x5, 0x0, 0x0, 0x0, 0x64, 0x667a}, r3, 0xd, 0xffffffffffffffff, 0xd) r4 = openat$cgroup_ro(r3, &(0x7f0000000240)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x98\x1eD\x1f1\n\x013~\x01\x04\x00\x00\x00\x00\x00\x00\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0)=r4, 0x8) r5 = openat$cgroup_ro(r4, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000d80)=ANY=[], &(0x7f0000000600)=""/181, 0x0, 0xb5}, 0x20) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) openat$cgroup_ro(r7, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r7, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x7, 0x1}, 0x0, 0x0, &(0x7f0000000540)={0x0, 0x0, 0x9, 0x8}, &(0x7f0000000580)=0x6, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b00)={r6, 0x10, &(0x7f0000000ac0)={&(0x7f0000000900)=""/167, 0xa7, r8}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r8, 0xffffffffffffffeb) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r8, 0x4) r9 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x5450, 0xffffffffffffffff) r10 = gettid() r11 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r11, 0x5450, 0xffffffffffffffff) perf_event_open(&(0x7f00000016c0)={0x0, 0x70, 0x0, 0x1, 0x0, 0xfe, 0x0, 0x6, 0x22001, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x1000, 0x1, 0x8, 0x2, 0x5, 0x0, 0x4}, r10, 0x0, r11, 0x8) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r12, 0x801c581f, 0x20000000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r12, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x9}, 0x0, 0x0, &(0x7f0000000300)={0x0, 0x0, 0x4, 0xffff1fa0}, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000cc0)={r10, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000c80)='./cgroup.net/syz0\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, r9, 0x0, 0x5, &(0x7f0000000300)='%\'keyring\x00', r13}, 0xffffffffffffff3d) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r1, r5, 0x3, 0x1}, 0x10) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f0000000100)={'hsr0\x00', 0x800}) 23:21:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xfffff000}, 0x0) [ 2948.107765][T27975] device 2199 entered promiscuous mode [ 2948.252271][T27999] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2948.272583][T27981] device 1115 entered promiscuous mode 23:21:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x12000000) [ 2948.383417][T28003] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:21:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000b) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:23 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x19, 0x4, 0x1000, 0x0, 0x1, 0x1, 0x2}, 0x3c) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r0, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r1, 0x3) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) [ 2948.652368][T27999] device 2200 entered promiscuous mode [ 2948.694205][T28012] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2948.708097][T28003] device 1116 entered promiscuous mode 23:21:23 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x00\x06\x00', 0x2}) [ 2948.767023][T28012] device 2201 entered promiscuous mode 23:21:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x12020000) 23:21:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 23:21:23 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) socket$kcm(0x29, 0x0, 0x0) 23:21:23 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x9000000, 0x0}, 0x0) [ 2948.963820][T28021] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2949.025158][T28026] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2949.208219][T28021] device 1117 entered promiscuous mode 23:21:23 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x5450, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000180)={0xb, 0x70, 0x1, 0xfd, 0x80, 0x9, 0x0, 0x677a1ce9, 0x100, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3a5a, 0x1, @perf_bp={&(0x7f0000000040), 0x8}, 0x10415, 0x92, 0x7, 0x2, 0x9, 0x5, 0x41c1}, r0, 0xa, r1, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) 23:21:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x14010000) 23:21:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000c) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:24 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x5450, 0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0xfffffffffffffa5c) [ 2949.592834][T28026] device 2202 entered promiscuous mode 23:21:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) [ 2949.712276][T28043] device 1118 entered promiscuous mode 23:21:24 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x00\a\x00', 0x2}) 23:21:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x18030000) 23:21:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000f) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:24 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x5450, 0xffffffffffffffff) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x70, 0x8, 0xf3, 0x20, 0x40, 0x0, 0x4, 0x0, 0xc, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfff0, 0x4, @perf_config_ext={0x7e6, 0x1e864889}, 0x84, 0x3c4e, 0xfffffffe, 0x7, 0x0, 0x40, 0x3f}, 0xffffffffffffffff, 0x1, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000240)='\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x5450, 0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x1, 0x9, 0xc8, 0x7f, 0x0, 0x83, 0xd01cca273af9e327, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x9, 0x3}, 0x3014, 0xffffffff80000001, 0xfff80000, 0x4, 0x3f, 0x7, 0x753}, r2, 0x4, r3, 0x8) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', 0xffffffffffffffff}, 0x30) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x5450, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x204, 0x80, 0x0, 0x5, 0x4b, 0x0, 0x20, 0x20000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x1, @perf_config_ext={0x20, 0x1}, 0x8002, 0x401, 0xd0, 0x5, 0x4c, 0x3, 0x4}, r5, 0xd, r6, 0xc) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) [ 2950.148067][T28058] device 2203 entered promiscuous mode 23:21:25 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0xa000000, 0x0}, 0x0) [ 2950.253507][T28064] device 1119 entered promiscuous mode 23:21:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 23:21:25 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpu.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x4, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x4002, 0x8000000000, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) 23:21:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x1a000000) 23:21:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='io.stat\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000240)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x5, 0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x76, &(0x7f0000000ac0)=r2, 0x8) openat$cgroup_ro(r2, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000100)={0x9, &(0x7f0000000180)=[{0xff, 0x7, 0x4, 0x1000}, {0x1f, 0x6e, 0x3, 0x10001}, {0x9, 0x9c, 0x6, 0xffffff7f}, {0x3, 0xa6, 0x2, 0x400}, {0x0, 0x64, 0x5, 0x80000000}, {0x8101, 0x8, 0x40}, {0x2, 0x4, 0xb0, 0x1}, {0x80, 0x7, 0x6, 0x2}, {0xf800, 0x1, 0xcf, 0x3616}]}) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) 23:21:25 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) 23:21:25 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x00\b\x00', 0x2}) [ 2950.788442][T28085] device 2204 entered promiscuous mode 23:21:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100000010) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2950.975261][T28091] device 1120 entered promiscuous mode 23:21:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000180)={0x7, &(0x7f0000000100)=[{0x8000, 0xf9, 0x30, 0x3}, {0x523, 0x4, 0x1, 0x9}, {0x6, 0x4, 0xb4, 0x5}, {0x4, 0x7, 0xec}, {0x8, 0x5b, 0xff, 0x5}, {0x7ff, 0x5, 0x4, 0x3f}, {0x4, 0x9, 0x8, 0x3ff}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='memory.events\x00') write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) 23:21:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x20000000) [ 2951.110449][T28097] device 2205 entered promiscuous mode 23:21:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) [ 2951.268083][T28116] device 1121 entered promiscuous mode 23:21:26 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0xb000000, 0x0}, 0x0) 23:21:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x22010000) 23:21:26 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc1cc83669ec4451b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) 23:21:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100008800) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:26 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x5450, 0xffffffffffffffff) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x2, 0x1, 0x0, 0xca56, 0x2602, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000080), 0x8}, 0x12100, 0x9, 0x0, 0x6, 0x7fffffff, 0x7, 0x3}, 0x0, 0x693, r1, 0x3) r2 = socket$kcm(0x2, 0x5, 0x84) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0)=r3, 0x8) openat$cgroup_ro(r3, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x5450, 0xffffffffffffffff) perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x1, 0x34, 0x0, 0xe8, 0x0, 0xb3b6, 0x1, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xffffff17, 0xf, @perf_bp={&(0x7f0000000280), 0x1}, 0x400, 0x1, 0x10000, 0x3, 0x1, 0x6, 0x846}, r3, 0xa, r4, 0x1) openat$cgroup_ro(r0, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = gettid() perf_event_open(0x0, r6, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r6, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200)='\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0xce, 0x6, 0x8, 0x2, 0x0, 0x5, 0x21000, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x401, 0x4, @perf_bp={&(0x7f0000000100), 0xc}, 0x6800, 0xfffffffffffff95e, 0x400, 0x0, 0x3, 0x9, 0xfe00}, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) [ 2951.706242][T28120] device 2206 entered promiscuous mode 23:21:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x2) [ 2951.807074][T28129] device 1122 entered promiscuous mode 23:21:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x00\n\x00', 0x2}) [ 2951.966674][T28150] validate_nla: 9 callbacks suppressed [ 2951.966747][T28150] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x22020000) 23:21:26 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0xc000000, 0x0}, 0x0) 23:21:26 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) [ 2952.128647][T28158] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2952.422367][T28150] device 2207 entered promiscuous mode 23:21:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x22030000) [ 2952.467717][T28158] device 1123 entered promiscuous mode [ 2952.472480][T28170] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2952.506447][T28170] device 2208 entered promiscuous mode 23:21:27 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 23:21:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3) 23:21:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x12000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2952.649249][T28178] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:21:27 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0xd000000, 0x0}, 0x0) [ 2952.753198][T28178] device 1124 entered promiscuous mode 23:21:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x4) 23:21:27 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x00\f\x00', 0x2}) 23:21:27 executing program 3: r0 = socket$kcm(0x2, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x76, &(0x7f0000000ac0)=r1, 0x8) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r2, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) r3 = socket$kcm(0x2, 0x5, 0x84) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0)=r4, 0x8) r5 = openat$cgroup_ro(r4, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) close(r6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r5, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) openat$cgroup(r5, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000440)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000014c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51f1c3207f3e47f3, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, @perf_bp={&(0x7f0000000400), 0xc}, 0x24800, 0x5, 0x0, 0x0, 0x0, 0x64, 0x667a}, r7, 0xd, 0xffffffffffffffff, 0xd) r8 = openat$cgroup(r7, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r9 = socket$kcm(0xa, 0x2, 0x11) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r9, 0x29, 0x17, &(0x7f00000000c0)=r10, 0x4) openat$cgroup_ro(r8, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0x10000000d) 23:21:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x28030000) [ 2952.917814][T28193] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2953.112498][T28204] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2953.256129][T28193] device 2209 entered promiscuous mode [ 2953.300659][T28209] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x2a030000) [ 2953.364123][T28204] device 1125 entered promiscuous mode [ 2953.423623][T28209] device 2210 entered promiscuous mode 23:21:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x5) 23:21:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x8e, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x5, 0x4}, 0x0, 0x0, &(0x7f0000000100)={0x5, 0xf, 0x8, 0x14e12245}, &(0x7f0000000180)=0x7fff, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x872}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffff9, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x4, 0x4}, 0x0, 0x0, &(0x7f00000003c0)={0x1, 0xe, 0xba6, 0x3}, &(0x7f0000000400)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x1ff0000000}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r2}, 0xc) r3 = gettid() perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) r4 = gettid() perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x5450, 0xffffffffffffffff) r6 = gettid() r7 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x5450, 0xffffffffffffffff) perf_event_open(&(0x7f00000016c0)={0x0, 0x70, 0x0, 0x1, 0x0, 0xfe, 0x0, 0x6, 0x22001, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1000}, 0x1000, 0x1, 0x8, 0x2, 0x5, 0x0, 0x4}, r6, 0x0, r7, 0x8) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x801c581f, 0x20000000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r8, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x9}, 0x0, 0x0, &(0x7f0000000300)={0x0, 0x0, 0x4, 0xffff1fa0}, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000cc0)={r6, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000c80)='./cgroup.net/syz0\x00', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={r4, r5, 0x0, 0xe, &(0x7f0000000600)='memory.events\x00', r9}, 0x30) perf_event_open(&(0x7f0000000580)={0x5, 0x70, 0x1f, 0x2, 0x5, 0x3, 0x0, 0x100, 0x88081, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffff9, 0x1, @perf_config_ext={0x7ff, 0x8}, 0x1000, 0x3, 0x2, 0x3, 0x7, 0xfffffff9, 0x5c91}, r3, 0xa, r10, 0x19) 23:21:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r0 = getpid() r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x5450, 0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x2, 0x6, 0x7, 0x5, 0x0, 0xa5aa, 0x800, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xdc4, 0x6, @perf_bp={&(0x7f0000000040), 0x1}, 0x7010, 0x8, 0x81, 0x5, 0x3, 0x800, 0x4}, r0, 0xd, r1, 0x1) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = gettid() perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r4 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r4, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2953.487615][T28214] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:21:28 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0xe000000, 0x0}, 0x0) 23:21:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x6) [ 2953.814130][T28234] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2953.826452][T28214] device 1126 entered promiscuous mode 23:21:28 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x03\f\x00', 0x2}) 23:21:28 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000080)={r0, &(0x7f0000000040)="dd2efb6f835fee30f48ec500b77e4bdbaa21bf365d18698a46b10902fe25a336254adf7ce13991046fb2e7ad2f9cd0", &(0x7f0000000180)=""/179, 0x4}, 0x20) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) 23:21:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x32020000) [ 2954.167757][T28246] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2954.252458][T28234] device 2211 entered promiscuous mode 23:21:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) write$cgroup_type(r0, &(0x7f00000004c0)='threaded\x00', 0x9) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x1, 0x10}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000003c0)={r1, &(0x7f0000000440)="4a44e051dd539d58adaf3168fcafc454cd29d038eeb1b42cec2d2eb952817a88275938c1fa2cfc60d72818c8e8e3b0668bc524e96c09a11455a7836d97920c937e3a7004c18f3b1416da86d65f1f5d10"}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = gettid() perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r4 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r4, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="02007a00d127c88cc055ffffffffffff6636d02b21acaaaaaaaa0624000000000000aaaaaaaaaa180000001c000000000000f1ff"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x14, 0x3, 0x0, 0x2, 0x0, 0x0, 0x51951, 0x14, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000040)}, 0x30000, 0xfff, 0xff, 0x6, 0x101, 0xd3, 0x4800}, 0xffffffffffffffff, 0xffffffffffffffff, r6, 0x1) 23:21:29 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x2}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) [ 2954.379602][T28246] device 1127 entered promiscuous mode [ 2954.417571][T28250] device 2212 entered promiscuous mode 23:21:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3a000000) 23:21:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x7) 23:21:29 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x10000000, 0x0}, 0x0) 23:21:29 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) 23:21:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x8) 23:21:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = socket$kcm(0x2, 0x5, 0x84) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0)=r4, 0x8) openat$cgroup_ro(r4, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x1, 0x7, 0x7, 0x2, 0x0, 0x8, 0x82400, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0xf, @perf_bp={&(0x7f0000000300), 0x2}, 0x800, 0x6, 0x6, 0x9, 0x1, 0x6, 0xd42}, r4, 0xd, 0xffffffffffffffff, 0xa) r6 = perf_event_open(&(0x7f0000000440)={0x4, 0x70, 0x4, 0xff, 0x59, 0x12, 0x0, 0xff, 0x20504, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x5, @perf_bp={&(0x7f00000003c0), 0xc}, 0x900, 0x401, 0x0, 0x6, 0x3, 0x1, 0x9d}, r1, 0x7, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r7, 0x400454d1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d000598d95a80648c63940d0124fcd5ec20c60179d54ef0a3953000100002400200a06d053582c13715", 0x2e}], 0x1}, 0x0) r10 = socket$kcm(0x2, 0x5, 0x84) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r10, 0x84, 0x76, &(0x7f0000000ac0)=r11, 0x8) r12 = openat$cgroup_ro(r11, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r12, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f00000002c0)=r12, 0x4) 23:21:29 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x00\x10\x00', 0x2}) [ 2954.911176][T28261] device 1128 entered promiscuous mode 23:21:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3a010000) 23:21:29 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) [ 2955.164998][T28288] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2955.238518][T28274] device 2213 entered promiscuous mode 23:21:30 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) [ 2955.418056][T28291] device 1129 entered promiscuous mode 23:21:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3a030000) [ 2955.557636][T28297] device 2214 entered promiscuous mode 23:21:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x9) 23:21:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xa) 23:21:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2955.713445][T28305] device 1130 entered promiscuous mode 23:21:30 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x3f000000, 0x0}, 0x0) 23:21:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x5, 0x84) openat$cgroup_type(r0, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x76, &(0x7f0000000ac0)=r2, 0x8) r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r3, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={0xffffffffffffffff, r3, 0x9, 0x1}, 0x10) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) r5 = gettid() perf_event_open(0x0, r5, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) write$cgroup_subtree(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="76c3424acc0785ef6685c4a8a9d20ba949d70330993e0dc9813a3ab38fa2e6d1a29c3535b22a090dffca8cbc493a4337d5ed5d0c6bf8582877e56200ba01cf8ef016d4409290e7d267f032e19e31f2efe1a55be0df99a8ac132f0c470c78b5130a744f5604a5c17238d6cb92abdd2242247bdd2ee2db4e165cb1dca6221cc2b5008072dce8f2e8701c10bd08132d9d71cb4b4516852c6979f31868cbeda6520db0fd733b50f7"], 0x9213) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f00000001c0)='notify_on_release\x00', 0x2, 0x0) ioctl$TUNSETPERSIST(r6, 0x400454cb, 0x0) write$cgroup_pid(r4, &(0x7f0000000000)=r5, 0x29c) 23:21:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3c000000) [ 2956.056944][T28315] device 2215 entered promiscuous mode 23:21:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xe) 23:21:30 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x00\x12\x00', 0x2}) 23:21:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x5450, 0xffffffffffffffff) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x5450, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x1000000000000) socket$kcm(0x29, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r2, 0x3) openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) r5 = gettid() perf_event_open(0x0, r5, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r6 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r6, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r7, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) r9 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000380)={r9}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={r3, 0x3, 0x2, 0x6f0, &(0x7f0000000040)=[0x0, 0x0], 0x2}, 0x20) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3c030000) [ 2956.391699][T28327] device 1131 entered promiscuous mode [ 2956.668173][T28334] device 2216 entered promiscuous mode 23:21:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x14) [ 2956.799827][T28347] device 1132 entered promiscuous mode 23:21:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3f000000) 23:21:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) r3 = socket$kcm(0x2, 0x5, 0x84) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0)=r4, 0x8) openat$cgroup_ro(r4, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.memory_migrate\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:31 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)=@ipx, 0x80, &(0x7f0000000380)=[{&(0x7f0000000180)=""/149, 0x95}, {&(0x7f0000000240)=""/161, 0xa1}, {&(0x7f0000000300)=""/65, 0x41}, {&(0x7f0000000100)=""/17, 0x11}], 0x4, &(0x7f00000003c0)=""/105, 0x69}, 0x101) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) [ 2957.065215][T28354] device 2217 entered promiscuous mode [ 2957.080007][T28359] validate_nla: 12 callbacks suppressed [ 2957.080019][T28359] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2957.196987][T28359] device 2218 entered promiscuous mode 23:21:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x1a) 23:21:32 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x40000000, 0x0}, 0x0) 23:21:32 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x02\x12\x00', 0x2}) [ 2957.296475][T28358] device 1133 entered promiscuous mode 23:21:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = getpid() write$cgroup_pid(r0, &(0x7f0000000040)=r2, 0x12) r3 = socket$kcm(0x2, 0x5, 0x84) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0)=r4, 0x8) openat$cgroup_ro(r4, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup(r4, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) 23:21:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x40000000) [ 2957.450309][T28374] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2957.553585][T28383] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:21:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x34) [ 2957.778818][T28374] device 2219 entered promiscuous mode [ 2957.817756][T28383] device 1134 entered promiscuous mode 23:21:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x42010000) [ 2957.897887][T28395] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:32 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000440)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000014c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51f1c3207f3e47f3, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, @perf_bp={&(0x7f0000000400), 0xc}, 0x24800, 0x5, 0x0, 0x0, 0x0, 0x64, 0x667a}, r0, 0xd, 0xffffffffffffffff, 0xd) r1 = perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x70, 0xff, 0x80, 0x76, 0x64, 0x0, 0xffff, 0x80, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x2, 0x6}, 0x8, 0x8001, 0xdce, 0x0, 0x0, 0x7fff}, r0, 0x3, 0xffffffffffffffff, 0x5) r2 = perf_event_open(&(0x7f00000037c0)={0x0, 0x1a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0x0, r1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000100)='syz0\x00') write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) 23:21:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000800d127c88cc055ffffffffffff6636d00500acaaaaaaaaaa24000000000000aaaaaaaaaa1800"/52]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2957.947243][T28398] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:21:32 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x00\x14\x00', 0x2}) 23:21:32 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x60000000, 0x0}, 0x0) [ 2958.042336][T28398] device 1135 entered promiscuous mode 23:21:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x44010000) [ 2958.225192][T28415] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:21:33 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0xe) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) 23:21:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000300)='cgroup.stat\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = gettid() perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r4 = socket$kcm(0x2, 0x5, 0x84) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x5450, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={r8}, 0xc) r9 = socket$kcm(0x2, 0x5, 0x84) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r9, 0x84, 0x76, &(0x7f0000000ac0)=r10, 0x8) openat$cgroup_ro(r10, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r10) ioctl$TUNSETTXFILTER(r6, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="d7bdfdf2aed15d4349e2242702000800d127c88cc055ffffffffffff6636d02b21acaaaaaaaaaa24000000000000aaaaaaaa0008"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2958.556282][T28395] device 2220 entered promiscuous mode [ 2958.595875][T28426] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1, &(0x7f00000015c0)=""/240, 0xf0, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000006c80)) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70864, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x7}, 0x201}, 0x0, 0x0, 0xffffffffffffffff, 0x8) close(r1) close(0xffffffffffffffff) r2 = socket$kcm(0xa, 0x8000000001, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, 0x0}, 0x20000004) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socket$kcm(0x2, 0x3, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001540)='./cgroup.cpu/syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000000)='&@[\x00') r3 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0), 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0x0, r5, 0x0, 0x10, &(0x7f0000000880)='4\x15\x863\x04J\x03\xf6\x1ce\x04\xcb\xb1\x89\xd0\x8a', r4}, 0xfffffffffffffec3) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000080)}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x0, 0x3}, 0x0, 0x693, r6, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000680)='&@[\x00') socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2958.730106][T28415] device 1136 entered promiscuous mode 23:21:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x48000000) [ 2958.815081][T28426] device 2221 entered promiscuous mode 23:21:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x48) [ 2958.981595][T28442] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:21:33 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x00\x1a\x00', 0x2}) 23:21:33 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x65580000, 0x0}, 0x0) 23:21:33 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xf7, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x40000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) [ 2959.127899][T28447] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000800d127c88cc055ffffffffffff6636d02b21acaaaaaaaaaa24000000000000aaaaaaaaaa18000000000000001128000000"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2959.316421][T28442] device 1137 entered promiscuous mode 23:21:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x4a000000) 23:21:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x105002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="7e4a7a006386dd20bfa6"], 0x9213) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000040)=r1) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffffffffffeda) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) [ 2959.491281][T28467] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2959.672736][T28447] device 2222 entered promiscuous mode 23:21:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r1 = perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$sock(r0, &(0x7f0000000340)={&(0x7f0000000180)=@caif=@dbg={0x25, 0x9, 0x3}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000200)="63087d5182e73d17be07860661ee39729430b00f432e89e6d9bbd31cc1e0632dd4d84c07c3411930f3b9c1ac5bf75eaed5f316f4cfe62af3c4145d66f6d417a2822bfda1e900f815d3f918a844d8331512bb45ef240ac227933838d33836f73ed1452315ac1a733bedc0fca36b2d1101814107bb067953e797594a21f79f9264de1c8b3dce5eae4f4dbb1c50d78b4908aa427e874e6745061719206ec82521a7a6", 0xa1}, {&(0x7f00000002c0)="258c6d25a8db0d172c9dc63da09e4be1348e36f3ee51469802982364cef35f86bb2b7b21e8ae5dedc26bd18362cfbd8f2b52a3c7443f023230c78e36019512648ca4bafd5ccd1c2c72834e99ddfdae6bbd7af0681dcb936616f48ad1c74f46883a375dcc39181b6ea335552e22b30d", 0x6f}], 0x2}, 0x810) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) [ 2959.722758][T28467] device 1138 entered promiscuous mode 23:21:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x4a010000) [ 2959.816859][T28472] device 2223 entered promiscuous mode 23:21:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x4c) 23:21:34 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x01\x1a\x00', 0x2}) 23:21:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = gettid() perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r3 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r5, &(0x7f0000000300)="151a9ef8eb16fed88029041034da465340a787b9547791aaa8cdf27fd925fdc1322ab9a073afef99b5e54100b637b778c275d9bbc535a5913822728c3911c7f12367c06eb6ddbe0d736193fb3d", &(0x7f0000000b00)=""/4096, 0xc}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:34 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0xfee1, 0x2, 0x41, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x15090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}, 0x4000, 0xffffffffffffffff, 0x0, 0x6, 0x0, 0x0, 0x1f}, 0x0, 0x8, 0xffffffffffffffff, 0xc0578307cb981df0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) [ 2960.003848][T28479] device 1139 entered promiscuous mode 23:21:34 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x81000000, 0x0}, 0x0) 23:21:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x4c000000) 23:21:35 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9ddf}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) [ 2960.510731][T28486] device 2224 entered promiscuous mode 23:21:35 executing program 3: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x3}, 0x8000, 0x0, 0x0, 0x62ca104ef1742cf1, 0x1, 0x5}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0x1b}, 0x10) openat$cgroup_ro(r2, &(0x7f0000000100)='memory.swap.current\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) 23:21:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x60) [ 2960.776132][T28502] device 1140 entered promiscuous mode 23:21:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) r5 = socket$kcm(0x2, 0x5, 0x84) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r5, 0x84, 0x76, &(0x7f0000000ac0)=r6, 0x8) openat$cgroup_ro(r6, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r6, &(0x7f0000000300)="30eec0b6cb628b03afca6e30da5a494df52309ff7eb546ca11dbf0b6c41207883138f3f93c82ab8e582a1a874551936ec348d2c0b1b4191e7c866abef624d9d67e642006356977ddeb90605b029bb6c0c8c024", &(0x7f0000000440)=""/167, 0x2}, 0x20) 23:21:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x50010000) 23:21:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = socket$kcm(0x2, 0x5, 0x84) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0)=r3, 0x8) openat$cgroup_ro(r3, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x8, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0xca86, 0x0, 0x0, 0x0, 0x3}, [@jmp={0x5, 0x1, 0x1d, 0xb, 0x6, 0x4d0fc4dd3602655f, 0x7ffffffffffffff0}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xc, r0, 0x8, &(0x7f00000001c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x6, 0x6, 0x3f}, 0x10}, 0x70) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000002c0)={0xffffffffffffffff, r4}) r5 = socket$kcm(0x2, 0x5, 0x84) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r5, 0x84, 0x76, &(0x7f0000000ac0)=r6, 0x8) r7 = openat$cgroup_ro(r6, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r7, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) r8 = gettid() perf_event_open(0x0, r8, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) write$cgroup_pid(r7, &(0x7f0000000040)=r8, 0x12) [ 2961.145966][T28514] device 2225 entered promiscuous mode 23:21:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x68) [ 2961.220213][T28523] device 1141 entered promiscuous mode 23:21:36 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x00\x1f\x00', 0x2}) [ 2961.293192][T28523] device 1142 entered promiscuous mode 23:21:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x54030000) 23:21:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) r5 = openat$cgroup_ro(r0, &(0x7f0000000380)='cpuacct.usage_percpu\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x2, 0x4, 0x1f, 0xb6, 0x0, 0xff, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0xfffffffffffffbd4, 0x7, 0x3, 0x0, 0x5, 0x40}, r5, 0xf, r0, 0x8) [ 2961.580738][T28537] device 2226 entered promiscuous mode 23:21:36 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x88a8ffff, 0x0}, 0x0) 23:21:36 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r0 = socket$kcm(0x2, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x76, &(0x7f0000000ac0)=r1, 0x8) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r2, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) r3 = socket$kcm(0x2, 0x5, 0x84) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0)=r4, 0x8) r5 = openat$cgroup_ro(r4, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r5, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) r6 = socket$kcm(0x2, 0x5, 0x84) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r6, 0x84, 0x76, &(0x7f0000000ac0)=r7, 0x8) r8 = openat$cgroup_ro(r7, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r8, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000049b) 23:21:36 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc8, 0x0, 0xba}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) [ 2961.816115][T28544] device 1143 entered promiscuous mode 23:21:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x58020000) [ 2961.904909][T28549] device 2227 entered promiscuous mode 23:21:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x6c) [ 2962.120211][T28566] validate_nla: 10 callbacks suppressed [ 2962.120258][T28566] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:21:36 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x00 \x00', 0x2}) 23:21:36 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7ea02ba8c11a4b8b7501008a70f4294e7a006386dd20bfa6"], 0x9213) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r2, 0x3) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r2, &(0x7f00000001c0)="9cc32daf5a419b7c04075de6e9cee750d6557580a9e223406fbec072d74d99b653e967ea2fbb7fbe0a75a6b38d2750873be4465c8ee9ddf5c6e8e189dd4c8b39fe9a31319a2fffe4338ae1c803fd5a6b87fcb5bd36367a12d1a672328025077bd5a6f65cab77f20c0a83f94db84a8f1944d03e3e32c12fe426012c8c3995ccfca07ace0f511f66d3edc9f78a483725ffc344b10ef00742b3c916b13288c5450f570877138f2cd88385eacd534caa4ca00cb7303e1a1ca03cb58e6154e8aef93989c18747240268449b0bdf3f39981a1b13fffe5095c1521a", &(0x7f00000002c0)=""/52}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000080)=r3) 23:21:36 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x8c0e0000, 0x0}, 0x0) [ 2962.160857][T28571] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2962.193578][T28566] device 1144 entered promiscuous mode 23:21:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) getpid() r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r3, 0x3) openat$cgroup_ro(r3, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x5a020000) [ 2962.471861][T28591] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2962.612475][T28571] device 2228 entered promiscuous mode [ 2962.635672][T28595] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x5c020000) [ 2962.733672][T28591] device 1145 entered promiscuous mode 23:21:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x74) [ 2962.793683][T28595] device 2229 entered promiscuous mode 23:21:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x808566f321ea1609) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:37 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r0, 0x3) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x5450, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r3, 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040)=r1, 0xfffffeb5) [ 2962.935276][T28603] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2962.950573][T28605] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:37 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x00\"\x00', 0x2}) 23:21:37 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x80000000, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) [ 2963.185335][T28603] device 1146 entered promiscuous mode 23:21:37 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0xc00e0000, 0x0}, 0x0) 23:21:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x60000000) [ 2963.459425][T28627] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:21:38 executing program 3: ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0xe4260b7262a6ce28, 0x1}, 0x10) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r2, 0x3) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r2, 0x9}, 0x10) [ 2963.544544][T28605] device 2230 entered promiscuous mode 23:21:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x7a) [ 2963.727258][T28639] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x6, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x2) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) [ 2963.845427][T28627] device 1147 entered promiscuous mode 23:21:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x62000000) [ 2964.065093][T28651] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2964.172778][T28639] device 2231 entered promiscuous mode [ 2964.196548][T28655] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2964.223397][T28651] device 1148 entered promiscuous mode [ 2964.252630][T28655] device 2232 entered promiscuous mode 23:21:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xba) 23:21:39 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa4\'\x00', 0x2}) [ 2964.284396][T28651] device 1149 entered promiscuous mode 23:21:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x62010000) 23:21:39 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0xffffa888, 0x0}, 0x0) 23:21:39 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) 23:21:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2142, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:39 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000000100)=""/3, 0x3}], 0x1, &(0x7f00000001c0)=""/142, 0x8e}, 0xc0010110) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) [ 2964.756671][T28660] device 2233 entered promiscuous mode 23:21:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xf0) 23:21:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x4000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'gre0\x00', 0x2000}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = gettid() perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r3 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2965.017133][T28671] device 1150 entered promiscuous mode 23:21:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x62030000) 23:21:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000080)=0xfffffffe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) [ 2965.340057][T28687] device 2234 entered promiscuous mode 23:21:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xfc) 23:21:40 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) [ 2965.492327][T28699] device 1151 entered promiscuous mode 23:21:40 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa4(\x00', 0x2}) 23:21:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000040)=ANY=[@ANYBLOB="021b00004b120400031081e109d41836a2"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:40 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x2}, 0x0) 23:21:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r2, 0x3) openat$cgroup_ro(r0, &(0x7f0000002500)='cgroup.stat\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000040)="b8538d7d001dd18fa340194f695e5e9032826ae0eabe64", &(0x7f0000002640)="8b6ce78d76f45c59467950cce53ff8020138b98946ca1b39f9b26612e20795e79e494a7b1522ba0fab1ae20b83b966d62056c370e0681c8999ed199eec5f1c1ac28b086b1e4ee019496a20577f5ab1403fe990693dcf26d20f3a33509fca9c464252c9ce3494727a0a618f893c11914920a6c37359af7521cfb221366418e773dc4e0315f98d20d78b0bd288f5ac11b190ac", 0x5}, 0x20) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002740)={&(0x7f0000002700)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000003780)={r3, &(0x7f0000002780)="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", &(0x7f0000003840)=""/120, 0x4}, 0x20) r4 = socket$kcm(0x29, 0x2, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000140)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r7, 0x6609, 0x0) recvmsg$kcm(r7, &(0x7f00000077c0)={&(0x7f0000006700)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000006780)=""/4096, 0x1000}], 0x1}, 0x200080c2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037, 0x20, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r8, r6}, 0x3c) sendmsg$inet(r4, &(0x7f0000002600)={0x0, 0x0, &(0x7f0000002480)=[{&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="09d70aa17c5e8025ec4d52ef", 0xc}, {&(0x7f0000001240)="7db03c10e96286a644e8988613897036354bbf0ea563eb14792de7befd172844e3dd4a92c337bcf2c379c9989712245f48b922494fd5e51101795408b402", 0x3e}, {&(0x7f0000001280)="3ebeb2b0e373f45e086030a91bfa432aa002afd37d1c03a98b7a277c6502161959f113d3339308473bfeee6bd36fe67bf5185ec077bcf3c0c310bdfdddd2e92b7281bc92482a6ee783f45dde49cd299152c17de04d3ac6891a8fb61e70832f80c5a692b7d2542ce21d9654edf19f324109c0b73a44befe53597d81e7caaea91f589b4dd4bd68cbaf3857f63cb18eacb929c94e3be10eefa09e88c541ec5931b42586f21111cbfbf887075e773233eb40cbd04b1e92fb70cb71cc80231925a77ff270d6e02054660dc34e340710717ad21261d6c61bef0a55797c78e1ccfa5246c0302a3b5e79af23f6878d4eb0", 0xed}, {&(0x7f0000001380)="db857034a71830e182ba51ceb3518a8cded683992c5916982e9a7c1bed20f9fdb4e0ee224719d2aa15c1fccb220543c11e809e13ad7f5be796d775cc83e43795a15df2db66b2a879348305ac07827d915ed0ba8212dc0ee7018dad8aa83d62619a9915c7678c0114a6a72ffc8d7d1908ed667eb3d1205b4886d4023da60885c57955d04825ef6f09bfa4ce9b5ecf7d32b19f7a4b8110bd808c362990f2f1e1481855139c97b5721cd8eced0e944dd7d7471f27fb07f8c67af6a9291f38d80d870ea214ee3e83735ce06ca8cdd5857369237ecd080b46015aa69b4dbcd99ca4d9e6b5a4920f7f63e2a856a4dd50f441e5dff0bf2796c943b69e", 0xf9}, {&(0x7f0000001480)="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", 0x1000}], 0x6, &(0x7f0000003a80)=ANY=[@ANYBLOB="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", @ANYRES32=r8, @ANYBLOB="ac1414bbad1414aa0000000044000000000000000000000007000000940793da9611408907abe00000020044080111000000114418ffffff000000090014000000000000000000000001000000df15e82d00000000000000000000000000000000000000d4f16e9863dd0bfe6543"], 0xd0}, 0x40000) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) 23:21:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x64000000) [ 2965.911171][T28709] device 2235 entered promiscuous mode 23:21:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x102) [ 2966.023286][T28725] device 1152 entered promiscuous mode 23:21:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x64010000) 23:21:41 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = gettid() perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r3 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[@ANYBLOB="7e4a7a006386dd20bfa6"], 0x9213) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r7, 0x3) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000040)=r7) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:41 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}}, 0x0, 0x8000, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) [ 2966.507843][T28735] device 2236 entered promiscuous mode 23:21:41 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa4)\x00', 0x2}) 23:21:41 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) [ 2966.749343][T28738] device 1153 entered promiscuous mode 23:21:41 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x3}, 0x0) 23:21:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x68000000) 23:21:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x11a) [ 2966.818553][T28745] device 2237 entered promiscuous mode 23:21:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x6c000000) [ 2967.013413][T28767] device 1154 entered promiscuous mode 23:21:41 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x5450, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = gettid() perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r4 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r4, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000800d127c88cc055ffffffffffff66a8f8c02eacaaaaaaaaaa24000000000000aaaaaaaaaa1800"/52]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='em0vmnet0\x00') 23:21:41 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) sendmsg$kcm(r0, &(0x7f0000001900)={&(0x7f0000000500)=@nfc={0x27, 0x1}, 0x80, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000002600)={&(0x7f0000002240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x7, 0xb6b9, 0x2f25, 0x0, 0xffffffffffffffff, 0x0, [], r1}, 0x3c) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) [ 2967.182539][T28773] validate_nla: 12 callbacks suppressed [ 2967.182550][T28773] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2967.319613][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2967.325879][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2967.332852][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2967.339851][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2967.343491][T28768] device 2238 entered promiscuous mode [ 2967.347730][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2967.359834][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:21:42 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa4*\x00', 0x2}) [ 2967.398989][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2967.404861][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2967.410991][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2967.417959][ C1] protocol 88fb is buggy, dev hsr_slave_1 23:21:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x15a) [ 2967.471785][T28773] device 1155 entered promiscuous mode 23:21:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x72010000) 23:21:42 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x4}, 0x0) 23:21:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) write$cgroup_int(r0, &(0x7f0000000040)=0x23, 0x12) [ 2967.623027][T28792] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2967.708761][T28795] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:21:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000340)='cgroup.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d000598d95a80648c63940d0124fcd5ec20c60179d54ef0a3953000100002400200a06d053582c13715", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d000598d95a80648c63940d0124fcd5ec20c60179d54ef0a3953000100002400200a06d053582c13715", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000140)={r6}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2968.087140][T28792] device 2239 entered promiscuous mode [ 2968.125799][T28810] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:42 executing program 3: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x9, 0x12) r0 = perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) close(0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x1ff) [ 2968.142200][T28809] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2968.157921][T28809] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 23:21:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r1, 0x3) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000002c0)=0x8) r2 = socket$kcm(0x2, 0x5, 0x84) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) perf_event_open(&(0x7f0000000240)={0x5, 0x70, 0x8, 0x2, 0x1, 0x38, 0x0, 0xa21, 0x2010, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x401, 0x4, @perf_config_ext={0x7f, 0x7}, 0x1000, 0x7fffffff, 0x7, 0x1c853947ad600402, 0x400, 0xfffffff7, 0x401}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xc) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x400, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f00000007c0)={'bpq0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0)=r3, 0x8) r5 = openat$cgroup_ro(r3, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r5, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) openat$cgroup_procs(r5, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) r6 = openat$cgroup(r1, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f00000001c0)='io.stat\x00', 0x7a05, 0x1700) write$cgroup_pid(r7, &(0x7f0000000000), 0x10000000d) sendmsg$inet(r1, &(0x7f0000000740)={&(0x7f0000000300)={0x2, 0x4e20, @rand_addr=0x719a0000}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000340)="545fe78fd94e24c5a392c7ae5076de60459ae5a1df62ad7190bceefae16d1b6f44c6dafa48eb71a2fca2292db839cef8ed826d2e68b3e3d3f8f2aed05d8daff33910105a672fab4feded6db60c2603de5d740feb5b9d41eb768dc4cde69d0d2480d7acda03", 0x65}, {&(0x7f00000003c0)="bbc59eb1276536113a8ba6d5217a2c5ae617ca641eca992da9cdfdd92a3e4dfd28417891a55bd40188afdbbca0e0f29bd5aa90865321347a73cd9ff473ef9e85ba953db9b7983dfa86fc8ce51bec126924d6a4bd9d646b5e91bc15c26eb918ddd01bd94e8f7be59d2036c9300a17128f230ae65284755840c9c9cdc056a9699a7a6342ec604f92797191fd76d37398376867ebaa39384020bfa0f0d4", 0x9c}, {&(0x7f00000005c0)="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", 0xfd}, {&(0x7f0000000480)="dfa12b6c7a871aaee328341587ca8fa46d0d6f090cc32818c240ea44f87224acb55a39ef657f978b985a88666745e76e9aacc363c3dcf3ce58c4cfcb71a8bec8da9f2196234c5b2e642f15506c09cb77a9fd7952343b7658bbc7f6b71cacb45e51fbe555a04672610668dcb31952d44ab54b57a7ae68d2a5283efb77a384fc5c6dfab78ae6c5b10ab84ff489c1575d7216561c5798c4017aaedd0dd82ba021745d745275bfea1e4837e635c56e1783b7c029b63f7ea214", 0xb7}, {&(0x7f0000000b00)="9194fd1401888ae2811235bc2e7a80ec9814f6477b6db6954422800881c547e3e948a9f5006c6cbed62ea29c4f76f8c9fcd28b3574cb6b03682000c809534de929f94e8b1c996ac87f27332fd1783907d9d38247a6a1dcb545e90adff27940a03ef78340e26d7588e7be9888a8c638f8091a4f0f85b4cfbf418b74dad7d755612848bd10ae82e8fdeeafc3126e6d40e9c1469ee441f631428accd05b8c7bed051fe96b57065bfed82ee3320e05342c1b1d0f4d0c2a593cb74d8ea8c7c96827ee82e32dceeef8f7b6a347748f370eb8823010b090e2fcb193f9b693a60842d520a9a12a4ada779a9a541bab8c2b6988d6206a69c34f8b9303c3220ac0abed40492024ec473d131f6ef6b1f6b5858c0639c82920b6855a15e7110df54788fb02db453c8e9565dfda3dd07b74077c4ec2c5a75abfcf6587512b719a480d77c29cd2db7614567f11bdde9b6d27c104a03807e38ce6395a3a7ccbd7d61e9c74326a77dca6219517251a9b1782d0a27c0865af1ff5aaf2855fcb118528390df8c2e74ee35e9d7ea6dd8c696ce8604db4f4615a3bc3c7d1c0e1c45679854341c479ba2d511cdad59c20975cae0553eb0a70a4221aa7b3fbfc73696de13ba65b26c775165f158272b8dfb476a7b20d3f5361c3b055e929153c88a5bb196623685e90d2874da1b96f59bc9cd3291c02efd56c71ea7015aaf6c2837514ec895721e5e7307f8d3d171e22a087795864687d21b2561dfc3a76c092f35f7715a519c85badcb01b16cae1c12f355cd71f7d3a652414bf7650694eb077c35f795693f75812a2ccf9ed2fae144c3fba4a130846755aea9d197498e980e403a731e1a0f3ca7c00fca9be1a0e8c1e51dfdde0c934d17f41e038cd3ed9c03cdbb5ebe988a5268c3eb4ef8c9eaaa5ff11ea14028c48984f08ce3206e94114911e0f4896db069a101dd8b53894fe46b2baa447dacb415bafd819400d363817779d6dd46b9e545644a11e2199ee8956872fb502c7ac34f215fc07e31ae250726889ff6011b8ce517a8c2ebf812f9d8972586936add7892d69e7a94ceeb86fa668afe279ff9788f6ac37291d4dc6db151c05ba4f71e975c5612024e8fdb4941785f58d407012b32e549a0d801290864b98aa902be8a3451d61330fb1261fc9019c4864e83059edce82761f4988f516e63a1178a1240f66bdf0a004c3a0896496cd7c7bec6abf0305496f8c9f68391cbab2dae312514cf95c8adf9d8f3bb972542d7cc2e0bd4541b4819cf633f1a68537cde0a8bd9329f07a12a8992a8b7995031b11d8f3c88353b4b21c2675a35c5142207ef7c62b12eb40ad908c11739c3aa1ee7f7811b9c49284724755d3a22697ba69114ee60175b624dc9fa30d7c3916df5338481786688bb1108aea3ddce2dcbe5b3f10bde616840d97802feafc0e4baba5c7bff18ad1f3d0b91cccbb0a8c1231bfde7ad2cf2e582000ee58d3887d86a24bb2e3ddf9e79be24cb296263124d01202cd5ff8615407f93a8f9f6c12a3f45ed5e45c368e2f393e2a99b7d9cccd1564cb697b06a86f473485a12d20a438513f2d8b603136962db520f898e895126b8eaf3511f222f2812e2abb3f5046d4423be0ba4c4d63fdc2a4394afaa44a1d8aa1997a53e25df7aa65c9310346ad4056fcfb1d59ff519a82031cdf92864a399dd132c55bebfc1f08beaf4f35ab1e8ced3545d7b0d9671edd67419a3a3a3b721858f3be5d58eaee9611d6628013128bf6c4861f0d387eb69c4263918f2fac26ef15f13d5c4a93def0cac9deccf1172e077ddc5a77a788fcb0a41b7035688fea44fe564a0f9accdc2d93b8d25cc9f1429389cf2db2d6612384acd11f0ff2c201d41dc200b5bb7a2ed9b1ee44a5a11891a748ac023d71a13fa57275693f208bb03d66b73f1afa1e174ca315c3e696922c737e04bdd36aae2165f37bbebe6ae77f4d7d44d7dad22abc6b8ee555e1969d3929e1843c858204e610d5b8383b41f0cd2fdad680d634f0b90b33d738fc20c4132f26e9fe62843c4bb63cdbd87a9c4bb426911e63ce8e0eb84872a32193330fbed05b5dbeb1b69b0f14421e2bee9de43b47a01038ea0226507b6836df2975f3bdd645c5b69f1a9e2c9317aecc9671c997b3b4b53edca0526f20aeeb0cbc0aa93129fa27ca2124ddf783a2e6f054604d786027ecc41092ca743d5e34a791b8f4ba9c237dce6bb95f5f50afeb1eb60ee088fd0cab1e13b44c2748614c741c8c2bd8d127560a184c13f5effa4cc8828293e54ff277bcb02398353d4d02a5443b2ec75bd32e7730a5dc01e7f5bfd27ef122a45e335c8f909298f65166d1c48236e87e21992038b5c4c9c6aea8417b8c12bb7d5b3cbee424e6d61cdf5b6557945df5e52bf5bf32c7645439e735dd9f12c8edd977ea8064f50af383704bde08f92ec4ace3442c7ea4f5242c7d797b4c1a38557b4d8f906fa0e4b92c2d4f0d4d8c25723677285a6c865dffe8f4a4a3318373938e5f6fc019a8fd1248825c58b21333c21084bed20f3e2e4ad4724d7e8d83064437126ccf73b61d33d6b632f21c9b72fd2aadb60f9dad87b197db7ef87ee1cd3b1d038fe1cb2746a7f56137026b21c88ae75d832bb846826ad869bbf2cba3c8a30afed254b244bc2b04c0b9c909b9a9a09b631c5cef64491048d958bd480dc42573c5b22d3e01fd72099590c81cac7033c63e2d610f55f1c61d932275e1b75448bc8be3a9e5e43ff393888cfcf72c94b452b5f73eec55d6168b9f54b49488200e234bd334da2cd57b90dd0cf9b435a4e561578ca853df933c5976fc0a8c63e09e121a382bf750dfb18fab52df5ce2b7717f5cc1bc15f1b5cac9f1e587389f7cf292015db9309187170b2cdbddaf525786b2a5496e22add538c8756e34d34e5ef7f8b1a322908d3cd68347256f11c092b51492601b713a511c5828c46ed0ba8fae34dabdfef9afc3d82cf0125e21f4d57b0162d94680e5c5634b1d1003a8eceb504e9c12c1f858a8f18b8754b8bec65cf9dd0516ac75d712a3beb7a7aa1d7a071200c35fe07d822ecd4da71e005ef1028eb197338088f7614cd2a980bf7e1b9d0930c2e93b74c3a2290e8edfa6926de32d29d3e1fdb231f825e38dc5557f79b089f4552db3ff1ffe1b53c891fa08cfa6f759f67a4a658008d763968cef78b5585943a4a40c38f668898db058b09cc34c6ecfbb4a60e1bc1a965027fcce5b7f9e24ccbc0ba5e0fcc7d2aa25573d2b8685522e87c0807094e5b10e30fa6af06840310ead35be633d9158b91453673df212fbdb4cde21d795b159440cb271795a160df29422dfcc55f37d49972611eb062cb6156d251a75479fbcccd1a343d1959853da7132e2ef8df80df59765c216ecaf0be4fd7e11f016937d73c8f5d23bb50a840c49c49a62930af959e1a9c445906731bfc6c2fd9df533c698ccaf9ce22c2c2f8231890ea7cf9f56be19bbebd146a67466c3ee9182072e8a92ca719b5a5b10fe2bfc3894427e5d0cf69d56df1f191a5bed10a21d18482046e4bc85ea07dcf52acd1c13b85c6302027d046e999be8f91e877105b3623abc862cb0263a77e10c08eaa355204511bfbe1eed24e3fae023f0dab3faf80bb7135361fee9fbc55b94a8ae01ccaaad4610869e0b2abe90955da1888b45898e0669fadfa51eefcb2e9035160368d572a757310496dc1f5430cb955ac44048c18220bd7f2f2e5ea15808bec7631655bc0c5e9ad9a8bf42a6291c5b0923ef5590c4b6c08353dc491075d497cd88200eaf2cfd26c4993817a2de7a2f167c5545d4b3bf63122e408a8ed53e9c0c7db5cc9d61cd60c6bb1ad191b7a73d926b8809f46d32da73ce1d54c8cc96f5107985e6ea2af8ba01e7732061a744edf33298be6b55220bb4ae477449163b2b2f3cf12faf47057dee02bce4db1a6ba6b1f09cacbfcdafe4bbfdb3ecb528e229e160bc7a770453cb04fc66b8a86b1e25dccca117524d47934be442946dab6a18560877fa07f9c2671c03f8e2cb7c42feaf285c222ab62d741d2afaa363f8ee91463c978e8ff69ff7ab2865aba3178d5fe050745a819d4da7690165278ef2559851666a21459954cad2d66c49e536ba274687e386ea91cd6ccbd403afaae65a2af83ed24293321d7fe4d6bb1a4b2371afd4abb9f7a450863133870ab161b8ec6cb3494c219bc830f90a38403b90ab8b53f921983b042d2e9a3269fefc672a1b71bec54e6787ec7b3871e990343177d87bf28e8b75fd8da86c8307c9bee57c3b5127c7dcfb41765e8bfd6e628d04b047faf1f22a9f14e30dae3a9d9f9f010749fde84b0f447c5f146dfe77d995236bad48fdcff23e71a58ee6858687c103c9593a220550e385af4a3e20a2b351bd88075728f81590322830b713a1ee00cfb097100ac2e0a8853cc89a787bc4868c5d1776025be009b94c7cbcb7d162ed8cbf1068034580b96c415b6c948de55017a2f3305c4c5e75e858fcc6c9ccd2219579ef6829033290dcfb185b67f682a4350897e2a64dc85048fd2ced24f3b68638db6897b34d713caefb918ad80f966ee23d4e373103921db3cc85b0282896f193996a42c71f87443762c7f832f1ac9525837514a5ae2aef2c4ebcfe8c5e22a0aa061f9604129d3aa2eab46d05bb1f6c8d5f9b51cd8d0da1bf00d960aa4df8e152435c4478a7bec7f0e243c459456f2156a844ec596044f3b1af39982c0bcca261ba50bdb273a6ec697a5f90de08b6f97858a75c7ccac3cc48b7bafeec68170c67e8a326842a27c4d747962eb9d086b92b2b675900976f9066351184883c5889bf7e86f8e6bec6671e0d1781a91e9a1b489ae4fd34a46cd306b3d4a740d722430b81cb4938c446566fbac008cab2afad9de8688e8075356d56fa7f35766299f6ad23a9ee1f4dcc4846e8f4d8159aaf69adb63b58e827a802d9eca2fa8c4d37155137c59fadab34d7b71897689684727c285dc0a0daba9661e5f4df93dc4691578b8fae7d5377e0be1149ce91d547686dd42bb5e441ce1a318b292be7f4106c812569cc5eab09bea969f009d398fa79899ced97457600e2c2e51f7c863e4841d64b622a03a197c7dce02ce7bb71bc300e2a4a36433c4df9a47a01e6e298a7b7ac75a3a9df2449b605329733a86d4ef52bccbfd3a518beb93ca7e4e5c0cc596f97c065194f940fdbdbef8a930ffc61c18be55cc774c8d8fd480c9cf3ad1830efadd4a1d507029597f28240f1f54a0428dfcb12d8f4415e54887e9071e3baa8b37f6e24f86341712dba9a1f84f7a14ae92643b499bc3a0f478594c395acb978783c18be2e4e9e78e114443559478871ad5ec8546811ebfc111d30a3df512568b607f607b5f9b41d5b636d0e50378a6eead660236244bb1bd839bb3e36f3958bdd91493cb36931b2fab93d1cb403f78a7f5ebe73a0fd523d276275ffa0220c2fec0d22f7305e64fd551a25bd17af77eaed6759c086cfa1cc86f41b9d2b6409946cea1439e04a65c9789c9f2e7eec9db81444fc0105775c21eb75161bf7ede65630476f19044c4cc776ba1eebb93f162b8ac630154162afd9038d8b1912cf0bc9143336360a79f87fc556c26c3dd1a5cf3a58067bfe41c1c661d0aa3d4fde6d611090c87e395d1e69132bc014cf2bb44161ee9ac57e090aa10193ffab941d2409c49894daad707b00665592ac553ecb4383b0d6fdab52e2fb4be7c818dcaa1eaac4b8d0839da0d6224270c800bc9a13c51653f05e96467ee97aa26dec33d6aa145587fa0a01819287642f12a0164c8e44f57b578485ab90d9b5c4a5d01740412eafd096840", 0x1000}], 0x5}, 0x90) r8 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r8, &(0x7f0000000180)='pids.current\x00', 0x0, 0x0) [ 2968.272186][T28795] device 1156 entered promiscuous mode 23:21:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x72030000) [ 2968.388484][T28810] device 2240 entered promiscuous mode 23:21:43 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa4+\x00', 0x2}) 23:21:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x170) 23:21:43 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) 23:21:43 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x5}, 0x0) [ 2968.607956][T28829] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2968.644649][T28832] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2968.724045][T28829] device 1157 entered promiscuous mode 23:21:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2, 0x5, 0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x76, &(0x7f0000000ac0)=r2, 0x8) r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r3, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5b81}, 0x0, 0x8001, 0x0, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000140)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r6, 0x6609, 0x0) recvmsg$kcm(r6, &(0x7f00000077c0)={&(0x7f0000006700)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000006780)=""/4096, 0x1000}], 0x1}, 0x200080c2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037, 0x20, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r7, r5}, 0x3c) r8 = socket$kcm(0x2, 0x5, 0x84) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r8, 0x84, 0x76, &(0x7f0000000ac0)=r9, 0x8) openat$cgroup_ro(r9, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r10, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x6, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8b7, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_val={0x18, 0x4c7c3073525786f1, 0x2, 0x0, r10}]}, &(0x7f00000002c0)='GPL\x00', 0x289, 0x75, &(0x7f0000000300)=""/117, 0x41000, 0x6, [], r7, 0x12, r9, 0x8, &(0x7f0000000380)={0x8, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0xb, 0x5, 0x9}, 0x10}, 0x70) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r11 = gettid() perf_event_open(0x0, r11, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r12 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r12, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r13, 0x400454d1, &(0x7f0000000440)=ANY=[@ANYBLOB="02000800d127c88cc055ffffffffffff6636d02b21acaaaaaaaaaa24000000000000aab8aaaaaa1800000000000000000000000085bfb3864f3449e62b757cfd6aa03cf642c7b1994648bb69ca18b2c76b868ffafefb9b7735459d0473e78e45ede25f9c809953d89a1878f2c3ea582ea62f4759bef0b11ae5d0b2768c64847137fce8f1850183a19ad0e10a9b66d52b30fef2dfb44356fd37ecba46ef96599d7af1e2f4ec6957a8b7c4fad3bc5b2e11cf9d1525c8894200de50d9722b8a3b0000"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r14, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x74000000) [ 2968.995709][T28847] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:21:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000440)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000014c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51f1c3207f3e47f3, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, @perf_bp={&(0x7f0000000400), 0xc}, 0x24800, 0x5, 0x0, 0x0, 0x0, 0x64, 0x667a}, r1, 0xd, 0xffffffffffffffff, 0xd) r2 = openat$cgroup(r1, &(0x7f00000009c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_type(r2, &(0x7f0000000a00)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000180)="0e849a256cef3e409686ef4c8ee23fd693e716c2833a447897109738c5a1eebf72a84d56fb466bc7909c8a128a8a6141250b00f7e7eb00d7ca4fa48cc032043d614833a34c40d017ccb7e455ff80fa81913625b61507a3022b", 0x59}, {&(0x7f0000000200)="198cfff824744fdb77ebe0175186d2429ad20002cf26340b6727d81d32e90c14968c16262af426b78742673645f6fcfb0e4e04f9cbc8f5d36b39a9b7312c41cad2fca741274fd4bdc33142fa699a3605d90e61b34e7253faef86f0ee0f612b5294a9c891dcba43a9c3ab3cf95c340ae43b3a31438e5e477cb629bd5429f830e966214651abcc89240ec0712aba5752a118704a5fd9128a50a1d5e0765b048d1121d2ac4b472d79413c37a246af37a0bf62b9a46f8898f050480dcefda480a31ec0056be6e7c72589207d8924d7452f012a50b618ef5e5989408b6a97b39b1dd4", 0xe0}, {&(0x7f0000000b00)="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", 0x1000}, {&(0x7f0000000300)="8e83aa346967785aac1ab345d6aa15c0df121d7e1c6c1d440b9d54f469cc50add3b136ac4eb189e0865d90177397ca2f86b7a8529252caea5e42464f9047a500b76977cde39864c6953b790253482da780606234fcb60314eeb703a5a66c139b2cb81713c76fbd30ffd1fb43e046eb63e14c8c12c77d51ccd44c33edd501080e430e72e8827a4ca2ad0114740a8e2e471951c7cdbb8d1b43e21e8d98737f5cedcee9ac2b6a4d912745e6918ddeec60f6ab6fce380816ac7de04312bec1bf3a9dfbbe9ee81ad2c1d67833e1d5686f915051c5c94ab838e0e59616de60c79ec30fee13218af5432771", 0xe8}, {&(0x7f0000000400)="81eb5029ca014c80caaf8cd86c9849210f67b624497738aa57d87a23c6e1cf0953edb25a64eb5f4fab9d05705f29a090c55c535cde9d6716449a68d42f5798da38704b1f78112363a55165a083ff986a145fb8a62e84fd16cc95576b9eb4cfe30fa2e2f8420e261f6e9d016b77acd64e7d2a1ec50d05a050ea33154455cb50f1f1e45da4bb771f96e16f8c557d27fe9f101b3aeb03a507d2873b3d39dd42dbfc866f275961dce5726b87ade181c615baa11d8116dac812b4fb65e0d662937cbc0619d2ff541c2de42761db924b07a27290ad6a838e425ca5", 0xd8}, {&(0x7f00000005c0)="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", 0xfa}, {&(0x7f0000000100)="ab961f0c921d03e552d699cd65dacf6f6c87e0c60d6db64eb782120eb7fc202de1b0ca0dfc40720442599b78e3a278334ca1854d9434b1923251498dc0ebdc61", 0x40}, {&(0x7f00000006c0)="deec3f110e24677a7df5fd7533f7e435c3e43b571b0ab49a9072685e6f8b074995a12662c25bc3b8fc8ee33fc4e17b7bc9ee6dc4277247fb682e425c60bbd9a08694d8af25f4195270255f43af0a8208078ff5677e002b6ed87ced7bf0485978a0b0babf2223fbf7c3b7e61663f88e457585b922267979841f7b0b3566b9d52b80b1e7cc57b4a6dcad1c9bd1541d4b337d6c7445cc75cb4f14ee6fd11aefbc44a3dd670398ce6fc7573637eac24f576f62214e0bbe42", 0xb6}, {&(0x7f0000000780)="2d388c157ac6f5bec0150b8906bf17e8e44ca414b038ec9c3390bc14018dc19c736dac56aaaac0be08e9693dbddedb73eb9c6f8cb48e914bd411fa1422c4707641f55673982d78e8e110f1b8ab04519daaedcf03c391b101", 0x58}], 0x9, &(0x7f00000008c0)=[{0x58, 0xe7baa108cc0cba0c, 0x0, "441dd7250a28883fb7c794edf65788f3315f2d2f8c8d09adf474532eec2c91eee82c96141239fd97648d2d857180fa05161e2a407a63df16204e10395086004bed3d5bdef3a3"}, {0x48, 0xfe, 0x101, "1439311058fddde69c5c4b63cb5ed2b9b35951d2cbe0ce92275756f094805bcaef7001f6c783b842dec2db0dba1603d104e487deb06fc88a"}], 0xa0}, 0x4040000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = socket$kcm(0x2, 0x5, 0x84) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r6, 0x3) write$cgroup_pid(r6, &(0x7f0000000980)=0xffffffffffffffff, 0x12) setsockopt$sock_attach_bpf(r4, 0x84, 0x76, &(0x7f0000000ac0)=r5, 0x8) r7 = openat$cgroup_ro(r5, &(0x7f00000000c0)='mmmory.sX\xf9l\xcb', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r7, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r7}, 0x10) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) [ 2969.101205][T28832] device 2241 entered promiscuous mode [ 2969.199899][T28852] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2969.273601][T28847] device 1158 entered promiscuous mode 23:21:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x74030000) [ 2969.353534][T28852] device 2242 entered promiscuous mode 23:21:44 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) sendmsg$kcm(r0, &(0x7f0000001900)={&(0x7f0000000500)=@nfc={0x27, 0x1}, 0x80, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000002600)={&(0x7f0000002240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x7, 0xb6b9, 0x2f25, 0x0, 0xffffffffffffffff, 0x0, [], r1}, 0x3c) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) 23:21:44 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x03,\x00', 0x2}) 23:21:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x1d2) 23:21:44 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x6}, 0x0) [ 2969.502611][T28859] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2969.631967][T28867] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2969.648533][T28859] device 1159 entered promiscuous mode 23:21:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x7a000000) 23:21:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000040)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2969.975535][T28867] device 2243 entered promiscuous mode 23:21:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x1fa) [ 2970.090231][T28880] device 1160 entered promiscuous mode 23:21:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x7a030000) 23:21:45 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) sendmsg$kcm(r0, &(0x7f0000001900)={&(0x7f0000000500)=@nfc={0x27, 0x1}, 0x80, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000002600)={&(0x7f0000002240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x7, 0xb6b9, 0x2f25, 0x0, 0xffffffffffffffff, 0x0, [], r1}, 0x3c) perf_event_open(&(0x7f00000037c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) 23:21:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = gettid() perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r3 = socket$kcm(0x2, 0x5, 0x84) r4 = socket$kcm(0x2, 0x5, 0x84) r5 = openat$cgroup(r0, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000000)='cpuacct.stat\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x76, &(0x7f0000000ac0)=r6, 0x8) openat$cgroup_ro(r6, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_procs(r6, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r7, 0x400454d1, &(0x7f0000000300)=ANY=[@ANYBLOB="02000800d127c88cc055ffffffffffff6636d02b21acaaaaaaaaaa24000000000000aa99aaaaaa18000000000000000026fa04db891ab796036e7000000000"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2970.491456][T28888] device 2244 entered promiscuous mode 23:21:45 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa4,\x00', 0x2}) [ 2970.671390][T28892] device 1161 entered promiscuous mode 23:21:45 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x7}, 0x0) 23:21:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x7c000000) [ 2970.746787][T28895] device 2245 entered promiscuous mode 23:21:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x201) 23:21:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x212) [ 2970.983879][T28913] device 1162 entered promiscuous mode 23:21:45 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa4-\x00', 0x2}) 23:21:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x7c030000) 23:21:45 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x8}, 0x0) 23:21:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x5450, 0xffffffffffffffff) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x5450, 0xffffffffffffffff) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x5450, 0xffffffffffffffff) r7 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x5450, 0xffffffffffffffff) r8 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r8, 0x5450, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40082404, &(0x7f0000000340)=0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @remote, @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:46 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xf7, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x40000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) [ 2971.477982][T28924] device 2246 entered promiscuous mode [ 2971.545219][T28927] device 1163 entered promiscuous mode 23:21:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x82010000) [ 2971.618184][T28942] device 2247 entered promiscuous mode 23:21:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x23a) 23:21:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x84000000) 23:21:46 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa4.\x00', 0x2}) 23:21:46 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x9}, 0x0) 23:21:46 executing program 3 (fault-call:6 fault-nth:0): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:21:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x7, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2971.959315][T28965] FAULT_INJECTION: forcing a failure. [ 2971.959315][T28965] name failslab, interval 1, probability 0, space 0, times 0 [ 2971.999169][T28965] CPU: 1 PID: 28965 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2972.007118][T28965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2972.017297][T28965] Call Trace: [ 2972.020618][T28965] dump_stack+0x172/0x1f0 [ 2972.024974][T28965] should_fail.cold+0xa/0x15 [ 2972.029588][T28965] ? fault_create_debugfs_attr+0x180/0x180 [ 2972.036239][T28965] ? ___might_sleep+0x163/0x2c0 [ 2972.041449][T28965] __should_failslab+0x121/0x190 [ 2972.046384][T28965] should_failslab+0x9/0x14 [ 2972.050963][T28965] kmem_cache_alloc+0x2aa/0x710 [ 2972.055816][T28965] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2972.062072][T28965] ? iov_iter_alignment+0x1c9/0x830 [ 2972.067278][T28965] do_blockdev_direct_IO+0x378/0x8420 [ 2972.072648][T28965] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2972.078233][T28965] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2972.084329][T28965] ? ___might_sleep+0x163/0x2c0 [ 2972.089179][T28965] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2972.095497][T28965] ? mark_buffer_dirty+0x190/0x6c0 [ 2972.100620][T28965] ? bget_one+0x30/0x30 [ 2972.104767][T28965] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2972.111263][T28965] ? sb_init_dio_done_wq+0x80/0x80 [ 2972.116544][T28965] ? __kasan_check_read+0x11/0x20 [ 2972.121573][T28965] ? __lock_acquire+0x16f2/0x4a00 [ 2972.126629][T28965] ? lock_downgrade+0x920/0x920 [ 2972.132609][T28965] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2972.139107][T28965] __blockdev_direct_IO+0xa1/0xca [ 2972.144122][T28965] ? __blockdev_direct_IO+0xa1/0xca [ 2972.149311][T28965] ? bget_one+0x30/0x30 [ 2972.153479][T28965] ext4_direct_IO+0xc0d/0x1c50 [ 2972.158238][T28965] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2972.164737][T28965] generic_file_direct_write+0x20a/0x4a0 [ 2972.170374][T28965] __generic_file_write_iter+0x2ee/0x630 [ 2972.176011][T28965] ext4_file_write_iter+0x317/0x13c0 [ 2972.181303][T28965] ? ext4_release_file+0x380/0x380 [ 2972.186400][T28965] ? mark_lock+0xc2/0x1220 [ 2972.190832][T28965] ? __kasan_check_read+0x11/0x20 [ 2972.196109][T28965] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2972.202473][T28965] ? iov_iter_init+0xee/0x220 [ 2972.207153][T28965] new_sync_write+0x4d3/0x770 [ 2972.211834][T28965] ? new_sync_read+0x800/0x800 [ 2972.216595][T28965] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2972.222752][T28965] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2972.228027][T28965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2972.234256][T28965] __vfs_write+0xe1/0x110 [ 2972.238573][T28965] vfs_write+0x268/0x5d0 [ 2972.242805][T28965] ksys_write+0x14f/0x290 [ 2972.247130][T28965] ? __ia32_sys_read+0xb0/0xb0 [ 2972.251886][T28965] ? do_syscall_64+0x26/0x760 [ 2972.256555][T28965] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2972.262609][T28965] ? do_syscall_64+0x26/0x760 [ 2972.267276][T28965] __x64_sys_write+0x73/0xb0 [ 2972.271851][T28965] do_syscall_64+0xfa/0x760 [ 2972.276362][T28965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2972.282247][T28965] RIP: 0033:0x459f49 [ 2972.286127][T28965] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:21:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x84020000) [ 2972.305720][T28965] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2972.314205][T28965] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2972.322174][T28965] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2972.330140][T28965] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2972.338098][T28965] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2972.346054][T28965] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 23:21:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x84030000) [ 2972.582931][T28955] device 2248 entered promiscuous mode 23:21:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x244) 23:21:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x87a00000) [ 2972.781643][T28987] validate_nla: 9 callbacks suppressed [ 2972.781688][T28987] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:47 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa4/\x00', 0x2}) 23:21:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = gettid() perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) r4 = openat$cgroup_ro(r0, &(0x7f0000000380)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x80, 0x4, 0x0, 0x0, 0x0, 0x9, 0x40, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x6, 0x4}, 0x2820, 0x7, 0x8, 0x5, 0x80000001, 0xe2, 0x2}, 0xffffffffffffffff, 0x10, r1, 0x8) r5 = socket$kcm(0x2, 0x5, 0x84) socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000440)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000014c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51f1c3207f3e47f3, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, @perf_bp={&(0x7f0000000400), 0xc}, 0x24800, 0x5, 0x0, 0x0, 0x0, 0x64, 0x667a}, r7, 0xd, 0xffffffffffffffff, 0xd) openat$cgroup(r7, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r6, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000800d127c88cc055ffffffffffff36d02b21acaaaaaaaaaa24000000000000aaaa2aaaaa1800"/52]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:47 executing program 3 (fault-call:6 fault-nth:1): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:21:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x8a020000) [ 2973.205569][T29004] FAULT_INJECTION: forcing a failure. [ 2973.205569][T29004] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2973.214715][T28987] device 2249 entered promiscuous mode [ 2973.218814][T29004] CPU: 0 PID: 29004 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2973.218825][T29004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2973.218831][T29004] Call Trace: [ 2973.218856][T29004] dump_stack+0x172/0x1f0 [ 2973.218878][T29004] should_fail.cold+0xa/0x15 [ 2973.218899][T29004] ? fault_create_debugfs_attr+0x180/0x180 [ 2973.218916][T29004] ? __kasan_check_read+0x11/0x20 [ 2973.218939][T29004] ? __lock_acquire+0x16f2/0x4a00 [ 2973.218962][T29004] should_fail_alloc_page+0x50/0x60 [ 2973.218976][T29004] __alloc_pages_nodemask+0x1a1/0x900 [ 2973.218995][T29004] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2973.232439][T29004] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2973.232458][T29004] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2973.232486][T29004] ? fault_create_debugfs_attr+0x180/0x180 [ 2973.232504][T29004] cache_grow_begin+0x90/0xd20 [ 2973.232521][T29004] ? do_blockdev_direct_IO+0x378/0x8420 [ 2973.232540][T29004] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2973.232556][T29004] kmem_cache_alloc+0x64e/0x710 [ 2973.232571][T29004] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2973.232592][T29004] do_blockdev_direct_IO+0x378/0x8420 [ 2973.245962][T29004] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2973.254945][T29004] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2973.265748][T29004] ? ___might_sleep+0x163/0x2c0 [ 2973.265769][T29004] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2973.265786][T29004] ? mark_buffer_dirty+0x190/0x6c0 [ 2973.265803][T29004] ? bget_one+0x30/0x30 [ 2973.265815][T29004] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2973.265835][T29004] ? sb_init_dio_done_wq+0x80/0x80 [ 2973.276044][T29004] ? __kasan_check_read+0x11/0x20 [ 2973.276061][T29004] ? __lock_acquire+0x16f2/0x4a00 [ 2973.276102][T29004] ? lock_downgrade+0x920/0x920 [ 2973.292825][T29004] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 23:21:48 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0xa}, 0x0) [ 2973.304329][T29004] __blockdev_direct_IO+0xa1/0xca [ 2973.304345][T29004] ? __blockdev_direct_IO+0xa1/0xca [ 2973.304367][T29004] ? bget_one+0x30/0x30 [ 2973.325820][T29004] ext4_direct_IO+0xc0d/0x1c50 [ 2973.325841][T29004] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2973.325872][T29004] generic_file_direct_write+0x20a/0x4a0 [ 2973.343103][T29004] __generic_file_write_iter+0x2ee/0x630 [ 2973.343126][T29004] ext4_file_write_iter+0x317/0x13c0 [ 2973.343149][T29004] ? ext4_release_file+0x380/0x380 [ 2973.343169][T29004] ? mark_lock+0xc2/0x1220 [ 2973.360214][T29004] ? __kasan_check_read+0x11/0x20 [ 2973.369470][T29004] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2973.369488][T29004] ? iov_iter_init+0xee/0x220 [ 2973.369507][T29004] new_sync_write+0x4d3/0x770 [ 2973.369524][T29004] ? new_sync_read+0x800/0x800 [ 2973.369547][T29004] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2973.369567][T29004] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2973.369583][T29004] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2973.369600][T29004] __vfs_write+0xe1/0x110 [ 2973.369615][T29004] vfs_write+0x268/0x5d0 [ 2973.369632][T29004] ksys_write+0x14f/0x290 [ 2973.369648][T29004] ? __ia32_sys_read+0xb0/0xb0 [ 2973.369665][T29004] ? do_syscall_64+0x26/0x760 [ 2973.369681][T29004] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2973.369700][T29004] ? do_syscall_64+0x26/0x760 [ 2973.381328][T29004] __x64_sys_write+0x73/0xb0 [ 2973.381349][T29004] do_syscall_64+0xfa/0x760 [ 2973.381371][T29004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2973.381386][T29004] RIP: 0033:0x459f49 [ 2973.391444][T29004] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2973.391452][T29004] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2973.391467][T29004] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2973.391476][T29004] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2973.391485][T29004] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:21:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x8a030000) [ 2973.391494][T29004] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2973.391502][T29004] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 [ 2973.581308][T29010] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:48 executing program 3 (fault-call:6 fault-nth:2): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:21:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x8c020000) [ 2973.885531][T29025] FAULT_INJECTION: forcing a failure. [ 2973.885531][T29025] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2973.898796][T29025] CPU: 1 PID: 29025 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2973.898806][T29025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2973.898811][T29025] Call Trace: [ 2973.898838][T29025] dump_stack+0x172/0x1f0 [ 2973.898861][T29025] should_fail.cold+0xa/0x15 [ 2973.898876][T29025] ? __kasan_check_read+0x11/0x20 [ 2973.898896][T29025] ? fault_create_debugfs_attr+0x180/0x180 [ 2973.898912][T29025] ? __kasan_check_read+0x11/0x20 [ 2973.898934][T29025] ? __lock_acquire+0x16f2/0x4a00 [ 2973.949924][T29025] should_fail_alloc_page+0x50/0x60 [ 2973.949941][T29025] __alloc_pages_nodemask+0x1a1/0x900 [ 2973.949955][T29025] ? ____cache_alloc_node+0x160/0x1d0 [ 2973.949969][T29025] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2973.949980][T29025] ? ____cache_alloc_node+0x160/0x1d0 [ 2973.950000][T29025] ? lock_downgrade+0x920/0x920 [ 2973.950018][T29025] cache_grow_begin+0x90/0xd20 [ 2973.960578][T29025] ? __kasan_check_read+0x11/0x20 [ 2973.960594][T29025] ? do_raw_spin_unlock+0x57/0x270 [ 2973.960610][T29025] ____cache_alloc_node+0x17a/0x1d0 [ 2973.960626][T29025] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2973.960643][T29025] kmem_cache_alloc+0x1ef/0x710 [ 2973.960657][T29025] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2973.960675][T29025] ? ext4_xattr_get+0x199/0xab0 [ 2973.971748][T29025] do_blockdev_direct_IO+0x378/0x8420 [ 2973.971771][T29025] ? lock_downgrade+0x920/0x920 [ 2973.971794][T29025] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2973.971808][T29025] ? ext4_xattr_ibody_get+0x110/0x550 [ 2973.971823][T29025] ? bget_one+0x30/0x30 [ 2973.971842][T29025] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2973.982060][T29025] ? sb_init_dio_done_wq+0x80/0x80 [ 2973.982081][T29025] ? __kasan_check_read+0x11/0x20 [ 2973.982096][T29025] ? __lock_acquire+0x16f2/0x4a00 [ 2973.982138][T29025] ? lock_downgrade+0x920/0x920 [ 2973.982160][T29025] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2973.991907][T29025] __blockdev_direct_IO+0xa1/0xca [ 2973.991922][T29025] ? __blockdev_direct_IO+0xa1/0xca [ 2973.991938][T29025] ? bget_one+0x30/0x30 [ 2973.991958][T29025] ext4_direct_IO+0xc0d/0x1c50 [ 2973.991975][T29025] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2973.991999][T29025] generic_file_direct_write+0x20a/0x4a0 [ 2974.002272][T29025] __generic_file_write_iter+0x2ee/0x630 [ 2974.002294][T29025] ext4_file_write_iter+0x317/0x13c0 [ 2974.002317][T29025] ? ext4_release_file+0x380/0x380 [ 2974.002331][T29025] ? mark_lock+0xc2/0x1220 [ 2974.002354][T29025] ? __kasan_check_read+0x11/0x20 [ 2974.002374][T29025] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2974.013456][T29025] ? iov_iter_init+0xee/0x220 [ 2974.013474][T29025] new_sync_write+0x4d3/0x770 [ 2974.013491][T29025] ? new_sync_read+0x800/0x800 [ 2974.013516][T29025] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2974.013537][T29025] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2974.024601][T29025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2974.024619][T29025] __vfs_write+0xe1/0x110 [ 2974.024637][T29025] vfs_write+0x268/0x5d0 [ 2974.024655][T29025] ksys_write+0x14f/0x290 [ 2974.024671][T29025] ? __ia32_sys_read+0xb0/0xb0 [ 2974.198379][T29025] ? do_syscall_64+0x26/0x760 [ 2974.203071][T29025] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2974.209133][T29025] ? do_syscall_64+0x26/0x760 [ 2974.213807][T29025] __x64_sys_write+0x73/0xb0 [ 2974.218399][T29025] do_syscall_64+0xfa/0x760 [ 2974.222938][T29025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2974.228825][T29025] RIP: 0033:0x459f49 [ 2974.232715][T29025] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2974.253089][T29025] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2974.261499][T29025] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2974.269555][T29025] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2974.277686][T29025] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:21:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x8c030000) [ 2974.285647][T29025] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2974.293602][T29025] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 23:21:49 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = gettid() perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) perf_event_open(&(0x7f0000000440)={0x4, 0x70, 0x5, 0x7, 0x1f, 0x9, 0x0, 0x400, 0x200, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1f, 0x3, @perf_bp={&(0x7f00000002c0), 0x1}, 0x100c0, 0x3, 0xffffff7f, 0x9, 0x4, 0x3497, 0x5}, r2, 0x7, r0, 0x4) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xe1b3) r3 = gettid() perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r4 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r4, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0x7, 0x4, 0x3, 0x40, 0x0, 0x2, 0x1a00, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000040)}, 0x218a8, 0x2009, 0x1000, 0x6, 0x0, 0x9, 0x1}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f0000000380)=ANY=[@ANYBLOB="02000800d127c88cc055ffff000000000000000021acaaaaaaaaaa24000000000000aaaaaaaaaa180000000000000000000000b9ba902fb3e9d62ef3de8562c2f000"]) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) write$cgroup_subtree(r8, &(0x7f0000000040)=ANY=[@ANYBLOB="7e4a7a006386dd20bfa6"], 0x9213) r9 = socket$kcm(0x2, 0x5, 0x84) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r9, 0x84, 0x76, &(0x7f0000000ac0)=r10, 0x8) r11 = openat$cgroup_ro(r10, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r11, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) ioctl$TUNSETFILTEREBPF(r8, 0x800454e1, &(0x7f00000004c0)=r11) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2974.346732][T29010] device 2250 entered promiscuous mode 23:21:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x284) 23:21:49 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0xb}, 0x0) 23:21:49 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa40\x00', 0x2}) 23:21:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x92020000) [ 2974.553601][T29046] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:49 executing program 3 (fault-call:6 fault-nth:3): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:21:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x92030000) [ 2974.757071][T29059] FAULT_INJECTION: forcing a failure. [ 2974.757071][T29059] name failslab, interval 1, probability 0, space 0, times 0 [ 2974.813554][T29059] CPU: 1 PID: 29059 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2974.821504][T29059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2974.821511][T29059] Call Trace: [ 2974.821534][T29059] dump_stack+0x172/0x1f0 [ 2974.821556][T29059] should_fail.cold+0xa/0x15 [ 2974.821577][T29059] ? fault_create_debugfs_attr+0x180/0x180 [ 2974.821599][T29059] ? ___might_sleep+0x163/0x2c0 [ 2974.821619][T29059] __should_failslab+0x121/0x190 23:21:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x94030000) [ 2974.821637][T29059] should_failslab+0x9/0x14 [ 2974.821650][T29059] __kmalloc+0x2e0/0x770 [ 2974.821672][T29059] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2974.821685][T29059] ? ext4_find_extent+0x76e/0x9d0 [ 2974.821703][T29059] ext4_find_extent+0x76e/0x9d0 [ 2974.821718][T29059] ? mark_lock+0xc2/0x1220 [ 2974.821735][T29059] ext4_ext_map_blocks+0x1dc/0x3ac0 [ 2974.821751][T29059] ? mark_held_locks+0xf0/0xf0 [ 2974.821771][T29059] ? ext4_ext_release+0x10/0x10 [ 2974.821802][T29059] ? __kasan_check_write+0x14/0x20 [ 2974.821819][T29059] ? down_read+0x109/0x430 [ 2974.821837][T29059] ? down_read_killable+0x490/0x490 [ 2974.821855][T29059] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2974.821870][T29059] ? ext4_es_lookup_extent+0x426/0xd40 [ 2974.821893][T29059] ext4_map_blocks+0xdc7/0x17e0 [ 2974.821907][T29059] ? finish_task_switch+0x147/0x750 [ 2974.821922][T29059] ? _raw_spin_unlock_irq+0x28/0x90 [ 2974.821944][T29059] ? ext4_issue_zeroout+0x190/0x190 [ 2974.821975][T29059] _ext4_get_block+0x242/0x5f0 23:21:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x9a030000) [ 2974.821994][T29059] ? ext4_map_blocks+0x17e0/0x17e0 [ 2974.822012][T29059] ? ext4_journal_check_start+0x1ba/0x260 [ 2974.822030][T29059] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2974.822047][T29059] ? __ext4_journal_start_sb+0x146/0x4d0 [ 2974.822068][T29059] ext4_get_block_trans+0x17b/0x2b0 [ 2974.822089][T29059] ? ext4_dio_get_block_overwrite+0x140/0x140 [ 2974.822115][T29059] ext4_dio_get_block+0x78/0xc0 [ 2974.822134][T29059] do_blockdev_direct_IO+0x1227/0x8420 [ 2974.822158][T29059] ? ___might_sleep+0x163/0x2c0 [ 2974.822190][T29059] ? sb_init_dio_done_wq+0x80/0x80 [ 2974.822209][T29059] ? __kasan_check_read+0x11/0x20 [ 2974.822223][T29059] ? __lock_acquire+0x16f2/0x4a00 [ 2974.822259][T29059] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2974.822284][T29059] ? lock_downgrade+0x920/0x920 [ 2974.822306][T29059] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2974.822324][T29059] __blockdev_direct_IO+0xa1/0xca [ 2974.822338][T29059] ? __blockdev_direct_IO+0xa1/0xca [ 2974.822352][T29059] ? bget_one+0x30/0x30 23:21:49 executing program 3 (fault-call:6 fault-nth:4): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2974.822371][T29059] ext4_direct_IO+0xc0d/0x1c50 [ 2974.822390][T29059] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2974.822415][T29059] generic_file_direct_write+0x20a/0x4a0 [ 2974.822439][T29059] __generic_file_write_iter+0x2ee/0x630 [ 2974.822460][T29059] ext4_file_write_iter+0x317/0x13c0 [ 2974.822482][T29059] ? ext4_release_file+0x380/0x380 [ 2974.822496][T29059] ? mark_lock+0xc2/0x1220 [ 2974.822515][T29059] ? __kasan_check_read+0x11/0x20 [ 2974.822532][T29059] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2974.822547][T29059] ? iov_iter_init+0xee/0x220 [ 2974.822564][T29059] new_sync_write+0x4d3/0x770 [ 2974.822580][T29059] ? new_sync_read+0x800/0x800 [ 2974.822605][T29059] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2974.822626][T29059] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2974.822643][T29059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2974.822660][T29059] __vfs_write+0xe1/0x110 [ 2974.822678][T29059] vfs_write+0x268/0x5d0 [ 2974.822697][T29059] ksys_write+0x14f/0x290 [ 2974.860537][T29059] ? __ia32_sys_read+0xb0/0xb0 23:21:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x9c000000) [ 2974.860558][T29059] ? do_syscall_64+0x26/0x760 [ 2974.860576][T29059] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2974.860590][T29059] ? do_syscall_64+0x26/0x760 [ 2974.860608][T29059] __x64_sys_write+0x73/0xb0 [ 2974.860625][T29059] do_syscall_64+0xfa/0x760 [ 2974.860645][T29059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2974.860657][T29059] RIP: 0033:0x459f49 [ 2974.860671][T29059] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2974.860684][T29059] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2974.869682][T29059] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2974.869691][T29059] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2974.869698][T29059] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2974.869706][T29059] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2974.869714][T29059] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 [ 2975.242565][T29074] FAULT_INJECTION: forcing a failure. [ 2975.242565][T29074] name failslab, interval 1, probability 0, space 0, times 0 [ 2975.282419][T29074] CPU: 0 PID: 29074 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2975.290319][T29074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2975.300384][T29074] Call Trace: [ 2975.303696][T29074] dump_stack+0x172/0x1f0 [ 2975.308078][T29074] should_fail.cold+0xa/0x15 [ 2975.312703][T29074] ? fault_create_debugfs_attr+0x180/0x180 [ 2975.318712][T29074] __should_failslab+0x121/0x190 [ 2975.323669][T29074] should_failslab+0x9/0x14 [ 2975.328312][T29074] kmem_cache_alloc+0x47/0x710 [ 2975.333097][T29074] ? __kasan_check_write+0x14/0x20 [ 2975.338224][T29074] ? do_raw_write_lock+0x124/0x290 [ 2975.343325][T29074] __es_insert_extent+0x2cc/0xf20 [ 2975.348349][T29074] ext4_es_insert_extent+0x2d2/0xa70 [ 2975.353639][T29074] ? ext4_es_scan_clu+0xe0/0xe0 [ 2975.358480][T29074] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2975.364484][T29074] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2975.370733][T29074] ? ext4_es_find_extent_range+0x131/0x660 [ 2975.376554][T29074] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 2975.382289][T29074] ? ext4_rereserve_cluster+0x240/0x240 [ 2975.387822][T29074] ? ext4_find_extent+0x76e/0x9d0 [ 2975.392829][T29074] ? ext4_find_extent+0x6a6/0x9d0 [ 2975.398193][T29074] ? percpu_counter_add_batch+0x114/0x190 [ 2975.403909][T29074] ext4_ext_map_blocks+0x1930/0x3ac0 [ 2975.409198][T29074] ? ext4_ext_release+0x10/0x10 [ 2975.414048][T29074] ? __kasan_check_write+0x14/0x20 [ 2975.419320][T29074] ? down_read+0x109/0x430 [ 2975.423724][T29074] ? down_read_killable+0x490/0x490 [ 2975.428927][T29074] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2975.435151][T29074] ? ext4_es_lookup_extent+0x426/0xd40 [ 2975.440602][T29074] ? __kasan_check_write+0x14/0x20 [ 2975.445708][T29074] ? up_read+0x1d2/0x810 [ 2975.449942][T29074] ext4_map_blocks+0xdc7/0x17e0 [ 2975.454819][T29074] ? ext4_issue_zeroout+0x190/0x190 [ 2975.460010][T29074] ? get_user_pages_unlocked+0x3b4/0x4a0 [ 2975.465644][T29074] _ext4_get_block+0x242/0x5f0 [ 2975.470409][T29074] ? ext4_map_blocks+0x17e0/0x17e0 [ 2975.475527][T29074] ? ext4_journal_check_start+0x1ba/0x260 [ 2975.481248][T29074] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2975.487478][T29074] ? __ext4_journal_start_sb+0x146/0x4d0 [ 2975.493110][T29074] ext4_get_block_trans+0x17b/0x2b0 [ 2975.498309][T29074] ? ext4_dio_get_block_overwrite+0x140/0x140 [ 2975.504365][T29074] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2975.510082][T29074] ? iov_iter_advance+0x295/0xf70 [ 2975.515098][T29074] ? csum_and_copy_to_iter+0x1600/0x1600 [ 2975.520719][T29074] ext4_dio_get_block+0x78/0xc0 [ 2975.525573][T29074] do_blockdev_direct_IO+0x1227/0x8420 [ 2975.531047][T29074] ? sb_init_dio_done_wq+0x80/0x80 [ 2975.536147][T29074] ? __kasan_check_read+0x11/0x20 [ 2975.541160][T29074] ? __lock_acquire+0x16f2/0x4a00 [ 2975.546709][T29074] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2975.553422][T29074] ? lock_downgrade+0x920/0x920 [ 2975.558726][T29074] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2975.565508][T29074] __blockdev_direct_IO+0xa1/0xca [ 2975.570527][T29074] ? __blockdev_direct_IO+0xa1/0xca [ 2975.575716][T29074] ? bget_one+0x30/0x30 [ 2975.579874][T29074] ext4_direct_IO+0xc0d/0x1c50 [ 2975.584640][T29074] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2975.591140][T29074] generic_file_direct_write+0x20a/0x4a0 [ 2975.596862][T29074] __generic_file_write_iter+0x2ee/0x630 [ 2975.602489][T29074] ext4_file_write_iter+0x317/0x13c0 [ 2975.607768][T29074] ? ext4_release_file+0x380/0x380 [ 2975.613472][T29074] ? mark_lock+0xc2/0x1220 [ 2975.617879][T29074] ? __kasan_check_read+0x11/0x20 [ 2975.622894][T29074] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2975.629122][T29074] ? iov_iter_init+0xee/0x220 [ 2975.633786][T29074] new_sync_write+0x4d3/0x770 [ 2975.638450][T29074] ? new_sync_read+0x800/0x800 [ 2975.643212][T29074] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2975.649370][T29074] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2975.654652][T29074] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2975.660878][T29074] __vfs_write+0xe1/0x110 [ 2975.665197][T29074] vfs_write+0x268/0x5d0 [ 2975.669430][T29074] ksys_write+0x14f/0x290 [ 2975.673744][T29074] ? __ia32_sys_read+0xb0/0xb0 [ 2975.678498][T29074] ? do_syscall_64+0x26/0x760 [ 2975.683160][T29074] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2975.689219][T29074] ? do_syscall_64+0x26/0x760 [ 2975.693896][T29074] __x64_sys_write+0x73/0xb0 [ 2975.698474][T29074] do_syscall_64+0xfa/0x760 [ 2975.702966][T29074] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2975.708851][T29074] RIP: 0033:0x459f49 [ 2975.712826][T29074] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2975.732415][T29074] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2975.740827][T29074] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2975.748800][T29074] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2975.756756][T29074] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:21:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x9c030000) [ 2975.764720][T29074] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2975.772681][T29074] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 [ 2975.856309][T29083] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2975.868002][T29046] device 2251 entered promiscuous mode [ 2975.893099][T29083] device 2252 entered promiscuous mode 23:21:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) write$cgroup_subtree(r4, &(0x7f0000000340)=ANY=[@ANYBLOB="03000008e0ff00b1786b1ff6f228316b878d0765aeaadc000100"], 0x9213) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f0000000040)=0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000800d127c88cc055ffffffffffff6636d02b21acaaaaaaaaaa19000000000000aaaaaaaaaa1800"/52]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x9d310000) 23:21:50 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0xc}, 0x0) 23:21:50 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa41\x00', 0x2}) 23:21:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x29c) 23:21:50 executing program 3 (fault-call:6 fault-nth:5): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:21:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x9effffff) [ 2976.234757][T29103] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2976.306554][T29104] FAULT_INJECTION: forcing a failure. [ 2976.306554][T29104] name failslab, interval 1, probability 0, space 0, times 0 [ 2976.354254][T29104] CPU: 0 PID: 29104 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2976.362218][T29104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2976.372552][T29104] Call Trace: [ 2976.375862][T29104] dump_stack+0x172/0x1f0 [ 2976.380223][T29104] should_fail.cold+0xa/0x15 [ 2976.384848][T29104] ? fault_create_debugfs_attr+0x180/0x180 [ 2976.390685][T29104] ? ___might_sleep+0x163/0x2c0 [ 2976.390708][T29104] __should_failslab+0x121/0x190 [ 2976.390728][T29104] should_failslab+0x9/0x14 [ 2976.390742][T29104] __kmalloc+0x2e0/0x770 [ 2976.390763][T29104] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2976.390773][T29104] ? ext4_find_extent+0x76e/0x9d0 [ 2976.390788][T29104] ext4_find_extent+0x76e/0x9d0 [ 2976.390812][T29104] ? ext4_map_blocks+0xda8/0x17e0 [ 2976.390831][T29104] ext4_ext_map_blocks+0x1dc/0x3ac0 [ 2976.390854][T29104] ? ext4_ext_release+0x10/0x10 [ 2976.390872][T29104] ? lock_acquire+0x190/0x410 [ 2976.390887][T29104] ? ext4_map_blocks+0x4b3/0x17e0 23:21:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xa2010000) [ 2976.390908][T29104] ? __kasan_check_write+0x14/0x20 [ 2976.390924][T29104] ? down_write+0xdf/0x150 [ 2976.390940][T29104] ? down_write_killable+0x170/0x170 [ 2976.390956][T29104] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2976.390970][T29104] ? ext4_es_lookup_extent+0x426/0xd40 [ 2976.390987][T29104] ? __kasan_check_write+0x14/0x20 [ 2976.409589][T29104] ? up_read+0x1d2/0x810 [ 2976.409609][T29104] ext4_map_blocks+0x52b/0x17e0 [ 2976.409633][T29104] ? ext4_issue_zeroout+0x190/0x190 [ 2976.409649][T29104] ? get_user_pages_unlocked+0x3b4/0x4a0 [ 2976.409680][T29104] _ext4_get_block+0x242/0x5f0 [ 2976.409699][T29104] ? ext4_map_blocks+0x17e0/0x17e0 [ 2976.409718][T29104] ? ext4_journal_check_start+0x1ba/0x260 [ 2976.409740][T29104] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2976.420901][T29104] ? __ext4_journal_start_sb+0x146/0x4d0 [ 2976.420921][T29104] ext4_get_block_trans+0x17b/0x2b0 [ 2976.420943][T29104] ? ext4_dio_get_block_overwrite+0x140/0x140 [ 2976.420960][T29104] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2976.420975][T29104] ? iov_iter_advance+0x295/0xf70 [ 2976.420990][T29104] ? csum_and_copy_to_iter+0x1600/0x1600 [ 2976.421010][T29104] ext4_dio_get_block+0x78/0xc0 [ 2976.421029][T29104] do_blockdev_direct_IO+0x1227/0x8420 [ 2976.421054][T29104] ? ___might_sleep+0x163/0x2c0 [ 2976.421086][T29104] ? sb_init_dio_done_wq+0x80/0x80 [ 2976.421106][T29104] ? __kasan_check_read+0x11/0x20 [ 2976.421121][T29104] ? __lock_acquire+0x16f2/0x4a00 [ 2976.421157][T29104] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2976.421183][T29104] ? lock_downgrade+0x920/0x920 23:21:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xa4030000) [ 2976.421204][T29104] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2976.421221][T29104] __blockdev_direct_IO+0xa1/0xca [ 2976.421235][T29104] ? __blockdev_direct_IO+0xa1/0xca [ 2976.421248][T29104] ? bget_one+0x30/0x30 [ 2976.421267][T29104] ext4_direct_IO+0xc0d/0x1c50 [ 2976.421286][T29104] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2976.421309][T29104] generic_file_direct_write+0x20a/0x4a0 [ 2976.421330][T29104] __generic_file_write_iter+0x2ee/0x630 [ 2976.431192][T29104] ext4_file_write_iter+0x317/0x13c0 [ 2976.431216][T29104] ? ext4_release_file+0x380/0x380 [ 2976.431231][T29104] ? mark_lock+0xc2/0x1220 [ 2976.431250][T29104] ? __kasan_check_read+0x11/0x20 [ 2976.431266][T29104] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2976.431282][T29104] ? iov_iter_init+0xee/0x220 [ 2976.431299][T29104] new_sync_write+0x4d3/0x770 [ 2976.431317][T29104] ? new_sync_read+0x800/0x800 [ 2976.431348][T29104] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2976.441389][T29104] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2976.441409][T29104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2976.441427][T29104] __vfs_write+0xe1/0x110 [ 2976.441445][T29104] vfs_write+0x268/0x5d0 [ 2976.441461][T29104] ksys_write+0x14f/0x290 [ 2976.441475][T29104] ? __ia32_sys_read+0xb0/0xb0 [ 2976.441492][T29104] ? do_syscall_64+0x26/0x760 [ 2976.441510][T29104] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2976.441523][T29104] ? do_syscall_64+0x26/0x760 [ 2976.441543][T29104] __x64_sys_write+0x73/0xb0 [ 2976.441559][T29104] do_syscall_64+0xfa/0x760 [ 2976.441579][T29104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2976.441591][T29104] RIP: 0033:0x459f49 [ 2976.441606][T29104] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2976.441614][T29104] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2976.441628][T29104] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 23:21:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xaa030000) 23:21:51 executing program 3 (fault-call:6 fault-nth:6): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:21:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xac030000) [ 2976.441636][T29104] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2976.441645][T29104] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2976.441653][T29104] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2976.441660][T29104] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 [ 2976.841478][T29125] FAULT_INJECTION: forcing a failure. [ 2976.841478][T29125] name failslab, interval 1, probability 0, space 0, times 0 [ 2976.854381][T29125] CPU: 1 PID: 29125 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2976.862289][T29125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2976.872366][T29125] Call Trace: [ 2976.875686][T29125] dump_stack+0x172/0x1f0 [ 2976.880050][T29125] should_fail.cold+0xa/0x15 [ 2976.884669][T29125] ? fault_create_debugfs_attr+0x180/0x180 [ 2976.890506][T29125] ? ___might_sleep+0x163/0x2c0 [ 2976.895416][T29125] __should_failslab+0x121/0x190 [ 2976.900370][T29125] should_failslab+0x9/0x14 [ 2976.904879][T29125] kmem_cache_alloc+0x2aa/0x710 [ 2976.909751][T29125] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2976.915476][T29125] ? __mark_inode_dirty+0x3d1/0x1390 [ 2976.915497][T29125] ext4_mb_new_blocks+0x5b9/0x3900 [ 2976.915516][T29125] ? ext4_find_extent+0x76e/0x9d0 [ 2976.915541][T29125] ext4_ext_map_blocks+0x23c9/0x3ac0 [ 2976.936251][T29125] ? ext4_ext_release+0x10/0x10 [ 2976.941120][T29125] ? lock_acquire+0x190/0x410 [ 2976.945814][T29125] ? ext4_map_blocks+0x4b3/0x17e0 [ 2976.950858][T29125] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2976.950873][T29125] ? ext4_es_lookup_extent+0x426/0xd40 [ 2976.950889][T29125] ? __kasan_check_write+0x14/0x20 [ 2976.950902][T29125] ? up_read+0x1d2/0x810 [ 2976.950921][T29125] ext4_map_blocks+0x52b/0x17e0 [ 2976.950944][T29125] ? ext4_issue_zeroout+0x190/0x190 [ 2976.950960][T29125] ? get_user_pages_unlocked+0x3b4/0x4a0 [ 2976.950989][T29125] _ext4_get_block+0x242/0x5f0 [ 2976.982102][T29125] ? ext4_map_blocks+0x17e0/0x17e0 [ 2976.982123][T29125] ? ext4_journal_check_start+0x1ba/0x260 [ 2976.982143][T29125] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2976.982158][T29125] ? __ext4_journal_start_sb+0x146/0x4d0 [ 2976.982176][T29125] ext4_get_block_trans+0x17b/0x2b0 [ 2976.982197][T29125] ? ext4_dio_get_block_overwrite+0x140/0x140 [ 2976.982213][T29125] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2976.982230][T29125] ? iov_iter_advance+0x295/0xf70 [ 2976.982245][T29125] ? csum_and_copy_to_iter+0x1600/0x1600 [ 2976.982265][T29125] ext4_dio_get_block+0x78/0xc0 [ 2976.982284][T29125] do_blockdev_direct_IO+0x1227/0x8420 [ 2977.048671][T29125] ? sb_init_dio_done_wq+0x80/0x80 [ 2977.048690][T29125] ? __kasan_check_read+0x11/0x20 [ 2977.048710][T29125] ? __lock_acquire+0x16f2/0x4a00 [ 2977.069432][T29125] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2977.070162][T29133] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2977.076308][T29125] ? lock_downgrade+0x920/0x920 [ 2977.076333][T29125] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2977.076352][T29125] __blockdev_direct_IO+0xa1/0xca [ 2977.076371][T29125] ? __blockdev_direct_IO+0xa1/0xca [ 2977.090415][T29103] device 2253 entered promiscuous mode [ 2977.095802][T29125] ? bget_one+0x30/0x30 [ 2977.095824][T29125] ext4_direct_IO+0xc0d/0x1c50 [ 2977.095842][T29125] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2977.095866][T29125] generic_file_direct_write+0x20a/0x4a0 [ 2977.095886][T29125] __generic_file_write_iter+0x2ee/0x630 [ 2977.111627][T29125] ext4_file_write_iter+0x317/0x13c0 [ 2977.120523][T29125] ? ext4_release_file+0x380/0x380 [ 2977.120540][T29125] ? mark_lock+0xc2/0x1220 [ 2977.120558][T29125] ? __kasan_check_read+0x11/0x20 [ 2977.120580][T29125] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2977.120599][T29125] ? iov_iter_init+0xee/0x220 [ 2977.132696][T29125] new_sync_write+0x4d3/0x770 [ 2977.132712][T29125] ? new_sync_read+0x800/0x800 [ 2977.132739][T29125] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2977.132758][T29125] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2977.132776][T29125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2977.132796][T29125] __vfs_write+0xe1/0x110 [ 2977.143712][T29125] vfs_write+0x268/0x5d0 [ 2977.143731][T29125] ksys_write+0x14f/0x290 [ 2977.143748][T29125] ? __ia32_sys_read+0xb0/0xb0 [ 2977.143764][T29125] ? do_syscall_64+0x26/0x760 [ 2977.143784][T29125] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2977.153810][T29125] ? do_syscall_64+0x26/0x760 [ 2977.153829][T29125] __x64_sys_write+0x73/0xb0 [ 2977.153847][T29125] do_syscall_64+0xfa/0x760 [ 2977.153866][T29125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2977.153881][T29125] RIP: 0033:0x459f49 [ 2977.165111][T29125] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2977.165120][T29125] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2977.165134][T29125] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2977.165143][T29125] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2977.165151][T29125] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2977.165158][T29125] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2977.165171][T29125] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 [ 2977.340109][T29133] device 2254 entered promiscuous mode 23:21:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0xc, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000040)=ANY=[@ANYBLOB="02004800d127c88cc055ffffffffffff6636d02b21acaaaaaaaaaa2400000000008faaf2dfca2c1a2e7f0c38d336bc579600aaaaaaaa1800000030"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) socket$kcm(0x29, 0x1, 0x0) 23:21:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xb2020000) 23:21:52 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0xd}, 0x0) 23:21:52 executing program 3 (fault-call:6 fault-nth:7): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:21:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x2aa) 23:21:52 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x032\x00', 0x2}) [ 2977.636005][T29155] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2977.636097][T29150] FAULT_INJECTION: forcing a failure. [ 2977.636097][T29150] name failslab, interval 1, probability 0, space 0, times 0 [ 2977.657080][T29150] CPU: 0 PID: 29150 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2977.664990][T29150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2977.675054][T29150] Call Trace: [ 2977.678352][T29150] dump_stack+0x172/0x1f0 [ 2977.682713][T29150] should_fail.cold+0xa/0x15 [ 2977.687329][T29150] ? fault_create_debugfs_attr+0x180/0x180 [ 2977.693166][T29150] __should_failslab+0x121/0x190 [ 2977.698127][T29150] should_failslab+0x9/0x14 [ 2977.702810][T29150] kmem_cache_alloc+0x47/0x710 [ 2977.702830][T29150] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2977.702845][T29150] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 2977.702858][T29150] ? do_raw_write_lock+0x124/0x290 [ 2977.702883][T29150] __es_insert_extent+0x2cc/0xf20 [ 2977.718828][T29150] ext4_es_insert_extent+0x2d2/0xa70 [ 2977.734249][T29150] ? ext4_es_scan_clu+0xe0/0xe0 [ 2977.739135][T29150] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2977.745394][T29150] ? ext4_es_lookup_extent+0x426/0xd40 [ 2977.750868][T29150] ? __kasan_check_write+0x14/0x20 [ 2977.756167][T29150] ? up_read+0x1d2/0x810 [ 2977.760454][T29150] ext4_map_blocks+0x7ed/0x17e0 [ 2977.765319][T29150] ? ext4_issue_zeroout+0x190/0x190 [ 2977.771661][T29150] ? get_user_pages_unlocked+0x3b4/0x4a0 [ 2977.777319][T29150] _ext4_get_block+0x242/0x5f0 [ 2977.782088][T29150] ? ext4_map_blocks+0x17e0/0x17e0 [ 2977.787192][T29150] ? ext4_journal_check_start+0x1ba/0x260 [ 2977.793167][T29150] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2977.799399][T29150] ? __ext4_journal_start_sb+0x146/0x4d0 [ 2977.805052][T29150] ext4_get_block_trans+0x17b/0x2b0 [ 2977.810264][T29150] ? ext4_dio_get_block_overwrite+0x140/0x140 [ 2977.816330][T29150] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2977.822041][T29150] ? iov_iter_advance+0x295/0xf70 [ 2977.827055][T29150] ? csum_and_copy_to_iter+0x1600/0x1600 [ 2977.832685][T29150] ext4_dio_get_block+0x78/0xc0 [ 2977.837536][T29150] do_blockdev_direct_IO+0x1227/0x8420 [ 2977.842992][T29150] ? ___might_sleep+0x163/0x2c0 [ 2977.847848][T29150] ? sb_init_dio_done_wq+0x80/0x80 [ 2977.852953][T29150] ? __kasan_check_read+0x11/0x20 [ 2977.857965][T29150] ? __lock_acquire+0x16f2/0x4a00 [ 2977.863007][T29150] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2977.869505][T29150] ? lock_downgrade+0x920/0x920 [ 2977.874360][T29150] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2977.880945][T29150] __blockdev_direct_IO+0xa1/0xca [ 2977.886130][T29150] ? __blockdev_direct_IO+0xa1/0xca [ 2977.891313][T29150] ? bget_one+0x30/0x30 [ 2977.895560][T29150] ext4_direct_IO+0xc0d/0x1c50 [ 2977.900313][T29150] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2977.906809][T29150] generic_file_direct_write+0x20a/0x4a0 [ 2977.912446][T29150] __generic_file_write_iter+0x2ee/0x630 [ 2977.918073][T29150] ext4_file_write_iter+0x317/0x13c0 [ 2977.923365][T29150] ? ext4_release_file+0x380/0x380 [ 2977.928462][T29150] ? mark_lock+0xc2/0x1220 [ 2977.932871][T29150] ? __kasan_check_read+0x11/0x20 [ 2977.937884][T29150] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2977.944127][T29150] ? iov_iter_init+0xee/0x220 [ 2977.948805][T29150] new_sync_write+0x4d3/0x770 [ 2977.953485][T29150] ? new_sync_read+0x800/0x800 [ 2977.958243][T29150] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2977.964398][T29150] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2977.969673][T29150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2977.976171][T29150] __vfs_write+0xe1/0x110 [ 2977.980776][T29150] vfs_write+0x268/0x5d0 [ 2977.985019][T29150] ksys_write+0x14f/0x290 [ 2977.989345][T29150] ? __ia32_sys_read+0xb0/0xb0 [ 2977.994106][T29150] ? do_syscall_64+0x26/0x760 [ 2977.998772][T29150] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2978.004828][T29150] ? do_syscall_64+0x26/0x760 [ 2978.009508][T29150] __x64_sys_write+0x73/0xb0 [ 2978.014087][T29150] do_syscall_64+0xfa/0x760 [ 2978.018665][T29150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2978.024768][T29150] RIP: 0033:0x459f49 [ 2978.028830][T29150] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2978.049143][T29150] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2978.057817][T29150] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2978.065790][T29150] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2978.073842][T29150] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:21:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xb4030000) [ 2978.081801][T29150] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2978.089775][T29150] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 23:21:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xba000000) 23:21:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000001200)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000012c0)=[{&(0x7f0000001280)=""/63, 0x3f}], 0x1}, 0x40000200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r2, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000013c0)={0x17, 0x5, &(0x7f0000000040)=@raw=[@map={0x18, 0x5, 0x1, 0x0, r0}, @jmp={0x5, 0x1, 0x0, 0x3, 0xe, 0x8, 0x4}, @generic={0x3f, 0x3, 0xb, 0x8f91, 0x8000}, @exit], &(0x7f0000000300)='GPL\x00', 0x7, 0x6f, &(0x7f0000000340)=""/111, 0x41100, 0x6, [], r1, 0x15, r2, 0x8, &(0x7f0000001340)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000001380)={0x0, 0x5, 0x5, 0x9}, 0x10}, 0x70) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = gettid() perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x5450, 0xffffffffffffffff) r6 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x12, 0x3, 0x7, 0xf9, 0x0, 0x3, 0x400, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_bp={&(0x7f00000003c0), 0x4}, 0x140, 0x8, 0x9, 0x5, 0x100000000, 0x7, 0x4}, 0xffffffffffffffff, 0x10, r5, 0xb) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x3, 0x20, 0x3, 0x3, 0x0, 0x5, 0x80100, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x432a, 0x0, @perf_config_ext={0x4, 0x1000}, 0x12c91, 0xcaf6, 0x200, 0xe, 0x9, 0xffffffff, 0x4}, r4, 0x1, r6, 0x15) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) r7 = gettid() perf_event_open(0x0, r7, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r8 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r8, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r9, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r10, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:53 executing program 3 (fault-call:6 fault-nth:8): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:21:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xba020000) [ 2978.409955][T29177] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2978.460836][T29155] device 2255 entered promiscuous mode [ 2978.491513][T29184] FAULT_INJECTION: forcing a failure. [ 2978.491513][T29184] name failslab, interval 1, probability 0, space 0, times 0 [ 2978.509206][T29184] CPU: 0 PID: 29184 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2978.517146][T29184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2978.528084][T29184] Call Trace: [ 2978.531399][T29184] dump_stack+0x172/0x1f0 [ 2978.535753][T29184] should_fail.cold+0xa/0x15 [ 2978.540360][T29184] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2978.546108][T29184] ? fault_create_debugfs_attr+0x180/0x180 [ 2978.546124][T29184] ? __kasan_check_read+0x11/0x20 [ 2978.546153][T29184] __should_failslab+0x121/0x190 [ 2978.561900][T29184] should_failslab+0x9/0x14 [ 2978.566411][T29184] kmem_cache_alloc+0x47/0x710 [ 2978.571214][T29184] ? ___might_sleep+0x163/0x2c0 [ 2978.576085][T29184] ? mempool_alloc+0x380/0x380 [ 2978.580846][T29184] mempool_alloc_slab+0x47/0x60 [ 2978.580861][T29184] mempool_alloc+0x169/0x380 [ 2978.580882][T29184] ? mempool_destroy+0x40/0x40 [ 2978.580902][T29184] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2978.580920][T29184] ? mark_buffer_write_io_error+0x190/0x190 [ 2978.580940][T29184] bio_alloc_bioset+0x3bf/0x680 [ 2978.580958][T29184] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2978.580973][T29184] ? bvec_alloc+0x2f0/0x2f0 [ 2978.580997][T29184] do_blockdev_direct_IO+0x241e/0x8420 [ 2978.581032][T29184] ? sb_init_dio_done_wq+0x80/0x80 [ 2978.601444][T29184] ? __kasan_check_read+0x11/0x20 [ 2978.601460][T29184] ? __lock_acquire+0x16f2/0x4a00 [ 2978.601492][T29184] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2978.601514][T29184] ? lock_downgrade+0x920/0x920 [ 2978.601534][T29184] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2978.601554][T29184] __blockdev_direct_IO+0xa1/0xca [ 2978.601566][T29184] ? __blockdev_direct_IO+0xa1/0xca [ 2978.601578][T29184] ? bget_one+0x30/0x30 [ 2978.601597][T29184] ext4_direct_IO+0xc0d/0x1c50 [ 2978.643130][T29184] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2978.643156][T29184] generic_file_direct_write+0x20a/0x4a0 [ 2978.671197][T29184] __generic_file_write_iter+0x2ee/0x630 [ 2978.671216][T29184] ext4_file_write_iter+0x317/0x13c0 [ 2978.671238][T29184] ? ext4_release_file+0x380/0x380 [ 2978.671253][T29184] ? mark_lock+0xc2/0x1220 [ 2978.671274][T29184] ? __kasan_check_read+0x11/0x20 [ 2978.671291][T29184] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2978.671307][T29184] ? iov_iter_init+0xee/0x220 [ 2978.671325][T29184] new_sync_write+0x4d3/0x770 [ 2978.671341][T29184] ? new_sync_read+0x800/0x800 [ 2978.671366][T29184] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2978.671388][T29184] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2978.686789][T29184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2978.686809][T29184] __vfs_write+0xe1/0x110 [ 2978.686832][T29184] vfs_write+0x268/0x5d0 [ 2978.717888][T29184] ksys_write+0x14f/0x290 [ 2978.717907][T29184] ? __ia32_sys_read+0xb0/0xb0 [ 2978.717925][T29184] ? do_syscall_64+0x26/0x760 [ 2978.717945][T29184] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2978.749666][T29184] ? do_syscall_64+0x26/0x760 [ 2978.749689][T29184] __x64_sys_write+0x73/0xb0 [ 2978.749704][T29184] do_syscall_64+0xfa/0x760 [ 2978.749724][T29184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2978.749735][T29184] RIP: 0033:0x459f49 [ 2978.749749][T29184] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2978.749757][T29184] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2978.749771][T29184] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2978.749780][T29184] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2978.749788][T29184] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:21:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xba030000) 23:21:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xbc030000) 23:21:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xc2000000) [ 2978.749796][T29184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2978.749804][T29184] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 [ 2978.906841][T29177] device 2256 entered promiscuous mode 23:21:53 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0xe}, 0x0) 23:21:53 executing program 3 (fault-call:6 fault-nth:9): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:21:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x300) 23:21:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xc6020000) 23:21:53 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa42\x00', 0x2}) [ 2979.206054][T29205] FAULT_INJECTION: forcing a failure. [ 2979.206054][T29205] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2979.219421][T29205] CPU: 0 PID: 29205 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2979.222738][T29206] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2979.227340][T29205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2979.227349][T29205] Call Trace: [ 2979.227377][T29205] dump_stack+0x172/0x1f0 [ 2979.227399][T29205] should_fail.cold+0xa/0x15 [ 2979.227421][T29205] ? fault_create_debugfs_attr+0x180/0x180 [ 2979.227441][T29205] ? rcu_read_lock_held+0x9c/0xb0 [ 2979.227459][T29205] ? rcu_read_lock_held_common+0x130/0x130 [ 2979.227482][T29205] should_fail_alloc_page+0x50/0x60 [ 2979.280448][T29205] __alloc_pages_nodemask+0x1a1/0x900 [ 2979.285839][T29205] ? find_get_pages_range+0x871/0xc00 [ 2979.291242][T29205] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2979.296989][T29205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2979.303513][T29205] ? fault_create_debugfs_attr+0x180/0x180 [ 2979.309721][T29205] ? __kasan_check_read+0x11/0x20 [ 2979.314760][T29205] cache_grow_begin+0x90/0xd20 [ 2979.319552][T29205] ? mempool_alloc_slab+0x47/0x60 [ 2979.324586][T29205] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2979.330941][T29205] kmem_cache_alloc+0x64e/0x710 [ 2979.335821][T29205] ? mempool_alloc+0x380/0x380 [ 2979.340999][T29205] mempool_alloc_slab+0x47/0x60 [ 2979.345866][T29205] mempool_alloc+0x169/0x380 [ 2979.350566][T29205] ? mempool_destroy+0x40/0x40 [ 2979.355369][T29205] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2979.361636][T29205] ? mark_buffer_write_io_error+0x190/0x190 [ 2979.367561][T29205] bio_alloc_bioset+0x3bf/0x680 [ 2979.372553][T29205] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2979.378295][T29205] ? bvec_alloc+0x2f0/0x2f0 [ 2979.382834][T29205] do_blockdev_direct_IO+0x241e/0x8420 [ 2979.388342][T29205] ? sb_init_dio_done_wq+0x80/0x80 [ 2979.393486][T29205] ? __kasan_check_read+0x11/0x20 [ 2979.398534][T29205] ? __lock_acquire+0x16f2/0x4a00 [ 2979.403702][T29205] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2979.410236][T29205] ? lock_downgrade+0x920/0x920 [ 2979.415109][T29205] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2979.421636][T29205] __blockdev_direct_IO+0xa1/0xca [ 2979.427644][T29205] ? __blockdev_direct_IO+0xa1/0xca [ 2979.432865][T29205] ? bget_one+0x30/0x30 [ 2979.437048][T29205] ext4_direct_IO+0xc0d/0x1c50 [ 2979.441835][T29205] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2979.448370][T29205] generic_file_direct_write+0x20a/0x4a0 [ 2979.454035][T29205] __generic_file_write_iter+0x2ee/0x630 [ 2979.460065][T29205] ext4_file_write_iter+0x317/0x13c0 [ 2979.465381][T29205] ? ext4_release_file+0x380/0x380 [ 2979.470524][T29205] ? mark_lock+0xc2/0x1220 [ 2979.474974][T29205] ? __kasan_check_read+0x11/0x20 [ 2979.480040][T29205] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2979.486288][T29205] ? iov_iter_init+0xee/0x220 [ 2979.486308][T29205] new_sync_write+0x4d3/0x770 [ 2979.486325][T29205] ? new_sync_read+0x800/0x800 [ 2979.486352][T29205] ? rcu_lockdep_current_cpu_online+0xe3/0x130 23:21:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xca000000) 23:21:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="02fffe00d127c88cc055ffffffffffff6636d02b21acaaaaaaaaaa24000000000000aaaaaaaaaa0f00"/52]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2979.486374][T29205] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2979.486390][T29205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2979.486406][T29205] __vfs_write+0xe1/0x110 [ 2979.518699][T29205] vfs_write+0x268/0x5d0 [ 2979.518718][T29205] ksys_write+0x14f/0x290 [ 2979.518734][T29205] ? __ia32_sys_read+0xb0/0xb0 [ 2979.518753][T29205] ? do_syscall_64+0x26/0x760 [ 2979.518771][T29205] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2979.518784][T29205] ? do_syscall_64+0x26/0x760 [ 2979.518803][T29205] __x64_sys_write+0x73/0xb0 [ 2979.518821][T29205] do_syscall_64+0xfa/0x760 [ 2979.518841][T29205] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2979.518858][T29205] RIP: 0033:0x459f49 [ 2979.527510][T29205] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2979.527519][T29205] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 23:21:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xca010000) [ 2979.527533][T29205] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2979.527542][T29205] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2979.527550][T29205] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2979.527559][T29205] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2979.527568][T29205] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 23:21:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xca030000) [ 2979.867128][T29206] device 2257 entered promiscuous mode 23:21:54 executing program 3 (fault-call:6 fault-nth:10): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:21:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xcc010000) 23:21:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x30c) [ 2980.167059][T29243] FAULT_INJECTION: forcing a failure. [ 2980.167059][T29243] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2980.180410][T29243] CPU: 0 PID: 29243 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2980.189401][T29243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2980.199389][T29248] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2980.204721][T29243] Call Trace: [ 2980.204751][T29243] dump_stack+0x172/0x1f0 [ 2980.204772][T29243] should_fail.cold+0xa/0x15 [ 2980.204792][T29243] ? __kasan_check_read+0x11/0x20 [ 2980.234714][T29243] ? fault_create_debugfs_attr+0x180/0x180 [ 2980.241034][T29243] ? __kasan_check_read+0x11/0x20 [ 2980.246269][T29243] ? __lock_acquire+0x16f2/0x4a00 [ 2980.251339][T29243] should_fail_alloc_page+0x50/0x60 [ 2980.256567][T29243] __alloc_pages_nodemask+0x1a1/0x900 [ 2980.262242][T29243] ? ____cache_alloc_node+0x160/0x1d0 [ 2980.267721][T29243] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2980.273442][T29243] ? ____cache_alloc_node+0x160/0x1d0 [ 2980.273463][T29243] ? lock_downgrade+0x920/0x920 [ 2980.273480][T29243] cache_grow_begin+0x90/0xd20 [ 2980.273494][T29243] ? __kasan_check_read+0x11/0x20 [ 2980.273506][T29243] ? do_raw_spin_unlock+0x57/0x270 [ 2980.273524][T29243] ____cache_alloc_node+0x17a/0x1d0 [ 2980.273539][T29243] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2980.273554][T29243] kmem_cache_alloc+0x1ef/0x710 [ 2980.273576][T29243] ? mempool_alloc+0x380/0x380 [ 2980.273593][T29243] mempool_alloc_slab+0x47/0x60 [ 2980.290521][T29243] mempool_alloc+0x169/0x380 [ 2980.290542][T29243] ? mempool_destroy+0x40/0x40 [ 2980.290563][T29243] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2980.290580][T29243] ? mark_buffer_write_io_error+0x190/0x190 [ 2980.290602][T29243] bio_alloc_bioset+0x3bf/0x680 [ 2980.290619][T29243] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2980.290632][T29243] ? bvec_alloc+0x2f0/0x2f0 [ 2980.290653][T29243] do_blockdev_direct_IO+0x241e/0x8420 [ 2980.290699][T29243] ? sb_init_dio_done_wq+0x80/0x80 [ 2980.328461][T29243] ? __kasan_check_read+0x11/0x20 [ 2980.346132][T29243] ? __lock_acquire+0x16f2/0x4a00 [ 2980.346170][T29243] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2980.362738][T29243] ? lock_downgrade+0x920/0x920 [ 2980.362762][T29243] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2980.406695][T29243] __blockdev_direct_IO+0xa1/0xca [ 2980.411753][T29243] ? __blockdev_direct_IO+0xa1/0xca 23:21:55 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x10}, 0x0) 23:21:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xcc020000) 23:21:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = socket$kcm(0x2, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x76, &(0x7f0000000ac0)=r1, 0x8) openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r2, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r3}, 0xc) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r3, 0xc00000}, 0xc) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r4, 0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000140)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) recvmsg$kcm(r8, &(0x7f00000077c0)={&(0x7f0000006700)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000006780)=""/4096, 0x1000}], 0x1}, 0x200080c2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037, 0x20, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r9, r7}, 0x3c) r10 = socket$kcm(0x10, 0x2, 0x10) recvmsg$kcm(r10, &(0x7f00000111c0)={&(0x7f0000010e80)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000011100)=[{&(0x7f0000010f00)=""/161, 0xa1}, {&(0x7f0000010fc0)=""/146, 0x92}, {&(0x7f0000011080)=""/109, 0x6d}], 0x3, &(0x7f0000011140)=""/80, 0x50}, 0x40000020) sendmsg$inet(0xffffffffffffffff, &(0x7f0000011280)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000440)="4b22644ff61426fd76ef0907be751858bac960e3605ab009ece900f7a35747902b42bd5a9fd7be312fd9758e25940bfb6935cbafbee2baa6a5cbae0162e0c12d0cc1fb0883a8a47afe75352eb50d83a5bc3c590b54fbf88a7fd700f5f73554930e45ff65a2615971d842df0a89cbffaf616fd2f06b906a1329cc7768e7ef1a3a5263cfb14a9f7c4ef0bd033ea3dc351fb166d1752ee18eae2ded9c87b987bcc540fad3e009a82a2ce790251e32ddf78061f1bd56b383fdc020c62e669664b5fd438c3bc8df7effef65257ec805abeccbd9e6f9ba49f88daf7bbf63e225b0e3809846bde8e0b5a1852e36cb3e7362fb57d0585a3ab1", 0xf5}, {&(0x7f0000000540)="938f2e54118851a9ae1e1f28d19c918d009e38ba2c00bf773f951324e7874e499939c7c133a12d26803d32b4d44fb4b608d7574140d7a955c9a34ba369a8d5fcca1600a48189be7f14abc2334bef2231058ef5dcf9747ee6313d503c966e72b75853545b7594c5ac2f8d216f401a758022c25d1d2f775377bc6a84722cf123f3cf8888b282394da1cd0bb8a0985130a892b4a93ccf5ab4c720ebbce31e9755e048dbb336213cf9c3cb853701e1db3500d2d155852833b63702006d150e555f83d16c1d8a06bbf12a32700f8a9e2116d8908c0035dc1b68a33f", 0xd9}], 0x2, &(0x7f0000011200)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @remote, @loopback}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @multicast1, @dev={0xac, 0x14, 0x14, 0xe}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x70}, 0x1) r12 = gettid() perf_event_open(0x0, r12, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r13 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r13, 0x84, 0x76, &(0x7f0000000ac0), 0x8) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x9, 0x40, 0x1a, 0x80, 0x0, 0x24, 0xffa55951614ee000, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, @perf_config_ext={0x7, 0x101}, 0x10, 0x3ff, 0x4, 0x8, 0x9, 0x5, 0x1}, r12, 0x6, 0xffffffffffffffff, 0x4) r14 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r14, 0x400454d1, &(0x7f0000000700)=ANY=[@ANYBLOB="0200018000007f0000000033bbb330d7528ccdf8fd37d1154da7c9e9ffffffffff6636d42bd5b2243c21acaaaaaaaaaa24000000000000aaaaaaaaaac360a0b91eec58f0004e1dcc00ae9e5ad383675cbb4b0e3283cb50a868431f4c04dc272f4adf1b628466b53b40e9cee33ba36460947d1b05e5c9cb9019701e869d1d82ca34eca1c343de70782f43cdee43f48507e9bed49c19163c345ce3a094b6d2970a97e95b8434611d8b4519ac10cab92927c31e"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r15, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae5666da0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2980.417083][T29243] ? bget_one+0x30/0x30 [ 2980.417101][T29243] ext4_direct_IO+0xc0d/0x1c50 [ 2980.417120][T29243] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2980.417145][T29243] generic_file_direct_write+0x20a/0x4a0 [ 2980.417166][T29243] __generic_file_write_iter+0x2ee/0x630 [ 2980.417189][T29243] ext4_file_write_iter+0x317/0x13c0 [ 2980.447866][T29243] ? ext4_release_file+0x380/0x380 [ 2980.459039][T29243] ? mark_lock+0xc2/0x1220 [ 2980.463565][T29243] ? __kasan_check_read+0x11/0x20 [ 2980.468610][T29243] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2980.475261][T29243] ? iov_iter_init+0xee/0x220 [ 2980.475278][T29243] new_sync_write+0x4d3/0x770 [ 2980.475293][T29243] ? new_sync_read+0x800/0x800 [ 2980.475317][T29243] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2980.475338][T29243] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2980.475356][T29243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2980.475374][T29243] __vfs_write+0xe1/0x110 [ 2980.475390][T29243] vfs_write+0x268/0x5d0 [ 2980.475412][T29243] ksys_write+0x14f/0x290 [ 2980.475427][T29243] ? __ia32_sys_read+0xb0/0xb0 [ 2980.475445][T29243] ? do_syscall_64+0x26/0x760 [ 2980.475461][T29243] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2980.475472][T29243] ? do_syscall_64+0x26/0x760 [ 2980.475488][T29243] __x64_sys_write+0x73/0xb0 [ 2980.475502][T29243] do_syscall_64+0xfa/0x760 [ 2980.475518][T29243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2980.475530][T29243] RIP: 0033:0x459f49 [ 2980.475543][T29243] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2980.475550][T29243] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2980.475563][T29243] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2980.475570][T29243] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 23:21:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xcc030000) [ 2980.475578][T29243] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2980.475589][T29243] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2980.475596][T29243] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 [ 2980.684071][T29248] device 2258 entered promiscuous mode [ 2980.721389][T29248] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:55 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa43\x00', 0x2}) 23:21:55 executing program 3 (fault-call:6 fault-nth:11): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:21:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xd2010000) [ 2980.814637][T29248] device 2259 entered promiscuous mode [ 2980.829117][T29268] FAULT_INJECTION: forcing a failure. [ 2980.829117][T29268] name failslab, interval 1, probability 0, space 0, times 0 [ 2980.896054][T29268] CPU: 1 PID: 29268 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2980.904008][T29268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2980.914080][T29268] Call Trace: [ 2980.917398][T29268] dump_stack+0x172/0x1f0 [ 2980.921756][T29268] should_fail.cold+0xa/0x15 [ 2980.926478][T29268] ? fault_create_debugfs_attr+0x180/0x180 [ 2980.933741][T29268] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2980.940665][T29268] __should_failslab+0x121/0x190 [ 2980.945704][T29268] should_failslab+0x9/0x14 [ 2980.950227][T29268] kmem_cache_alloc+0x47/0x710 [ 2980.955043][T29268] ? ___might_sleep+0x163/0x2c0 [ 2980.959920][T29268] ? mempool_alloc+0x380/0x380 [ 2980.964717][T29268] mempool_alloc_slab+0x47/0x60 [ 2980.969587][T29268] mempool_alloc+0x169/0x380 [ 2980.974333][T29268] ? mempool_destroy+0x40/0x40 [ 2980.979122][T29268] ? mempool_destroy+0x40/0x40 [ 2980.983927][T29268] bvec_alloc+0xdd/0x2f0 [ 2980.988204][T29268] bio_alloc_bioset+0x46e/0x680 23:21:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xd2020000) [ 2980.993606][T29268] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2980.999352][T29268] ? bvec_alloc+0x2f0/0x2f0 [ 2981.004251][T29268] do_blockdev_direct_IO+0x241e/0x8420 [ 2981.009783][T29268] ? sb_init_dio_done_wq+0x80/0x80 [ 2981.014910][T29268] ? __kasan_check_read+0x11/0x20 [ 2981.019929][T29268] ? __lock_acquire+0x16f2/0x4a00 [ 2981.024957][T29268] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2981.031539][T29268] ? lock_downgrade+0x920/0x920 [ 2981.036421][T29268] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2981.042987][T29268] __blockdev_direct_IO+0xa1/0xca [ 2981.048062][T29268] ? __blockdev_direct_IO+0xa1/0xca [ 2981.053268][T29268] ? bget_one+0x30/0x30 [ 2981.057438][T29268] ext4_direct_IO+0xc0d/0x1c50 [ 2981.062237][T29268] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2981.068752][T29268] generic_file_direct_write+0x20a/0x4a0 [ 2981.074396][T29268] __generic_file_write_iter+0x2ee/0x630 [ 2981.080038][T29268] ext4_file_write_iter+0x317/0x13c0 [ 2981.085343][T29268] ? ext4_release_file+0x380/0x380 [ 2981.090452][T29268] ? mark_lock+0xc2/0x1220 [ 2981.094961][T29268] ? __kasan_check_read+0x11/0x20 [ 2981.099981][T29268] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2981.106327][T29268] ? iov_iter_init+0xee/0x220 [ 2981.111006][T29268] new_sync_write+0x4d3/0x770 [ 2981.115677][T29268] ? new_sync_read+0x800/0x800 [ 2981.120449][T29268] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2981.126599][T29268] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2981.131880][T29268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2981.138113][T29268] __vfs_write+0xe1/0x110 [ 2981.142451][T29268] vfs_write+0x268/0x5d0 [ 2981.146710][T29268] ksys_write+0x14f/0x290 [ 2981.151028][T29268] ? __ia32_sys_read+0xb0/0xb0 [ 2981.155795][T29268] ? do_syscall_64+0x26/0x760 [ 2981.160470][T29268] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2981.166607][T29268] ? do_syscall_64+0x26/0x760 [ 2981.171288][T29268] __x64_sys_write+0x73/0xb0 [ 2981.175873][T29268] do_syscall_64+0xfa/0x760 [ 2981.180371][T29268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2981.186248][T29268] RIP: 0033:0x459f49 [ 2981.190173][T29268] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2981.209778][T29268] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2981.218208][T29268] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2981.226203][T29268] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2981.234190][T29268] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:21:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x32c) 23:21:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xd2030000) [ 2981.242150][T29268] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2981.250108][T29268] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 23:21:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xd4030000) 23:21:56 executing program 3 (fault-call:6 fault-nth:12): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2981.406749][T29289] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:21:56 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x60}, 0x0) 23:21:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = gettid() recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)=""/164, 0xa4}, {&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000000440)=""/76, 0x4c}], 0x3, &(0x7f00000005c0)=""/194, 0xc2}, 0x2) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r3 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2981.601346][T29298] FAULT_INJECTION: forcing a failure. [ 2981.601346][T29298] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2981.614643][T29298] CPU: 1 PID: 29298 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2981.622715][T29298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2981.633316][T29298] Call Trace: [ 2981.636631][T29298] dump_stack+0x172/0x1f0 [ 2981.641167][T29298] should_fail.cold+0xa/0x15 [ 2981.645893][T29298] ? fault_create_debugfs_attr+0x180/0x180 [ 2981.651861][T29298] ? mempool_alloc+0x169/0x380 [ 2981.656819][T29298] ? bio_alloc_bioset+0x3bf/0x680 [ 2981.661869][T29298] ? do_blockdev_direct_IO+0x241e/0x8420 [ 2981.667515][T29298] ? __blockdev_direct_IO+0xa1/0xca [ 2981.672729][T29298] ? ext4_direct_IO+0xc0d/0x1c50 [ 2981.677684][T29298] ? generic_file_direct_write+0x20a/0x4a0 [ 2981.683536][T29298] ? __generic_file_write_iter+0x2ee/0x630 [ 2981.690319][T29298] ? ext4_file_write_iter+0x317/0x13c0 [ 2981.695836][T29298] should_fail_alloc_page+0x50/0x60 [ 2981.701834][T29298] __alloc_pages_nodemask+0x1a1/0x900 [ 2981.701849][T29298] ? lock_downgrade+0x920/0x920 [ 2981.701863][T29298] ? rwlock_bug.part.0+0x90/0x90 [ 2981.701880][T29298] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2981.701905][T29298] ? fault_create_debugfs_attr+0x180/0x180 [ 2981.701923][T29298] cache_grow_begin+0x90/0xd20 [ 2981.701938][T29298] ? mempool_alloc_slab+0x47/0x60 [ 2981.701961][T29298] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2981.729956][T29298] kmem_cache_alloc+0x64e/0x710 [ 2981.729982][T29298] ? mempool_alloc+0x380/0x380 [ 2981.729994][T29298] mempool_alloc_slab+0x47/0x60 [ 2981.730008][T29298] mempool_alloc+0x169/0x380 [ 2981.730026][T29298] ? mempool_destroy+0x40/0x40 [ 2981.730042][T29298] ? mempool_destroy+0x40/0x40 [ 2981.730068][T29298] bvec_alloc+0xdd/0x2f0 [ 2981.730087][T29298] bio_alloc_bioset+0x46e/0x680 [ 2981.739870][T29298] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2981.739888][T29298] ? bvec_alloc+0x2f0/0x2f0 [ 2981.739916][T29298] do_blockdev_direct_IO+0x241e/0x8420 [ 2981.739960][T29298] ? sb_init_dio_done_wq+0x80/0x80 [ 2981.739979][T29298] ? __kasan_check_read+0x11/0x20 [ 2981.739998][T29298] ? __lock_acquire+0x16f2/0x4a00 [ 2981.751291][T29298] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2981.751318][T29298] ? lock_downgrade+0x920/0x920 [ 2981.751337][T29298] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2981.751356][T29298] __blockdev_direct_IO+0xa1/0xca [ 2981.751370][T29298] ? __blockdev_direct_IO+0xa1/0xca [ 2981.751387][T29298] ? bget_one+0x30/0x30 23:21:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xda000000) [ 2981.761078][T29298] ext4_direct_IO+0xc0d/0x1c50 [ 2981.761098][T29298] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2981.761123][T29298] generic_file_direct_write+0x20a/0x4a0 [ 2981.761146][T29298] __generic_file_write_iter+0x2ee/0x630 [ 2981.761167][T29298] ext4_file_write_iter+0x317/0x13c0 [ 2981.761193][T29298] ? ext4_release_file+0x380/0x380 [ 2981.761212][T29298] ? mark_lock+0xc2/0x1220 [ 2981.770817][T29298] ? __kasan_check_read+0x11/0x20 [ 2981.770835][T29298] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2981.770851][T29298] ? iov_iter_init+0xee/0x220 [ 2981.770870][T29298] new_sync_write+0x4d3/0x770 [ 2981.770887][T29298] ? new_sync_read+0x800/0x800 [ 2981.770914][T29298] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2981.770944][T29298] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2981.780027][T29298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2981.780048][T29298] __vfs_write+0xe1/0x110 [ 2981.780065][T29298] vfs_write+0x268/0x5d0 [ 2981.780082][T29298] ksys_write+0x14f/0x290 [ 2981.780098][T29298] ? __ia32_sys_read+0xb0/0xb0 [ 2981.780121][T29298] ? do_syscall_64+0x26/0x760 [ 2981.795191][T29298] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2981.795210][T29298] ? do_syscall_64+0x26/0x760 [ 2981.795232][T29298] __x64_sys_write+0x73/0xb0 [ 2981.795249][T29298] do_syscall_64+0xfa/0x760 [ 2981.795269][T29298] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2981.806076][T29298] RIP: 0033:0x459f49 23:21:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xda020000) [ 2981.806096][T29298] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2981.817624][T29298] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2981.817638][T29298] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2981.817646][T29298] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2981.817653][T29298] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2981.817662][T29298] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2981.817669][T29298] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 [ 2982.174885][T29289] device 2260 entered promiscuous mode [ 2982.199796][T29321] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2982.255120][T29321] device 2261 entered promiscuous mode 23:21:57 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x004\x00', 0x2}) 23:21:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0xfffffeac) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) write$cgroup_subtree(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="b5697e4a7a007886dd20bfa67289fb114d679068e6fef0231f446f116bbb395d53eb866f68ae7786b4702e2e7706e2a090e92da24745aded733e437f1daf78b53d3f7f1975bb74be8d08cfe40cde6c3e0f1e0da1c85b733dff92171bf0"], 0x9213) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000002c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = gettid() perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000440), 0x1f}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r3, 0x3) r4 = openat$cgroup_ro(r3, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x5450, 0xffffffffffffffff) r5 = socket$kcm(0x2, 0x7, 0x84) setsockopt$sock_attach_bpf(r5, 0x84, 0x76, &(0x7f0000000ac0), 0x8) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f00000003c0)) r6 = gettid() write$cgroup_pid(r3, &(0x7f0000000380)=r6, 0x12) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r7, 0x400454d1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:21:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xda030000) 23:21:57 executing program 3 (fault-call:6 fault-nth:13): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:21:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x33c) [ 2982.406934][T29326] FAULT_INJECTION: forcing a failure. [ 2982.406934][T29326] name failslab, interval 1, probability 0, space 0, times 0 [ 2982.420569][T29332] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2982.466686][T29326] CPU: 0 PID: 29326 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2982.474727][T29326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2982.484791][T29326] Call Trace: [ 2982.484826][T29326] dump_stack+0x172/0x1f0 [ 2982.484845][T29326] should_fail.cold+0xa/0x15 [ 2982.484862][T29326] ? fault_create_debugfs_attr+0x180/0x180 [ 2982.484874][T29326] ? __kasan_check_read+0x11/0x20 [ 2982.484895][T29326] __should_failslab+0x121/0x190 [ 2982.484912][T29326] should_failslab+0x9/0x14 [ 2982.484924][T29326] kmem_cache_alloc+0x47/0x710 [ 2982.484942][T29326] ? ___might_sleep+0x163/0x2c0 [ 2982.484960][T29326] ? mempool_alloc+0x380/0x380 [ 2982.484973][T29326] mempool_alloc_slab+0x47/0x60 [ 2982.484986][T29326] mempool_alloc+0x169/0x380 [ 2982.485002][T29326] ? mempool_destroy+0x40/0x40 [ 2982.485024][T29326] ? __kasan_check_read+0x11/0x20 [ 2982.508122][T29326] ? __lock_acquire+0x16f2/0x4a00 [ 2982.522652][T29326] ? save_stack+0x5c/0x90 [ 2982.522665][T29326] ? save_stack+0x23/0x90 [ 2982.522685][T29326] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2982.522695][T29326] ? kasan_slab_alloc+0xf/0x20 [ 2982.522716][T29326] bio_alloc_bioset+0x3bf/0x680 [ 2982.546670][T29326] ? __kasan_check_read+0x11/0x20 [ 2982.546686][T29326] ? mark_lock+0xc2/0x1220 [ 2982.546703][T29326] ? bvec_alloc+0x2f0/0x2f0 [ 2982.546714][T29326] ? __kasan_check_read+0x11/0x20 [ 2982.546725][T29326] ? mark_lock+0xc2/0x1220 [ 2982.546744][T29326] bio_clone_fast+0x26/0x110 [ 2982.600978][T29326] bio_split+0x86/0x260 [ 2982.601000][T29326] __blk_queue_split+0x8dd/0x1560 [ 2982.601022][T29326] ? blk_rq_map_sg+0x1b10/0x1b10 [ 2982.601044][T29326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2982.601063][T29326] blk_mq_make_request+0x17d/0x2280 [ 2982.601076][T29326] ? blk_queue_enter+0xbb3/0xe50 [ 2982.601092][T29326] ? blk_mq_try_issue_directly+0x1c0/0x1c0 [ 2982.601106][T29326] ? generic_make_request_checks+0x845/0x2210 [ 2982.601120][T29326] ? down_read_non_owner+0x490/0x490 [ 2982.601158][T29326] ? __kasan_check_read+0x11/0x20 [ 2982.619398][T29326] generic_make_request+0x23c/0xb50 [ 2982.619417][T29326] ? __lock_acquire+0x16f2/0x4a00 [ 2982.619430][T29326] ? blk_queue_enter+0xe50/0xe50 [ 2982.619443][T29326] ? get_user_pages_fast+0x275/0x570 [ 2982.619461][T29326] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2982.619481][T29326] submit_bio+0x113/0x600 [ 2982.630637][T29326] ? submit_bio+0x113/0x600 [ 2982.630656][T29326] ? generic_make_request+0xb50/0xb50 [ 2982.630675][T29326] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2982.630688][T29326] ? do_blockdev_direct_IO+0x1a98/0x8420 23:21:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xdc000000) [ 2982.630702][T29326] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2982.630717][T29326] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2982.630731][T29326] ? trace_hardirqs_on+0x67/0x240 [ 2982.630744][T29326] ? __kasan_check_read+0x11/0x20 [ 2982.630764][T29326] do_blockdev_direct_IO+0x6a0d/0x8420 [ 2982.630810][T29326] ? sb_init_dio_done_wq+0x80/0x80 [ 2982.630827][T29326] ? __kasan_check_read+0x11/0x20 [ 2982.630841][T29326] ? __lock_acquire+0x16f2/0x4a00 [ 2982.630876][T29326] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2982.646792][T29326] ? lock_downgrade+0x920/0x920 [ 2982.646816][T29326] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2982.646834][T29326] __blockdev_direct_IO+0xa1/0xca [ 2982.646846][T29326] ? __blockdev_direct_IO+0xa1/0xca [ 2982.646859][T29326] ? bget_one+0x30/0x30 [ 2982.646876][T29326] ext4_direct_IO+0xc0d/0x1c50 [ 2982.646894][T29326] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2982.646916][T29326] generic_file_direct_write+0x20a/0x4a0 [ 2982.646936][T29326] __generic_file_write_iter+0x2ee/0x630 [ 2982.658267][T29326] ext4_file_write_iter+0x317/0x13c0 [ 2982.678422][T29326] ? ext4_release_file+0x380/0x380 [ 2982.678439][T29326] ? mark_lock+0xc2/0x1220 [ 2982.678463][T29326] ? __kasan_check_read+0x11/0x20 [ 2982.709332][T29326] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2982.709350][T29326] ? iov_iter_init+0xee/0x220 [ 2982.709370][T29326] new_sync_write+0x4d3/0x770 [ 2982.709385][T29326] ? new_sync_read+0x800/0x800 [ 2982.709409][T29326] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2982.709429][T29326] ? rcu_read_lock_bh_held+0xb0/0xb0 23:21:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xdc030000) [ 2982.709443][T29326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2982.709459][T29326] __vfs_write+0xe1/0x110 [ 2982.709476][T29326] vfs_write+0x268/0x5d0 [ 2982.709493][T29326] ksys_write+0x14f/0x290 [ 2982.709507][T29326] ? __ia32_sys_read+0xb0/0xb0 [ 2982.709527][T29326] ? do_syscall_64+0x26/0x760 [ 2982.741695][T29326] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2982.741713][T29326] ? do_syscall_64+0x26/0x760 [ 2982.741736][T29326] __x64_sys_write+0x73/0xb0 [ 2982.741753][T29326] do_syscall_64+0xfa/0x760 [ 2982.741774][T29326] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2982.741784][T29326] RIP: 0033:0x459f49 [ 2982.741798][T29326] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2982.741805][T29326] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2982.741818][T29326] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2982.741825][T29326] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2982.741833][T29326] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2982.741841][T29326] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2982.741849][T29326] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 23:21:57 executing program 3 (fault-call:6 fault-nth:14): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2983.157080][T29353] FAULT_INJECTION: forcing a failure. [ 2983.157080][T29353] name failslab, interval 1, probability 0, space 0, times 0 [ 2983.175822][T29353] CPU: 1 PID: 29353 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2983.183769][T29353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2983.191936][T29332] device 2262 entered promiscuous mode [ 2983.193851][T29353] Call Trace: [ 2983.193875][T29353] dump_stack+0x172/0x1f0 [ 2983.193899][T29353] should_fail.cold+0xa/0x15 [ 2983.193919][T29353] ? fault_create_debugfs_attr+0x180/0x180 [ 2983.193939][T29353] ? generic_make_request_checks+0x761/0x2210 [ 2983.202751][T29353] __should_failslab+0x121/0x190 [ 2983.202771][T29353] should_failslab+0x9/0x14 [ 2983.202785][T29353] kmem_cache_alloc_node+0x56/0x740 [ 2983.202802][T29353] ? lock_downgrade+0x920/0x920 [ 2983.202827][T29353] create_task_io_context+0x33/0x450 [ 2983.211712][T29353] generic_make_request_checks+0x1b88/0x2210 [ 2983.211727][T29353] ? down_read_non_owner+0x490/0x490 [ 2983.211752][T29353] ? trace_event_raw_event_block_rq_requeue+0x640/0x640 [ 2983.211767][T29353] ? get_user_pages_unlocked+0x3b4/0x4a0 [ 2983.211784][T29353] ? __kasan_check_read+0x11/0x20 [ 2983.211807][T29353] generic_make_request+0x8f/0xb50 [ 2983.223652][T29353] ? __lock_acquire+0x16f2/0x4a00 [ 2983.223671][T29353] ? blk_queue_enter+0xe50/0xe50 [ 2983.223686][T29353] ? get_user_pages_fast+0x275/0x570 [ 2983.223711][T29353] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2983.272230][T29353] submit_bio+0x113/0x600 [ 2983.282336][T29353] ? submit_bio+0x113/0x600 [ 2983.282352][T29353] ? generic_make_request+0xb50/0xb50 [ 2983.282368][T29353] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2983.282382][T29353] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2983.282395][T29353] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2983.282415][T29353] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2983.317412][T29353] ? trace_hardirqs_on+0x67/0x240 [ 2983.317428][T29353] ? __kasan_check_read+0x11/0x20 [ 2983.317450][T29353] do_blockdev_direct_IO+0x6a0d/0x8420 [ 2983.317485][T29353] ? sb_init_dio_done_wq+0x80/0x80 [ 2983.335162][T29353] ? __kasan_check_read+0x11/0x20 [ 2983.335179][T29353] ? __lock_acquire+0x16f2/0x4a00 [ 2983.335218][T29353] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2983.379120][T29353] ? lock_downgrade+0x920/0x920 [ 2983.383992][T29353] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2983.390521][T29353] __blockdev_direct_IO+0xa1/0xca [ 2983.395566][T29353] ? __blockdev_direct_IO+0xa1/0xca 23:21:58 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x300}, 0x0) 23:21:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xe2020000) 23:21:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x352) [ 2983.398101][T29362] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2983.400775][T29353] ? bget_one+0x30/0x30 [ 2983.400796][T29353] ext4_direct_IO+0xc0d/0x1c50 [ 2983.400814][T29353] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2983.400840][T29353] generic_file_direct_write+0x20a/0x4a0 [ 2983.400863][T29353] __generic_file_write_iter+0x2ee/0x630 [ 2983.400884][T29353] ext4_file_write_iter+0x317/0x13c0 [ 2983.400906][T29353] ? ext4_release_file+0x380/0x380 [ 2983.400921][T29353] ? mark_lock+0xc2/0x1220 [ 2983.400944][T29353] ? __kasan_check_read+0x11/0x20 [ 2983.455466][T29353] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2983.461708][T29353] ? iov_iter_init+0xee/0x220 [ 2983.466387][T29353] new_sync_write+0x4d3/0x770 [ 2983.471118][T29353] ? new_sync_read+0x800/0x800 [ 2983.475875][T29353] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2983.482043][T29353] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2983.487358][T29353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2983.493633][T29353] __vfs_write+0xe1/0x110 [ 2983.497980][T29353] vfs_write+0x268/0x5d0 [ 2983.502324][T29353] ksys_write+0x14f/0x290 23:21:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xe2030000) [ 2983.506851][T29353] ? __ia32_sys_read+0xb0/0xb0 [ 2983.512663][T29353] ? do_syscall_64+0x26/0x760 [ 2983.517358][T29353] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2983.523437][T29353] ? do_syscall_64+0x26/0x760 [ 2983.528133][T29353] __x64_sys_write+0x73/0xb0 [ 2983.532752][T29353] do_syscall_64+0xfa/0x760 [ 2983.537372][T29353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2983.543267][T29353] RIP: 0033:0x459f49 [ 2983.547157][T29353] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2983.567033][T29353] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2983.575775][T29353] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2983.586216][T29353] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2983.594755][T29353] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2983.603442][T29353] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2983.612308][T29353] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 [ 2983.905390][T29362] device 2263 entered promiscuous mode 23:21:58 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa44\x00', 0x2}) 23:21:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xe4020000) 23:21:58 executing program 3 (fault-call:6 fault-nth:15): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:21:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x35a) 23:21:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, r2) r3 = socket$kcm(0x2, 0x5, 0x84) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_sys\x00', 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000440)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000014c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51f1c3207f3e47f3, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, @perf_bp={&(0x7f0000000400), 0xc}, 0x24800, 0x5, 0x0, 0x0, 0x0, 0x64, 0x667a}, r5, 0xd, 0xffffffffffffffff, 0xd) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x5450, 0xffffffffffffffff) r7 = perf_event_open$cgroup(&(0x7f0000000540)={0x4, 0x70, 0xbf, 0x2, 0x1, 0x1f, 0x0, 0x2, 0x3800, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000380), 0x5}, 0x24040, 0x0, 0x1, 0x2, 0x4, 0xffffffc0, 0x9}, r5, 0xb, r6, 0x4) perf_event_open$cgroup(&(0x7f00000005c0)={0x1, 0x70, 0x6, 0x1f, 0x90, 0x6, 0x0, 0x3, 0x10000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x430, 0x2, @perf_bp={&(0x7f0000000040)}, 0x140, 0x200, 0x9, 0x6, 0xfffffffffffffe06, 0x8d, 0x7ff}, r4, 0x9, r7, 0x2) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r8 = openat$cgroup(0xffffffffffffffff, &(0x7f00000009c0)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r8, &(0x7f0000000a00)='syz1\x00', 0x1ff) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r9, 0x400454d1, &(0x7f0000000440)=ANY=[@ANYBLOB="820adea13c02000800d181dcd4f4fd72539414cb1627c88cc00600ffffffffff6636d02b21acab0700000000000000575e3fdae8f22cd0180000000000000000000000e65bb8a219a5786f6a0580254aa91ca6b22649ad5d44bf4e444bed10e7c6835c90c795d070b0c8629afa6f7708391d0d1d81412018fae2f6a2f01d11a5f9a8d6f17196f465153734d6a4b1cdb9454fabe2e6b0293fe8147a3a6963bc3db76c53bb4e16c626c6db22f6258baabd22244b7f8a0bea6f8a87ea3fce1b0fb5cfaa20491ad4a69448e0a2a43df4f86b7e00905b7c9d7e14e74b775e249b5f2f3ffe38e178b8d69ccac43926bcb83c"]) ioctl$TUNSETFILTEREBPF(r9, 0x800454e1, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r10, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2984.085045][T29386] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2984.104374][T29384] FAULT_INJECTION: forcing a failure. [ 2984.104374][T29384] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2984.117637][T29384] CPU: 0 PID: 29384 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2984.125538][T29384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2984.136392][T29384] Call Trace: [ 2984.139707][T29384] dump_stack+0x172/0x1f0 [ 2984.144057][T29384] should_fail.cold+0xa/0x15 [ 2984.148665][T29384] ? __kasan_check_read+0x11/0x20 [ 2984.153745][T29384] ? fault_create_debugfs_attr+0x180/0x180 [ 2984.159577][T29384] ? __kasan_check_read+0x11/0x20 [ 2984.164623][T29384] ? __lock_acquire+0x16f2/0x4a00 [ 2984.169686][T29384] should_fail_alloc_page+0x50/0x60 [ 2984.169702][T29384] __alloc_pages_nodemask+0x1a1/0x900 [ 2984.169717][T29384] ? ____cache_alloc_node+0x160/0x1d0 [ 2984.169734][T29384] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2984.169746][T29384] ? ____cache_alloc_node+0x160/0x1d0 [ 2984.169766][T29384] ? lock_downgrade+0x920/0x920 [ 2984.169782][T29384] cache_grow_begin+0x90/0xd20 [ 2984.169795][T29384] ? __kasan_check_read+0x11/0x20 [ 2984.169807][T29384] ? do_raw_spin_unlock+0x57/0x270 [ 2984.169823][T29384] ____cache_alloc_node+0x17a/0x1d0 [ 2984.169840][T29384] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2984.169855][T29384] kmem_cache_alloc+0x1ef/0x710 [ 2984.169873][T29384] ? mempool_alloc+0x380/0x380 [ 2984.169891][T29384] mempool_alloc_slab+0x47/0x60 [ 2984.185823][T29384] mempool_alloc+0x169/0x380 [ 2984.202238][T29384] ? mempool_destroy+0x40/0x40 [ 2984.202258][T29384] ? __kasan_check_read+0x11/0x20 [ 2984.202274][T29384] ? __lock_acquire+0x16f2/0x4a00 [ 2984.202289][T29384] ? save_stack+0x5c/0x90 [ 2984.202300][T29384] ? save_stack+0x23/0x90 [ 2984.202311][T29384] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2984.202321][T29384] ? kasan_slab_alloc+0xf/0x20 [ 2984.202343][T29384] bio_alloc_bioset+0x3bf/0x680 [ 2984.212178][T29384] ? bvec_alloc+0x2f0/0x2f0 [ 2984.212194][T29384] ? __kasan_check_read+0x11/0x20 [ 2984.212209][T29384] ? mark_lock+0xc2/0x1220 [ 2984.212231][T29384] bio_clone_fast+0x26/0x110 [ 2984.212245][T29384] bio_split+0x86/0x260 [ 2984.212262][T29384] __blk_queue_split+0x8dd/0x1560 [ 2984.212285][T29384] ? blk_rq_map_sg+0x1b10/0x1b10 [ 2984.212306][T29384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 23:21:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xe4030000) 23:21:59 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x500}, 0x0) [ 2984.212328][T29384] blk_mq_make_request+0x17d/0x2280 [ 2984.212342][T29384] ? blk_queue_enter+0xbb3/0xe50 [ 2984.212360][T29384] ? blk_mq_try_issue_directly+0x1c0/0x1c0 [ 2984.239859][T29384] ? generic_make_request_checks+0x845/0x2210 [ 2984.239876][T29384] ? down_read_non_owner+0x490/0x490 [ 2984.239908][T29384] ? __kasan_check_read+0x11/0x20 [ 2984.239929][T29384] generic_make_request+0x23c/0xb50 [ 2984.239945][T29384] ? __lock_acquire+0x16f2/0x4a00 [ 2984.239959][T29384] ? blk_queue_enter+0xe50/0xe50 [ 2984.239971][T29384] ? get_user_pages_fast+0x275/0x570 [ 2984.239989][T29384] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2984.240007][T29384] submit_bio+0x113/0x600 [ 2984.260750][T29384] ? submit_bio+0x113/0x600 [ 2984.260769][T29384] ? generic_make_request+0xb50/0xb50 [ 2984.260789][T29384] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2984.260803][T29384] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2984.260816][T29384] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2984.260832][T29384] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2984.260846][T29384] ? trace_hardirqs_on+0x67/0x240 [ 2984.260858][T29384] ? __kasan_check_read+0x11/0x20 [ 2984.260882][T29384] do_blockdev_direct_IO+0x6a0d/0x8420 [ 2984.276671][T29384] ? sb_init_dio_done_wq+0x80/0x80 [ 2984.276691][T29384] ? __kasan_check_read+0x11/0x20 [ 2984.276708][T29384] ? __lock_acquire+0x16f2/0x4a00 [ 2984.276741][T29384] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2984.289363][T29384] ? lock_downgrade+0x920/0x920 [ 2984.289389][T29384] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2984.289408][T29384] __blockdev_direct_IO+0xa1/0xca [ 2984.289424][T29384] ? __blockdev_direct_IO+0xa1/0xca [ 2984.289437][T29384] ? bget_one+0x30/0x30 [ 2984.289454][T29384] ext4_direct_IO+0xc0d/0x1c50 [ 2984.289471][T29384] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2984.289494][T29384] generic_file_direct_write+0x20a/0x4a0 [ 2984.289516][T29384] __generic_file_write_iter+0x2ee/0x630 [ 2984.289536][T29384] ext4_file_write_iter+0x317/0x13c0 [ 2984.289558][T29384] ? ext4_release_file+0x380/0x380 [ 2984.289571][T29384] ? mark_lock+0xc2/0x1220 23:21:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xea010000) [ 2984.289590][T29384] ? __kasan_check_read+0x11/0x20 [ 2984.289608][T29384] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2984.289621][T29384] ? iov_iter_init+0xee/0x220 [ 2984.289637][T29384] new_sync_write+0x4d3/0x770 [ 2984.289651][T29384] ? new_sync_read+0x800/0x800 [ 2984.289675][T29384] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2984.308702][T29384] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2984.322628][T29384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2984.322645][T29384] __vfs_write+0xe1/0x110 [ 2984.322661][T29384] vfs_write+0x268/0x5d0 [ 2984.322680][T29384] ksys_write+0x14f/0x290 [ 2984.322696][T29384] ? __ia32_sys_read+0xb0/0xb0 [ 2984.322716][T29384] ? do_syscall_64+0x26/0x760 [ 2984.322733][T29384] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2984.322745][T29384] ? do_syscall_64+0x26/0x760 [ 2984.322761][T29384] __x64_sys_write+0x73/0xb0 23:21:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xea030000) [ 2984.322776][T29384] do_syscall_64+0xfa/0x760 [ 2984.322796][T29384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2984.334494][T29384] RIP: 0033:0x459f49 [ 2984.334511][T29384] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2984.334519][T29384] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 23:21:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xec030000) [ 2984.334531][T29384] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2984.334544][T29384] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2984.344777][T29384] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2984.344787][T29384] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2984.344796][T29384] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 23:21:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xf0ffffff) 23:21:59 executing program 3 (fault-call:6 fault-nth:16): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2984.935554][T29386] device 2264 entered promiscuous mode [ 2984.953404][T29424] FAULT_INJECTION: forcing a failure. [ 2984.953404][T29424] name failslab, interval 1, probability 0, space 0, times 0 [ 2985.016109][T29424] CPU: 1 PID: 29424 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2985.024355][T29424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2985.034858][T29424] Call Trace: [ 2985.038174][T29424] dump_stack+0x172/0x1f0 [ 2985.042662][T29424] should_fail.cold+0xa/0x15 [ 2985.047451][T29424] ? fault_create_debugfs_attr+0x180/0x180 [ 2985.053327][T29424] ? __kasan_check_read+0x11/0x20 [ 2985.058872][T29424] ? mark_lock+0xc2/0x1220 [ 2985.058891][T29424] __should_failslab+0x121/0x190 [ 2985.058912][T29424] should_failslab+0x9/0x14 [ 2985.058924][T29424] kmem_cache_alloc+0x47/0x710 [ 2985.058944][T29424] ? ___might_sleep+0x163/0x2c0 [ 2985.083700][T29424] ? mempool_alloc+0x380/0x380 [ 2985.088495][T29424] mempool_alloc_slab+0x47/0x60 [ 2985.093394][T29424] mempool_alloc+0x169/0x380 [ 2985.099434][T29424] ? mempool_destroy+0x40/0x40 [ 2985.104852][T29424] ? find_next_zero_bit+0x111/0x140 [ 2985.110075][T29424] ? __kasan_check_read+0x11/0x20 [ 2985.115115][T29424] ? mark_lock+0xc2/0x1220 [ 2985.119556][T29424] bio_alloc_bioset+0x3bf/0x680 [ 2985.125078][T29424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2985.131373][T29424] ? bvec_alloc+0x2f0/0x2f0 [ 2985.135988][T29424] ? __kasan_check_read+0x11/0x20 [ 2985.141020][T29424] ? mark_lock+0xc2/0x1220 [ 2985.145427][T29424] ? find_held_lock+0x35/0x130 [ 2985.150246][T29424] bio_clone_fast+0x26/0x110 [ 2985.155834][T29424] bio_split+0x86/0x260 [ 2985.160932][T29424] __blk_queue_split+0x8dd/0x1560 [ 2985.165975][T29424] ? blk_rq_map_sg+0x1b10/0x1b10 [ 2985.171544][T29424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2985.178032][T29424] blk_mq_make_request+0x17d/0x2280 [ 2985.183291][T29424] ? blk_queue_enter+0xbb3/0xe50 [ 2985.188279][T29424] ? blk_mq_try_issue_directly+0x1c0/0x1c0 [ 2985.194167][T29424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2985.200407][T29424] ? __kasan_check_read+0x11/0x20 [ 2985.206695][T29424] generic_make_request+0x23c/0xb50 [ 2985.212742][T29424] ? blk_queue_enter+0xe50/0xe50 [ 2985.218564][T29424] ? get_user_pages_fast+0x275/0x570 [ 2985.223846][T29424] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2985.229663][T29424] submit_bio+0x113/0x600 [ 2985.234587][T29424] ? submit_bio+0x113/0x600 [ 2985.239289][T29424] ? generic_make_request+0xb50/0xb50 [ 2985.244681][T29424] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2985.250572][T29424] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2985.256316][T29424] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2985.262446][T29424] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2985.268606][T29424] ? trace_hardirqs_on+0x67/0x240 [ 2985.273973][T29424] ? __kasan_check_read+0x11/0x20 [ 2985.278988][T29424] do_blockdev_direct_IO+0x6a0d/0x8420 [ 2985.285156][T29424] ? sb_init_dio_done_wq+0x80/0x80 [ 2985.291622][T29424] ? __kasan_check_read+0x11/0x20 [ 2985.297817][T29424] ? __lock_acquire+0x16f2/0x4a00 [ 2985.304352][T29424] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2985.311134][T29424] ? lock_downgrade+0x920/0x920 [ 2985.317605][T29424] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2985.325531][T29424] __blockdev_direct_IO+0xa1/0xca [ 2985.331052][T29424] ? __blockdev_direct_IO+0xa1/0xca [ 2985.336268][T29424] ? bget_one+0x30/0x30 [ 2985.340626][T29424] ext4_direct_IO+0xc0d/0x1c50 [ 2985.345499][T29424] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2985.352088][T29424] generic_file_direct_write+0x20a/0x4a0 [ 2985.357734][T29424] __generic_file_write_iter+0x2ee/0x630 [ 2985.363468][T29424] ext4_file_write_iter+0x317/0x13c0 [ 2985.369391][T29424] ? ext4_release_file+0x380/0x380 [ 2985.375136][T29424] ? mark_lock+0xc2/0x1220 [ 2985.379871][T29424] ? __kasan_check_read+0x11/0x20 [ 2985.384922][T29424] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2985.391255][T29424] ? iov_iter_init+0xee/0x220 [ 2985.396310][T29424] new_sync_write+0x4d3/0x770 [ 2985.401094][T29424] ? new_sync_read+0x800/0x800 [ 2985.407061][T29424] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2985.413224][T29424] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2985.418742][T29424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2985.425032][T29424] __vfs_write+0xe1/0x110 [ 2985.429379][T29424] vfs_write+0x268/0x5d0 [ 2985.433627][T29424] ksys_write+0x14f/0x290 [ 2985.437961][T29424] ? __ia32_sys_read+0xb0/0xb0 [ 2985.442748][T29424] ? do_syscall_64+0x26/0x760 [ 2985.447436][T29424] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2985.453571][T29424] ? do_syscall_64+0x26/0x760 [ 2985.458354][T29424] __x64_sys_write+0x73/0xb0 [ 2985.463087][T29424] do_syscall_64+0xfa/0x760 [ 2985.467996][T29424] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2985.474461][T29424] RIP: 0033:0x459f49 [ 2985.478401][T29424] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2985.498432][T29424] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2985.507209][T29424] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2985.515280][T29424] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2985.523247][T29424] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2985.531449][T29424] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2985.539712][T29424] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 23:22:00 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa45\x00', 0x2}) 23:22:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() r2 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x1, 0x7, 0x0, 0x0, 0x0, 0x4, 0x1140, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x10000, 0x9, 0x101, 0x4, 0x4, 0x2764, 0xfffb}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x54c0422fe199849f) perf_event_open(0x0, r1, 0x5, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r3 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:22:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xf2020000) 23:22:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x36c) 23:22:00 executing program 3 (fault-call:6 fault-nth:17): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2985.733890][T29437] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2985.764099][T29435] FAULT_INJECTION: forcing a failure. [ 2985.764099][T29435] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2985.777706][T29435] CPU: 1 PID: 29435 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2985.785617][T29435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2985.795692][T29435] Call Trace: [ 2985.800359][T29435] dump_stack+0x172/0x1f0 [ 2985.804817][T29435] should_fail.cold+0xa/0x15 [ 2985.809441][T29435] ? __kasan_check_read+0x11/0x20 [ 2985.814537][T29435] ? fault_create_debugfs_attr+0x180/0x180 [ 2985.820653][T29435] ? __kasan_check_read+0x11/0x20 [ 2985.825708][T29435] ? __lock_acquire+0x16f2/0x4a00 [ 2985.830752][T29435] should_fail_alloc_page+0x50/0x60 [ 2985.830765][T29435] __alloc_pages_nodemask+0x1a1/0x900 [ 2985.830778][T29435] ? ____cache_alloc_node+0x160/0x1d0 [ 2985.830792][T29435] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2985.830805][T29435] ? ____cache_alloc_node+0x160/0x1d0 [ 2985.830825][T29435] ? lock_downgrade+0x920/0x920 [ 2985.863969][T29435] cache_grow_begin+0x90/0xd20 [ 2985.869285][T29435] ? __kasan_check_read+0x11/0x20 [ 2985.874339][T29435] ? do_raw_spin_unlock+0x57/0x270 [ 2985.879483][T29435] ____cache_alloc_node+0x17a/0x1d0 [ 2985.884698][T29435] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2985.890946][T29435] kmem_cache_alloc+0x1ef/0x710 [ 2985.890966][T29435] ? mempool_alloc+0x380/0x380 [ 2985.890977][T29435] mempool_alloc_slab+0x47/0x60 [ 2985.890988][T29435] mempool_alloc+0x169/0x380 [ 2985.891005][T29435] ? mempool_destroy+0x40/0x40 [ 2985.891025][T29435] ? __kasan_check_read+0x11/0x20 [ 2985.919955][T29435] ? __lock_acquire+0x16f2/0x4a00 [ 2985.925004][T29435] ? save_stack+0x5c/0x90 [ 2985.929360][T29435] ? save_stack+0x23/0x90 [ 2985.933707][T29435] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2985.939526][T29435] ? kasan_slab_alloc+0xf/0x20 [ 2985.944328][T29435] bio_alloc_bioset+0x3bf/0x680 [ 2985.949206][T29435] ? __kasan_check_read+0x11/0x20 [ 2985.954344][T29435] ? mark_lock+0xc2/0x1220 [ 2985.958782][T29435] ? bvec_alloc+0x2f0/0x2f0 [ 2985.963309][T29435] ? __kasan_check_read+0x11/0x20 [ 2985.968359][T29435] ? mark_lock+0xc2/0x1220 [ 2985.972805][T29435] bio_clone_fast+0x26/0x110 [ 2985.977423][T29435] bio_split+0x86/0x260 [ 2985.981598][T29435] __blk_queue_split+0x8dd/0x1560 [ 2985.986649][T29435] ? blk_rq_map_sg+0x1b10/0x1b10 [ 2985.991616][T29435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2985.997887][T29435] blk_mq_make_request+0x17d/0x2280 [ 2986.003110][T29435] ? blk_queue_enter+0xbb3/0xe50 [ 2986.008067][T29435] ? blk_mq_try_issue_directly+0x1c0/0x1c0 [ 2986.013892][T29435] ? generic_make_request_checks+0x845/0x2210 [ 2986.019969][T29435] ? down_read_non_owner+0x490/0x490 [ 2986.025407][T29435] ? __kasan_check_read+0x11/0x20 [ 2986.030450][T29435] generic_make_request+0x23c/0xb50 [ 2986.035665][T29435] ? __lock_acquire+0x16f2/0x4a00 [ 2986.040704][T29435] ? blk_queue_enter+0xe50/0xe50 [ 2986.045678][T29435] ? get_user_pages_fast+0x275/0x570 [ 2986.050981][T29435] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2986.056637][T29435] submit_bio+0x113/0x600 [ 2986.061154][T29435] ? submit_bio+0x113/0x600 [ 2986.065674][T29435] ? generic_make_request+0xb50/0xb50 [ 2986.071062][T29435] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2986.077424][T29435] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2986.083095][T29435] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2986.089010][T29435] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2986.094319][T29435] ? trace_hardirqs_on+0x67/0x240 [ 2986.099447][T29435] ? __kasan_check_read+0x11/0x20 [ 2986.104495][T29435] do_blockdev_direct_IO+0x6a0d/0x8420 [ 2986.110000][T29435] ? sb_init_dio_done_wq+0x80/0x80 [ 2986.115136][T29435] ? __kasan_check_read+0x11/0x20 [ 2986.120165][T29435] ? __lock_acquire+0x16f2/0x4a00 [ 2986.125259][T29435] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2986.131781][T29435] ? lock_downgrade+0x920/0x920 [ 2986.136651][T29435] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2986.143167][T29435] __blockdev_direct_IO+0xa1/0xca [ 2986.143186][T29435] ? __blockdev_direct_IO+0xa1/0xca [ 2986.153421][T29435] ? bget_one+0x30/0x30 [ 2986.157592][T29435] ext4_direct_IO+0xc0d/0x1c50 [ 2986.162361][T29435] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2986.162388][T29435] generic_file_direct_write+0x20a/0x4a0 [ 2986.162412][T29435] __generic_file_write_iter+0x2ee/0x630 [ 2986.162434][T29435] ext4_file_write_iter+0x317/0x13c0 23:22:00 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x600}, 0x0) 23:22:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xf2030000) [ 2986.162456][T29435] ? ext4_release_file+0x380/0x380 [ 2986.162472][T29435] ? mark_lock+0xc2/0x1220 [ 2986.162492][T29435] ? __kasan_check_read+0x11/0x20 [ 2986.162512][T29435] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2986.174657][T29435] ? iov_iter_init+0xee/0x220 [ 2986.174676][T29435] new_sync_write+0x4d3/0x770 [ 2986.174691][T29435] ? new_sync_read+0x800/0x800 [ 2986.174718][T29435] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2986.174739][T29435] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2986.174756][T29435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2986.174772][T29435] __vfs_write+0xe1/0x110 [ 2986.174790][T29435] vfs_write+0x268/0x5d0 [ 2986.174808][T29435] ksys_write+0x14f/0x290 [ 2986.174829][T29435] ? __ia32_sys_read+0xb0/0xb0 [ 2986.174852][T29435] ? do_syscall_64+0x26/0x760 [ 2986.174868][T29435] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2986.174886][T29435] ? do_syscall_64+0x26/0x760 [ 2986.185796][T29435] __x64_sys_write+0x73/0xb0 [ 2986.185817][T29435] do_syscall_64+0xfa/0x760 [ 2986.185844][T29435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2986.185856][T29435] RIP: 0033:0x459f49 [ 2986.185870][T29435] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2986.185883][T29435] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 23:22:01 executing program 3 (fault-call:6 fault-nth:18): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:22:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xf4020000) [ 2986.195428][T29435] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2986.195437][T29435] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2986.195445][T29435] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2986.195452][T29435] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2986.195461][T29435] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 [ 2986.424976][T29458] FAULT_INJECTION: forcing a failure. [ 2986.424976][T29458] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2986.440770][T29458] CPU: 0 PID: 29458 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2986.448964][T29458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2986.459924][T29458] Call Trace: [ 2986.464212][T29458] dump_stack+0x172/0x1f0 [ 2986.468932][T29458] should_fail.cold+0xa/0x15 [ 2986.475156][T29458] ? __kasan_check_read+0x11/0x20 [ 2986.480728][T29458] ? fault_create_debugfs_attr+0x180/0x180 [ 2986.486646][T29458] ? __kasan_check_read+0x11/0x20 [ 2986.491693][T29458] ? __lock_acquire+0x16f2/0x4a00 [ 2986.496766][T29458] should_fail_alloc_page+0x50/0x60 [ 2986.501988][T29458] __alloc_pages_nodemask+0x1a1/0x900 [ 2986.507381][T29458] ? ____cache_alloc_node+0x160/0x1d0 [ 2986.512789][T29458] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2986.518504][T29458] ? ____cache_alloc_node+0x160/0x1d0 [ 2986.523896][T29458] ? lock_downgrade+0x920/0x920 [ 2986.528878][T29458] cache_grow_begin+0x90/0xd20 [ 2986.533666][T29458] ? __kasan_check_read+0x11/0x20 [ 2986.538801][T29458] ? do_raw_spin_unlock+0x57/0x270 [ 2986.543933][T29458] ____cache_alloc_node+0x17a/0x1d0 [ 2986.549477][T29458] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2986.556652][T29458] kmem_cache_alloc+0x1ef/0x710 [ 2986.562228][T29458] ? mempool_alloc+0x380/0x380 [ 2986.568518][T29458] mempool_alloc_slab+0x47/0x60 [ 2986.574088][T29458] mempool_alloc+0x169/0x380 [ 2986.580074][T29458] ? mempool_destroy+0x40/0x40 [ 2986.585021][T29458] ? __kasan_check_read+0x11/0x20 [ 2986.590126][T29458] ? __lock_acquire+0x16f2/0x4a00 [ 2986.595227][T29458] ? save_stack+0x5c/0x90 [ 2986.599664][T29458] ? save_stack+0x23/0x90 [ 2986.604193][T29458] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2986.610418][T29458] ? kasan_slab_alloc+0xf/0x20 [ 2986.615196][T29458] bio_alloc_bioset+0x3bf/0x680 [ 2986.620042][T29458] ? __kasan_check_read+0x11/0x20 [ 2986.625069][T29458] ? mark_lock+0xc2/0x1220 [ 2986.629493][T29458] ? bvec_alloc+0x2f0/0x2f0 [ 2986.634098][T29458] ? __kasan_check_read+0x11/0x20 [ 2986.639129][T29458] ? mark_lock+0xc2/0x1220 [ 2986.643628][T29458] bio_clone_fast+0x26/0x110 [ 2986.648209][T29458] bio_split+0x86/0x260 [ 2986.652458][T29458] __blk_queue_split+0x8dd/0x1560 [ 2986.657493][T29458] ? blk_rq_map_sg+0x1b10/0x1b10 [ 2986.662425][T29458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2986.668658][T29458] blk_mq_make_request+0x17d/0x2280 [ 2986.673848][T29458] ? blk_queue_enter+0xbb3/0xe50 [ 2986.678792][T29458] ? blk_mq_try_issue_directly+0x1c0/0x1c0 [ 2986.684600][T29458] ? generic_make_request_checks+0x845/0x2210 [ 2986.690664][T29458] ? down_read_non_owner+0x490/0x490 [ 2986.695960][T29458] ? __kasan_check_read+0x11/0x20 [ 2986.700977][T29458] generic_make_request+0x23c/0xb50 [ 2986.706173][T29458] ? __lock_acquire+0x16f2/0x4a00 [ 2986.711186][T29458] ? blk_queue_enter+0xe50/0xe50 [ 2986.716247][T29458] ? get_user_pages_fast+0x275/0x570 [ 2986.721535][T29458] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2986.727166][T29458] submit_bio+0x113/0x600 [ 2986.731484][T29458] ? submit_bio+0x113/0x600 [ 2986.736236][T29458] ? generic_make_request+0xb50/0xb50 [ 2986.741606][T29458] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2986.747410][T29458] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2986.753039][T29458] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2986.758844][T29458] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2986.764125][T29458] ? trace_hardirqs_on+0x67/0x240 [ 2986.769147][T29458] ? __kasan_check_read+0x11/0x20 [ 2986.774165][T29458] do_blockdev_direct_IO+0x6a0d/0x8420 [ 2986.779633][T29458] ? sb_init_dio_done_wq+0x80/0x80 [ 2986.784749][T29458] ? __kasan_check_read+0x11/0x20 [ 2986.789789][T29458] ? __lock_acquire+0x16f2/0x4a00 [ 2986.794834][T29458] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2986.801332][T29458] ? lock_downgrade+0x920/0x920 [ 2986.806186][T29458] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2986.812678][T29458] __blockdev_direct_IO+0xa1/0xca [ 2986.817690][T29458] ? __blockdev_direct_IO+0xa1/0xca [ 2986.822883][T29458] ? bget_one+0x30/0x30 [ 2986.827034][T29458] ext4_direct_IO+0xc0d/0x1c50 [ 2986.831889][T29458] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2986.838386][T29458] generic_file_direct_write+0x20a/0x4a0 [ 2986.844025][T29458] __generic_file_write_iter+0x2ee/0x630 [ 2986.849651][T29458] ext4_file_write_iter+0x317/0x13c0 [ 2986.854938][T29458] ? ext4_release_file+0x380/0x380 [ 2986.860072][T29458] ? mark_lock+0xc2/0x1220 [ 2986.864489][T29458] ? __kasan_check_read+0x11/0x20 [ 2986.869516][T29458] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2986.875757][T29458] ? iov_iter_init+0xee/0x220 [ 2986.880428][T29458] new_sync_write+0x4d3/0x770 [ 2986.885097][T29458] ? new_sync_read+0x800/0x800 [ 2986.889871][T29458] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2986.896024][T29458] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2986.901298][T29458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2986.907527][T29458] __vfs_write+0xe1/0x110 [ 2986.911873][T29458] vfs_write+0x268/0x5d0 [ 2986.916152][T29458] ksys_write+0x14f/0x290 [ 2986.920479][T29458] ? __ia32_sys_read+0xb0/0xb0 [ 2986.925236][T29458] ? do_syscall_64+0x26/0x760 [ 2986.929905][T29458] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2986.935957][T29458] ? do_syscall_64+0x26/0x760 [ 2986.940658][T29458] __x64_sys_write+0x73/0xb0 [ 2986.945324][T29458] do_syscall_64+0xfa/0x760 [ 2986.949823][T29458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2986.955700][T29458] RIP: 0033:0x459f49 [ 2986.959595][T29458] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2986.979557][T29458] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2986.988232][T29458] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2986.996289][T29458] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2987.004258][T29458] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2987.012218][T29458] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 23:22:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x76, &(0x7f0000000ac0)=r1, 0x8) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r2, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x5450, 0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000000840)={0x1, 0x70, 0x5c, 0x0, 0x6, 0x7, 0x0, 0x7f, 0x42004, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000800)}, 0x10200, 0x6, 0x80000000, 0x8, 0x0, 0x9, 0x4fa}, r2, 0xc, r3, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) r5 = gettid() perf_event_open(0x0, r5, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r6 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r6, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d000598d95a80648c63940d0124fcd5ec20c60179d54ef0a3953000100002400200a06d053582c13715", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r4, &(0x7f00000004c0)={&(0x7f0000000300)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/104, 0x68}], 0x2, &(0x7f0000000440)=""/119, 0x77}, 0x40) sendmsg$kcm(r7, &(0x7f00000007c0)={&(0x7f0000000500)=@can={0x1d, r8}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000580)="cb897afa13363976b1917a68bb3e90ddc821ad4e7d9e217f95ffc6549dcc8071d745879986fd25c96b48f9340abecbc95fe859f4f10bfdb06f734c4535f2f9b0951b67560c4c8afe86e7b6b04f0df18d432394cbb94499febb6112c5fe4550e97bf8cb1958061e4353a63be58e0ef921a217f41994573569bb31776cd2368f80f51b5df94741c78084f387710c79d2bc128dda7a3973a473f0167da82b47c985870e29a0403ef7419abc7b40f3c6efc2f597487e8c5884c938472248cf2e3c73967f151dcf255a93917e7e58a18d8c23f34d332a6ed75c8ba79b6fb1cc7fff87aeb81846f5e406020e7162b5d335e0ff017d1b99fa", 0xf5}, {&(0x7f0000000680)="02d2114d01aede54c7608c7077d3d3439d70ec2efba7e8dfe76eaceb89da6ebbbcd7e36aba17cffbc8d75e6eaebde66e32b542fcf88ef7159ab403eaf61cc3408f6c34df35673fe27762ca2c4f5851ea925c1ba6ab735ebfc79e4b641428afa9e53553d8641f0f2a4f464071b4c51c7dbe23e9485255c052537a2fa0c5fe57a9952dafc9ae47573f139f52081113738acd44060b0ce665c5d33d16a477c2733322e03c84ef8170d769d67955ede6cfd5bcca25756f4004b8fe94930079e4a9dfc2fd7c33ad46c3c0b5611400494d81c04d7fe21804ffc28cb0313f2f09ab32245bebbf098d3c018fcdf2a1a3409bfa", 0xef}], 0x2}, 0x8024800) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r9, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r10, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7ffc, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf38, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2987.020266][T29458] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 [ 2987.038440][T29464] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2987.074019][T29437] device 2265 entered promiscuous mode 23:22:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xfa020000) 23:22:01 executing program 3 (fault-call:6 fault-nth:19): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2987.234771][T29464] device 2266 entered promiscuous mode 23:22:02 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa46\x00', 0x2}) 23:22:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xfa030000) 23:22:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x374) [ 2987.371028][T29483] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2987.394953][T29481] FAULT_INJECTION: forcing a failure. [ 2987.394953][T29481] name failslab, interval 1, probability 0, space 0, times 0 [ 2987.408315][T29481] CPU: 1 PID: 29481 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2987.416316][T29481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2987.427335][T29481] Call Trace: [ 2987.430693][T29481] dump_stack+0x172/0x1f0 [ 2987.435054][T29481] should_fail.cold+0xa/0x15 [ 2987.439687][T29481] ? fault_create_debugfs_attr+0x180/0x180 [ 2987.445519][T29481] ? __kasan_check_read+0x11/0x20 [ 2987.450564][T29481] ? mark_lock+0xc2/0x1220 [ 2987.455029][T29481] __should_failslab+0x121/0x190 [ 2987.460264][T29481] should_failslab+0x9/0x14 [ 2987.464796][T29481] kmem_cache_alloc+0x47/0x710 [ 2987.469590][T29481] ? __lock_acquire+0x16f2/0x4a00 [ 2987.474652][T29481] ? __lock_acquire+0x16f2/0x4a00 [ 2987.479701][T29481] ? __debug_object_init+0x186/0xee0 [ 2987.485013][T29481] ? mempool_alloc+0x380/0x380 [ 2987.490472][T29481] mempool_alloc_slab+0x47/0x60 [ 2987.495704][T29481] mempool_alloc+0x169/0x380 [ 2987.500441][T29481] ? mempool_destroy+0x40/0x40 [ 2987.500490][T29481] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2987.500510][T29481] ? __kasan_check_read+0x11/0x20 [ 2987.516717][T29481] ? __lock_acquire+0x16f2/0x4a00 [ 2987.516733][T29481] ? __kasan_check_read+0x11/0x20 [ 2987.516755][T29481] sg_pool_alloc+0xb8/0xd0 [ 2987.516774][T29481] __sg_alloc_table+0x26b/0x3b0 [ 2987.536092][T29481] sg_alloc_table_chained+0xa9/0x200 [ 2987.541389][T29481] ? mac_pton+0x2e0/0x2e0 [ 2987.545821][T29481] scsi_init_io+0x127/0x6e0 [ 2987.550356][T29481] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2987.552274][T29493] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2987.556061][T29481] sd_init_command+0x207/0x32d9 [ 2987.556082][T29481] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2987.556135][T29481] scsi_queue_rq+0x14a9/0x3020 [ 2987.569042][T29481] blk_mq_dispatch_rq_list+0x9f8/0x19e0 [ 2987.569060][T29481] ? lock_downgrade+0x920/0x920 [ 2987.569079][T29481] ? elv_rqhash_del+0x131/0x170 [ 2987.569093][T29481] ? cache_grow_begin.cold+0x2e/0x2f [ 2987.569111][T29481] ? blk_mq_get_driver_tag+0x590/0x590 [ 2987.585653][T29481] ? dd_dispatch_request+0x242/0x8e0 [ 2987.585672][T29481] ? scsi_mq_get_budget+0x155/0x320 [ 2987.585689][T29481] blk_mq_do_dispatch_sched+0x1a3/0x430 [ 2987.585711][T29481] ? blk_mq_sched_free_hctx_data+0x1f0/0x1f0 [ 2987.611486][T29481] blk_mq_sched_dispatch_requests+0x3f4/0x6d0 [ 2987.611505][T29481] ? lock_acquire+0x190/0x410 [ 2987.611523][T29481] ? blk_mq_sched_restart+0x90/0x90 [ 2987.611537][T29481] ? __kasan_check_read+0x11/0x20 [ 2987.611563][T29481] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2987.622311][T29481] __blk_mq_run_hw_queue+0x1cc/0x2e0 [ 2987.622326][T29481] ? blk_mq_hctx_mark_pending+0x250/0x250 [ 2987.622346][T29481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2987.622363][T29481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2987.622382][T29481] __blk_mq_delay_run_hw_queue+0x53e/0x600 [ 2987.622401][T29481] blk_mq_run_hw_queue+0x19d/0x350 [ 2987.622416][T29481] ? blk_mq_delay_run_hw_queue+0x30/0x30 [ 2987.622435][T29481] ? dd_dispatch_request+0x8e0/0x8e0 [ 2987.622453][T29481] blk_mq_sched_insert_requests+0x308/0x680 [ 2987.634560][T29481] blk_mq_flush_plug_list+0x87a/0xd90 [ 2987.634583][T29481] ? blk_mq_insert_requests+0x640/0x640 [ 2987.634600][T29481] ? lock_downgrade+0x920/0x920 [ 2987.634620][T29481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2987.634642][T29481] blk_flush_plug_list+0x349/0x520 [ 2987.634658][T29481] ? blk_account_io_start+0xf3/0xd00 [ 2987.634677][T29481] ? __sanitizer_cov_trace_const_cmp2+0x1/0x20 [ 2987.644518][T29481] ? blk_insert_cloned_request+0x530/0x530 [ 2987.644540][T29481] ? bio_to_wbt_flags.isra.0.part.0+0x1d0/0x1d0 [ 2987.644560][T29481] blk_mq_make_request+0xaa8/0x2280 [ 2987.644581][T29481] ? blk_mq_try_issue_directly+0x1c0/0x1c0 23:22:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xfeff0000) [ 2987.644618][T29481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2987.655860][T29481] ? __kasan_check_read+0x11/0x20 [ 2987.655880][T29481] generic_make_request+0x23c/0xb50 [ 2987.655900][T29481] ? blk_queue_enter+0xe50/0xe50 [ 2987.655914][T29481] ? get_user_pages_fast+0x275/0x570 [ 2987.655935][T29481] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2987.655953][T29481] submit_bio+0x113/0x600 [ 2987.666916][T29481] ? submit_bio+0x113/0x600 [ 2987.666933][T29481] ? generic_make_request+0xb50/0xb50 [ 2987.666952][T29481] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2987.666967][T29481] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2987.666981][T29481] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2987.666997][T29481] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2987.667013][T29481] ? trace_hardirqs_on+0x67/0x240 [ 2987.679454][T29481] ? __kasan_check_read+0x11/0x20 [ 2987.679475][T29481] do_blockdev_direct_IO+0x6a0d/0x8420 [ 2987.679518][T29481] ? sb_init_dio_done_wq+0x80/0x80 [ 2987.679537][T29481] ? __kasan_check_read+0x11/0x20 23:22:02 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x700}, 0x0) [ 2987.679551][T29481] ? __lock_acquire+0x16f2/0x4a00 [ 2987.679585][T29481] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2987.690481][T29481] ? lock_downgrade+0x920/0x920 [ 2987.690504][T29481] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2987.690522][T29481] __blockdev_direct_IO+0xa1/0xca [ 2987.690537][T29481] ? __blockdev_direct_IO+0xa1/0xca [ 2987.690551][T29481] ? bget_one+0x30/0x30 [ 2987.690569][T29481] ext4_direct_IO+0xc0d/0x1c50 [ 2987.690589][T29481] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2987.701475][T29481] generic_file_direct_write+0x20a/0x4a0 [ 2987.701498][T29481] __generic_file_write_iter+0x2ee/0x630 [ 2987.701520][T29481] ext4_file_write_iter+0x317/0x13c0 [ 2987.701542][T29481] ? ext4_release_file+0x380/0x380 [ 2987.701555][T29481] ? mark_lock+0xc2/0x1220 [ 2987.701573][T29481] ? __kasan_check_read+0x11/0x20 [ 2987.701593][T29481] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2987.712825][T29481] ? iov_iter_init+0xee/0x220 [ 2987.712844][T29481] new_sync_write+0x4d3/0x770 23:22:02 executing program 3 (fault-call:6 fault-nth:20): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2987.712861][T29481] ? new_sync_read+0x800/0x800 [ 2987.712888][T29481] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2987.712909][T29481] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2987.712925][T29481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2987.712941][T29481] __vfs_write+0xe1/0x110 [ 2987.723317][T29481] vfs_write+0x268/0x5d0 [ 2987.723337][T29481] ksys_write+0x14f/0x290 [ 2987.723354][T29481] ? __ia32_sys_read+0xb0/0xb0 [ 2987.723372][T29481] ? do_syscall_64+0x26/0x760 [ 2987.723389][T29481] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2987.723406][T29481] ? do_syscall_64+0x26/0x760 [ 2987.798846][T29481] __x64_sys_write+0x73/0xb0 [ 2987.798867][T29481] do_syscall_64+0xfa/0x760 [ 2987.798889][T29481] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2987.798901][T29481] RIP: 0033:0x459f49 [ 2987.798917][T29481] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:22:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xfeffffff) [ 2987.798925][T29481] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2987.798938][T29481] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2987.798945][T29481] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2987.798953][T29481] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2987.798961][T29481] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2987.798970][T29481] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 23:22:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @remote, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2988.061666][T29502] FAULT_INJECTION: forcing a failure. [ 2988.061666][T29502] name failslab, interval 1, probability 0, space 0, times 0 [ 2988.279242][T29502] CPU: 1 PID: 29502 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2988.288004][T29502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2988.288010][T29502] Call Trace: [ 2988.288044][T29502] dump_stack+0x172/0x1f0 [ 2988.288068][T29502] should_fail.cold+0xa/0x15 [ 2988.288087][T29502] ? fault_create_debugfs_attr+0x180/0x180 [ 2988.288110][T29502] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2988.288132][T29502] __should_failslab+0x121/0x190 [ 2988.288151][T29502] should_failslab+0x9/0x14 [ 2988.288168][T29502] kmem_cache_alloc+0x47/0x710 [ 2988.338185][T29502] ? ___might_sleep+0x163/0x2c0 [ 2988.343037][T29502] ? mempool_alloc+0x380/0x380 [ 2988.347810][T29502] mempool_alloc_slab+0x47/0x60 [ 2988.352741][T29502] mempool_alloc+0x169/0x380 [ 2988.357761][T29502] ? mempool_destroy+0x40/0x40 [ 2988.364984][T29502] ? mempool_destroy+0x40/0x40 [ 2988.370423][T29502] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2988.376523][T29502] bvec_alloc+0xdd/0x2f0 [ 2988.380878][T29502] bio_alloc_bioset+0x46e/0x680 [ 2988.385817][T29502] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2988.391701][T29502] ? bvec_alloc+0x2f0/0x2f0 [ 2988.396314][T29502] ? trace_hardirqs_on+0x67/0x240 [ 2988.401784][T29502] ? __kasan_check_read+0x11/0x20 [ 2988.407952][T29502] do_blockdev_direct_IO+0x29f3/0x8420 [ 2988.413774][T29502] ? sb_init_dio_done_wq+0x80/0x80 [ 2988.418883][T29502] ? __kasan_check_read+0x11/0x20 [ 2988.424119][T29502] ? __lock_acquire+0x16f2/0x4a00 [ 2988.429145][T29502] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2988.435992][T29502] ? lock_downgrade+0x920/0x920 [ 2988.440938][T29502] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2988.447435][T29502] __blockdev_direct_IO+0xa1/0xca [ 2988.453855][T29502] ? __blockdev_direct_IO+0xa1/0xca [ 2988.459753][T29502] ? bget_one+0x30/0x30 [ 2988.465534][T29502] ext4_direct_IO+0xc0d/0x1c50 [ 2988.470301][T29502] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2988.476887][T29502] generic_file_direct_write+0x20a/0x4a0 [ 2988.482792][T29502] __generic_file_write_iter+0x2ee/0x630 [ 2988.488713][T29502] ext4_file_write_iter+0x317/0x13c0 [ 2988.494020][T29502] ? ext4_release_file+0x380/0x380 [ 2988.499130][T29502] ? mark_lock+0xc2/0x1220 [ 2988.503540][T29502] ? __kasan_check_read+0x11/0x20 [ 2988.508556][T29502] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2988.514784][T29502] ? iov_iter_init+0xee/0x220 [ 2988.519451][T29502] new_sync_write+0x4d3/0x770 [ 2988.524115][T29502] ? new_sync_read+0x800/0x800 [ 2988.528907][T29502] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2988.535070][T29502] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2988.540534][T29502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2988.546768][T29502] __vfs_write+0xe1/0x110 [ 2988.551175][T29502] vfs_write+0x268/0x5d0 [ 2988.555593][T29502] ksys_write+0x14f/0x290 [ 2988.559911][T29502] ? __ia32_sys_read+0xb0/0xb0 [ 2988.564665][T29502] ? do_syscall_64+0x26/0x760 [ 2988.569367][T29502] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2988.575518][T29502] ? do_syscall_64+0x26/0x760 [ 2988.580188][T29502] __x64_sys_write+0x73/0xb0 [ 2988.584776][T29502] do_syscall_64+0xfa/0x760 [ 2988.589356][T29502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2988.595950][T29502] RIP: 0033:0x459f49 [ 2988.599845][T29502] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2988.619666][T29502] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2988.628250][T29502] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2988.636222][T29502] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2988.645364][T29502] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2988.653431][T29502] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2988.661402][T29502] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 23:22:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xff7f0000) [ 2988.682140][T29517] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2988.702833][T29493] device 2267 entered promiscuous mode [ 2988.764203][T29517] device 2268 entered promiscuous mode 23:22:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x37c) 23:22:03 executing program 3 (fault-call:6 fault-nth:21): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:22:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xfffff000) [ 2988.944918][T29527] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:22:03 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa47\x00', 0x2}) 23:22:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:22:03 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x900}, 0x0) 23:22:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xffffff7f) [ 2989.099900][T29533] FAULT_INJECTION: forcing a failure. [ 2989.099900][T29533] name failslab, interval 1, probability 0, space 0, times 0 [ 2989.113355][T29533] CPU: 0 PID: 29533 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2989.121530][T29533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2989.131707][T29533] Call Trace: [ 2989.135025][T29533] dump_stack+0x172/0x1f0 [ 2989.135054][T29533] should_fail.cold+0xa/0x15 [ 2989.143975][T29533] ? fault_create_debugfs_attr+0x180/0x180 [ 2989.149826][T29533] ? __kasan_check_read+0x11/0x20 [ 2989.154880][T29533] ? mark_lock+0xc2/0x1220 [ 2989.159320][T29533] __should_failslab+0x121/0x190 [ 2989.164296][T29533] should_failslab+0x9/0x14 [ 2989.168823][T29533] kmem_cache_alloc+0x47/0x710 [ 2989.173610][T29533] ? __lock_acquire+0x16f2/0x4a00 [ 2989.178651][T29533] ? __lock_acquire+0x16f2/0x4a00 [ 2989.178666][T29533] ? __debug_object_init+0x186/0xee0 [ 2989.178681][T29533] ? mempool_alloc+0x380/0x380 [ 2989.178698][T29533] mempool_alloc_slab+0x47/0x60 [ 2989.198790][T29533] mempool_alloc+0x169/0x380 [ 2989.203413][T29533] ? mempool_destroy+0x40/0x40 [ 2989.208818][T29533] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2989.214835][T29533] ? __kasan_check_read+0x11/0x20 [ 2989.220143][T29533] ? __lock_acquire+0x16f2/0x4a00 [ 2989.225354][T29533] ? __kasan_check_read+0x11/0x20 [ 2989.231453][T29533] sg_pool_alloc+0xb8/0xd0 [ 2989.235880][T29533] __sg_alloc_table+0x26b/0x3b0 [ 2989.235902][T29533] sg_alloc_table_chained+0xa9/0x200 [ 2989.235914][T29533] ? mac_pton+0x2e0/0x2e0 [ 2989.235931][T29533] scsi_init_io+0x127/0x6e0 [ 2989.235952][T29533] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2989.260280][T29533] sd_init_command+0x207/0x32d9 [ 2989.266741][T29533] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2989.273721][T29533] scsi_queue_rq+0x14a9/0x3020 [ 2989.278863][T29533] blk_mq_dispatch_rq_list+0x9f8/0x19e0 [ 2989.286966][T29533] ? lock_downgrade+0x920/0x920 [ 2989.292236][T29533] ? elv_rqhash_del+0x131/0x170 [ 2989.297367][T29533] ? cache_grow_begin.cold+0x2e/0x2f [ 2989.302673][T29533] ? blk_mq_get_driver_tag+0x590/0x590 [ 2989.308163][T29533] ? dd_dispatch_request+0x242/0x8e0 [ 2989.313485][T29533] ? scsi_mq_get_budget+0x155/0x320 [ 2989.318737][T29533] blk_mq_do_dispatch_sched+0x1a3/0x430 [ 2989.324430][T29533] ? blk_mq_sched_free_hctx_data+0x1f0/0x1f0 [ 2989.331045][T29533] blk_mq_sched_dispatch_requests+0x3f4/0x6d0 [ 2989.331063][T29533] ? lock_acquire+0x190/0x410 [ 2989.331081][T29533] ? blk_mq_sched_restart+0x90/0x90 [ 2989.331095][T29533] ? __kasan_check_read+0x11/0x20 [ 2989.331116][T29533] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2989.331132][T29533] __blk_mq_run_hw_queue+0x1cc/0x2e0 [ 2989.331146][T29533] ? blk_mq_hctx_mark_pending+0x250/0x250 [ 2989.331165][T29533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2989.331180][T29533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2989.331197][T29533] __blk_mq_delay_run_hw_queue+0x53e/0x600 [ 2989.331215][T29533] blk_mq_run_hw_queue+0x19d/0x350 [ 2989.331229][T29533] ? blk_mq_delay_run_hw_queue+0x30/0x30 [ 2989.331251][T29533] ? dd_dispatch_request+0x8e0/0x8e0 [ 2989.331266][T29533] blk_mq_sched_insert_requests+0x308/0x680 [ 2989.331284][T29533] blk_mq_flush_plug_list+0x87a/0xd90 [ 2989.418973][T29533] ? blk_mq_insert_requests+0x640/0x640 [ 2989.418992][T29533] ? lock_downgrade+0x920/0x920 [ 2989.419013][T29533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2989.419037][T29533] blk_flush_plug_list+0x349/0x520 [ 2989.419053][T29533] ? blk_account_io_start+0xf3/0xd00 [ 2989.419070][T29533] ? __sanitizer_cov_trace_const_cmp2+0x1/0x20 [ 2989.419083][T29533] ? blk_insert_cloned_request+0x530/0x530 [ 2989.419102][T29533] ? bio_to_wbt_flags.isra.0.part.0+0x1d0/0x1d0 [ 2989.419121][T29533] blk_mq_make_request+0xaa8/0x2280 [ 2989.419140][T29533] ? blk_mq_try_issue_directly+0x1c0/0x1c0 [ 2989.419171][T29533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2989.419189][T29533] ? __kasan_check_read+0x11/0x20 [ 2989.419208][T29533] generic_make_request+0x23c/0xb50 [ 2989.419227][T29533] ? blk_queue_enter+0xe50/0xe50 [ 2989.419242][T29533] ? get_user_pages_fast+0x275/0x570 [ 2989.419262][T29533] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2989.419281][T29533] submit_bio+0x113/0x600 [ 2989.419297][T29533] ? submit_bio+0x113/0x600 [ 2989.446314][T29533] ? generic_make_request+0xb50/0xb50 [ 2989.446335][T29533] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2989.446351][T29533] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2989.446366][T29533] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 23:22:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xffffff9e) [ 2989.446383][T29533] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2989.446399][T29533] ? trace_hardirqs_on+0x67/0x240 [ 2989.446413][T29533] ? __kasan_check_read+0x11/0x20 [ 2989.446435][T29533] do_blockdev_direct_IO+0x6a0d/0x8420 [ 2989.446479][T29533] ? sb_init_dio_done_wq+0x80/0x80 [ 2989.545052][T29533] ? __kasan_check_read+0x11/0x20 [ 2989.545069][T29533] ? __lock_acquire+0x16f2/0x4a00 [ 2989.545106][T29533] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2989.545136][T29533] ? lock_downgrade+0x920/0x920 [ 2989.545158][T29533] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2989.545174][T29533] __blockdev_direct_IO+0xa1/0xca [ 2989.545186][T29533] ? __blockdev_direct_IO+0xa1/0xca [ 2989.545201][T29533] ? bget_one+0x30/0x30 [ 2989.545220][T29533] ext4_direct_IO+0xc0d/0x1c50 [ 2989.545238][T29533] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2989.545264][T29533] generic_file_direct_write+0x20a/0x4a0 [ 2989.545286][T29533] __generic_file_write_iter+0x2ee/0x630 [ 2989.545308][T29533] ext4_file_write_iter+0x317/0x13c0 [ 2989.545330][T29533] ? ext4_release_file+0x380/0x380 [ 2989.545344][T29533] ? mark_lock+0xc2/0x1220 [ 2989.545363][T29533] ? __kasan_check_read+0x11/0x20 [ 2989.545381][T29533] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2989.545398][T29533] ? iov_iter_init+0xee/0x220 [ 2989.545416][T29533] new_sync_write+0x4d3/0x770 [ 2989.545430][T29533] ? new_sync_read+0x800/0x800 [ 2989.545455][T29533] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2989.545477][T29533] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2989.545494][T29533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2989.545511][T29533] __vfs_write+0xe1/0x110 [ 2989.545529][T29533] vfs_write+0x268/0x5d0 [ 2989.545548][T29533] ksys_write+0x14f/0x290 [ 2989.545564][T29533] ? __ia32_sys_read+0xb0/0xb0 [ 2989.545581][T29533] ? do_syscall_64+0x26/0x760 [ 2989.545598][T29533] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2989.545616][T29533] ? do_syscall_64+0x26/0x760 [ 2989.545635][T29533] __x64_sys_write+0x73/0xb0 [ 2989.545651][T29533] do_syscall_64+0xfa/0x760 [ 2989.545670][T29533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2989.607632][T29533] RIP: 0033:0x459f49 [ 2989.607649][T29533] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2989.607655][T29533] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 23:22:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xfffffff0) [ 2989.607669][T29533] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2989.607677][T29533] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2989.607685][T29533] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2989.607694][T29533] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2989.607703][T29533] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 23:22:04 executing program 3 (fault-call:6 fault-nth:22): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:22:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x5450, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xfffffffffffff767) r3 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000200)={0x3, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x4000, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2989.917732][T29527] device 2269 entered promiscuous mode 23:22:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xfffffffe) 23:22:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x384) 23:22:04 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0xa00}, 0x0) [ 2990.015433][T29568] FAULT_INJECTION: forcing a failure. [ 2990.015433][T29568] name failslab, interval 1, probability 0, space 0, times 0 [ 2990.075676][T29568] CPU: 0 PID: 29568 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2990.083628][T29568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2990.093697][T29568] Call Trace: [ 2990.096995][T29568] dump_stack+0x172/0x1f0 [ 2990.101343][T29568] should_fail.cold+0xa/0x15 [ 2990.106032][T29568] ? fault_create_debugfs_attr+0x180/0x180 [ 2990.111865][T29568] ? lock_downgrade+0x920/0x920 [ 2990.116825][T29568] ? blk_mq_sched_dispatch_requests+0x3fe/0x6d0 [ 2990.123206][T29568] __should_failslab+0x121/0x190 [ 2990.128601][T29568] should_failslab+0x9/0x14 [ 2990.133129][T29568] kmem_cache_alloc+0x47/0x710 [ 2990.138066][T29568] ? ___might_sleep+0x163/0x2c0 [ 2990.142966][T29568] ? mempool_alloc+0x380/0x380 [ 2990.148398][T29568] mempool_alloc_slab+0x47/0x60 [ 2990.154263][T29568] mempool_alloc+0x169/0x380 [ 2990.158878][T29568] ? mempool_destroy+0x40/0x40 [ 2990.163756][T29568] ? lock_downgrade+0x920/0x920 [ 2990.168681][T29568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2990.174948][T29568] ? __kasan_check_read+0x11/0x20 [ 2990.179996][T29568] bio_alloc_bioset+0x3bf/0x680 [ 2990.184871][T29568] ? blk_mq_sched_insert_requests+0x41b/0x680 [ 2990.190970][T29568] ? bvec_alloc+0x2f0/0x2f0 [ 2990.195490][T29568] ? __kasan_check_read+0x11/0x20 [ 2990.200665][T29568] ? mark_lock+0xc2/0x1220 [ 2990.205124][T29568] bio_clone_fast+0x26/0x110 [ 2990.209831][T29568] bio_split+0x86/0x260 [ 2990.214076][T29568] __blk_queue_split+0x8dd/0x1560 [ 2990.219132][T29568] ? blk_rq_map_sg+0x1b10/0x1b10 23:22:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xa087ffffffff) [ 2990.224100][T29568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2990.230354][T29568] blk_mq_make_request+0x17d/0x2280 [ 2990.235570][T29568] ? blk_queue_enter+0xbb3/0xe50 [ 2990.241485][T29568] ? blk_mq_try_issue_directly+0x1c0/0x1c0 [ 2990.247320][T29568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2990.247339][T29568] ? __kasan_check_read+0x11/0x20 [ 2990.247361][T29568] generic_make_request+0x23c/0xb50 [ 2990.263902][T29568] ? blk_queue_enter+0xe50/0xe50 [ 2990.268942][T29568] ? get_user_pages_fast+0x275/0x570 [ 2990.274420][T29568] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2990.280071][T29568] submit_bio+0x113/0x600 [ 2990.284422][T29568] ? submit_bio+0x113/0x600 [ 2990.289213][T29568] ? generic_make_request+0xb50/0xb50 [ 2990.294608][T29568] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2990.300458][T29568] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2990.307306][T29568] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2990.313162][T29568] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2990.313179][T29568] ? trace_hardirqs_on+0x67/0x240 [ 2990.313192][T29568] ? __kasan_check_read+0x11/0x20 [ 2990.313214][T29568] do_blockdev_direct_IO+0x6a0d/0x8420 [ 2990.313251][T29568] ? sb_init_dio_done_wq+0x80/0x80 [ 2990.335277][T29568] ? __kasan_check_read+0x11/0x20 [ 2990.335293][T29568] ? __lock_acquire+0x16f2/0x4a00 [ 2990.335329][T29568] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2990.335350][T29568] ? lock_downgrade+0x920/0x920 [ 2990.335371][T29568] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2990.369511][T29568] __blockdev_direct_IO+0xa1/0xca [ 2990.374570][T29568] ? __blockdev_direct_IO+0xa1/0xca [ 2990.379893][T29568] ? bget_one+0x30/0x30 [ 2990.384186][T29568] ext4_direct_IO+0xc0d/0x1c50 [ 2990.384205][T29568] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2990.384231][T29568] generic_file_direct_write+0x20a/0x4a0 [ 2990.384254][T29568] __generic_file_write_iter+0x2ee/0x630 [ 2990.384273][T29568] ext4_file_write_iter+0x317/0x13c0 [ 2990.384290][T29568] ? ext4_release_file+0x380/0x380 [ 2990.384303][T29568] ? mark_lock+0xc2/0x1220 [ 2990.384321][T29568] ? __kasan_check_read+0x11/0x20 [ 2990.384337][T29568] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2990.384365][T29568] ? iov_iter_init+0xee/0x220 [ 2990.384383][T29568] new_sync_write+0x4d3/0x770 [ 2990.384399][T29568] ? new_sync_read+0x800/0x800 [ 2990.384427][T29568] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2990.384450][T29568] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2990.384467][T29568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2990.384482][T29568] __vfs_write+0xe1/0x110 [ 2990.384499][T29568] vfs_write+0x268/0x5d0 [ 2990.418663][T29568] ksys_write+0x14f/0x290 [ 2990.418681][T29568] ? __ia32_sys_read+0xb0/0xb0 [ 2990.418701][T29568] ? do_syscall_64+0x26/0x760 [ 2990.418717][T29568] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2990.418735][T29568] ? do_syscall_64+0x26/0x760 [ 2990.444720][T29568] __x64_sys_write+0x73/0xb0 [ 2990.444742][T29568] do_syscall_64+0xfa/0x760 [ 2990.444764][T29568] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2990.444775][T29568] RIP: 0033:0x459f49 [ 2990.444793][T29568] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2990.487372][T29568] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2990.487387][T29568] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2990.487396][T29568] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2990.487405][T29568] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2990.487413][T29568] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2990.487422][T29568] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 [ 2990.558478][T29586] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:22:05 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa48\x00', 0x2}) 23:22:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x1000000000000) 23:22:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x1, 0x0, 0x0, 0x10001}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = gettid() perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) socket$kcm(0x2, 0x5, 0x84) r3 = socket$kcm(0x2, 0x640d5394da754185, 0x84) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0)=r4, 0x8) r5 = openat$cgroup_ro(r4, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r5, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) openat$cgroup_ro(r5, &(0x7f00000004c0)='memory.events\x00', 0x0, 0x0) r6 = socket$kcm(0x2, 0x5, 0x84) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpuacct.usage_all\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(r6, 0x84, 0x76, &(0x7f0000000ac0)=r7, 0x8) openat$cgroup_ro(r7, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d000598d95a80648c63940d0124fcd5ec20c60179d54ef0a3953000100002400200a06d053582c13715", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x76, &(0x7f0000000ac0)=r7, 0xfffffffffffffe89) r9 = perf_event_open(&(0x7f0000000440)={0x3, 0x70, 0x0, 0x1, 0x0, 0x5, 0x0, 0x4, 0x200, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x86, 0x1, @perf_bp={&(0x7f0000000380), 0x6b0849f251cd0a9b}, 0xc, 0x2, 0xc36, 0x2, 0x1, 0x9, 0x9}, r2, 0x9, r0, 0x7) r10 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r10, 0x5450, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000000500)=0x2) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x70, 0xfb, 0x1, 0x4, 0xbc, 0x0, 0x367d, 0x80000, 0x7, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x2}, 0x8002, 0x4, 0x6, 0x8, 0x6a79, 0xaf6, 0x8}, 0xffffffffffffffff, 0x9, r9, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000100d127c88cc055ffffffffffff6636d02b21acaaaaaaaaaa2400001b000000aaaaaaaa941800"/52]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r11, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:22:05 executing program 3 (fault-call:6 fault-nth:23): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2990.787645][T29592] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2990.914260][T29600] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2990.946832][T29601] FAULT_INJECTION: forcing a failure. [ 2990.946832][T29601] name failslab, interval 1, probability 0, space 0, times 0 [ 2990.971138][T29601] CPU: 1 PID: 29601 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2990.979261][T29601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2990.984892][T29586] device 2270 entered promiscuous mode [ 2990.991490][T29601] Call Trace: [ 2990.991514][T29601] dump_stack+0x172/0x1f0 [ 2990.991537][T29601] should_fail.cold+0xa/0x15 [ 2990.991554][T29601] ? fault_create_debugfs_attr+0x180/0x180 [ 2990.991570][T29601] ? lock_downgrade+0x920/0x920 [ 2990.991586][T29601] ? blk_mq_sched_dispatch_requests+0x3fe/0x6d0 [ 2990.991610][T29601] __should_failslab+0x121/0x190 [ 2990.991629][T29601] should_failslab+0x9/0x14 [ 2990.991646][T29601] kmem_cache_alloc+0x47/0x710 [ 2991.007776][T29604] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2991.011060][T29601] ? ___might_sleep+0x163/0x2c0 [ 2991.011079][T29601] ? mempool_alloc+0x380/0x380 [ 2991.011091][T29601] mempool_alloc_slab+0x47/0x60 [ 2991.011108][T29601] mempool_alloc+0x169/0x380 [ 2991.073211][T29601] ? mempool_destroy+0x40/0x40 [ 2991.077963][T29601] ? lock_downgrade+0x920/0x920 [ 2991.082811][T29601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2991.089155][T29601] ? __kasan_check_read+0x11/0x20 [ 2991.094257][T29601] bio_alloc_bioset+0x3bf/0x680 [ 2991.099178][T29601] ? blk_mq_sched_insert_requests+0x41b/0x680 [ 2991.107449][T29601] ? bvec_alloc+0x2f0/0x2f0 [ 2991.111952][T29601] ? __kasan_check_read+0x11/0x20 [ 2991.117119][T29601] ? mark_lock+0xc2/0x1220 [ 2991.121533][T29601] bio_clone_fast+0x26/0x110 [ 2991.126848][T29601] bio_split+0x86/0x260 [ 2991.131495][T29601] __blk_queue_split+0x8dd/0x1560 [ 2991.141349][T29601] ? blk_rq_map_sg+0x1b10/0x1b10 [ 2991.148070][T29601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2991.154922][T29601] blk_mq_make_request+0x17d/0x2280 [ 2991.160496][T29601] ? blk_queue_enter+0xbb3/0xe50 [ 2991.166568][T29601] ? blk_mq_try_issue_directly+0x1c0/0x1c0 [ 2991.174387][T29601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2991.180728][T29601] ? __kasan_check_read+0x11/0x20 [ 2991.185841][T29601] generic_make_request+0x23c/0xb50 [ 2991.191215][T29601] ? blk_queue_enter+0xe50/0xe50 [ 2991.196417][T29601] ? get_user_pages_fast+0x275/0x570 [ 2991.201704][T29601] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2991.207330][T29601] submit_bio+0x113/0x600 [ 2991.211645][T29601] ? submit_bio+0x113/0x600 [ 2991.216148][T29601] ? generic_make_request+0xb50/0xb50 [ 2991.221522][T29601] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2991.227345][T29601] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2991.233053][T29601] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2991.238863][T29601] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2991.244237][T29601] ? trace_hardirqs_on+0x67/0x240 [ 2991.249258][T29601] ? __kasan_check_read+0x11/0x20 [ 2991.254272][T29601] do_blockdev_direct_IO+0x6a0d/0x8420 [ 2991.259743][T29601] ? sb_init_dio_done_wq+0x80/0x80 [ 2991.264856][T29601] ? __kasan_check_read+0x11/0x20 [ 2991.269870][T29601] ? __lock_acquire+0x16f2/0x4a00 [ 2991.274891][T29601] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2991.281391][T29601] ? lock_downgrade+0x920/0x920 [ 2991.286253][T29601] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2991.292772][T29601] __blockdev_direct_IO+0xa1/0xca [ 2991.297792][T29601] ? __blockdev_direct_IO+0xa1/0xca [ 2991.302988][T29601] ? bget_one+0x30/0x30 [ 2991.307148][T29601] ext4_direct_IO+0xc0d/0x1c50 [ 2991.311906][T29601] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2991.318412][T29601] generic_file_direct_write+0x20a/0x4a0 [ 2991.324145][T29601] __generic_file_write_iter+0x2ee/0x630 [ 2991.329818][T29601] ext4_file_write_iter+0x317/0x13c0 [ 2991.335162][T29601] ? ext4_release_file+0x380/0x380 [ 2991.340265][T29601] ? mark_lock+0xc2/0x1220 [ 2991.344679][T29601] ? __kasan_check_read+0x11/0x20 [ 2991.349693][T29601] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2991.356026][T29601] ? iov_iter_init+0xee/0x220 [ 2991.360697][T29601] new_sync_write+0x4d3/0x770 [ 2991.365361][T29601] ? new_sync_read+0x800/0x800 [ 2991.370115][T29601] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2991.376278][T29601] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2991.381652][T29601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2991.387883][T29601] __vfs_write+0xe1/0x110 [ 2991.392199][T29601] vfs_write+0x268/0x5d0 [ 2991.396431][T29601] ksys_write+0x14f/0x290 [ 2991.400745][T29601] ? __ia32_sys_read+0xb0/0xb0 [ 2991.405547][T29601] ? do_syscall_64+0x26/0x760 [ 2991.410274][T29601] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2991.416580][T29601] ? do_syscall_64+0x26/0x760 [ 2991.421270][T29601] __x64_sys_write+0x73/0xb0 [ 2991.425854][T29601] do_syscall_64+0xfa/0x760 [ 2991.430581][T29601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2991.436597][T29601] RIP: 0033:0x459f49 [ 2991.440489][T29601] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2991.460171][T29601] RSP: 002b:00007f7d33f47c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2991.468801][T29601] RAX: ffffffffffffffda RBX: 00007f7d33f47c90 RCX: 0000000000459f49 [ 2991.478218][T29601] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2991.486194][T29601] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2991.494153][T29601] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f486d4 [ 2991.502110][T29601] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 [ 2991.590313][T29600] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2991.595230][T29592] device 1164 entered promiscuous mode 23:22:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x4000000000000) 23:22:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x5450, 0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x2, 0x2, 0x20, 0x3, 0x0, 0xfffffffffffff23d, 0x40, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000300), 0xc}, 0x0, 0xff, 0xffffffff, 0x8, 0x1f300000000, 0x49, 0x3e}, r1, 0x1, r2, 0xe) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) r4 = gettid() write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r5 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r5, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r6, 0x400454d1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:22:06 executing program 3 (fault-call:6 fault-nth:24): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2991.650895][T29604] device 2271 entered promiscuous mode [ 2991.686397][T29611] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:22:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x38c) [ 2991.806047][T29611] device 1165 entered promiscuous mode [ 2991.860633][T29620] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2991.861634][T29619] FAULT_INJECTION: forcing a failure. [ 2991.861634][T29619] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2991.882035][T29619] CPU: 0 PID: 29619 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2991.882043][T29619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2991.882048][T29619] Call Trace: [ 2991.882068][T29619] dump_stack+0x172/0x1f0 [ 2991.882088][T29619] should_fail.cold+0xa/0x15 [ 2991.882105][T29619] ? fault_create_debugfs_attr+0x180/0x180 [ 2991.882118][T29619] ? blk_mq_get_driver_tag+0x590/0x590 [ 2991.882137][T29619] ? dd_dispatch_request+0x242/0x8e0 [ 2991.929060][T29619] should_fail_alloc_page+0x50/0x60 [ 2991.934252][T29619] __alloc_pages_nodemask+0x1a1/0x900 [ 2991.939627][T29619] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2991.945345][T29619] ? fault_create_debugfs_attr+0x180/0x180 [ 2991.951142][T29619] ? lock_downgrade+0x920/0x920 [ 2991.955997][T29619] cache_grow_begin+0x90/0xd20 [ 2991.960763][T29619] ? mempool_alloc_slab+0x47/0x60 [ 2991.965952][T29619] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2991.972192][T29619] kmem_cache_alloc+0x64e/0x710 [ 2991.977039][T29619] ? mempool_alloc+0x380/0x380 [ 2991.981787][T29619] mempool_alloc_slab+0x47/0x60 [ 2991.986637][T29619] mempool_alloc+0x169/0x380 [ 2991.991225][T29619] ? mempool_destroy+0x40/0x40 [ 2991.995995][T29619] ? lock_downgrade+0x920/0x920 [ 2992.000856][T29619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2992.007088][T29619] ? __kasan_check_read+0x11/0x20 [ 2992.012117][T29619] bio_alloc_bioset+0x3bf/0x680 [ 2992.016957][T29619] ? blk_mq_sched_insert_requests+0x41b/0x680 [ 2992.023028][T29619] ? bvec_alloc+0x2f0/0x2f0 [ 2992.027517][T29619] ? __kasan_check_read+0x11/0x20 [ 2992.032529][T29619] ? mark_lock+0xc2/0x1220 [ 2992.036950][T29619] bio_clone_fast+0x26/0x110 [ 2992.041541][T29619] bio_split+0x86/0x260 [ 2992.045699][T29619] __blk_queue_split+0x8dd/0x1560 [ 2992.050831][T29619] ? blk_rq_map_sg+0x1b10/0x1b10 [ 2992.055765][T29619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2992.061998][T29619] blk_mq_make_request+0x17d/0x2280 [ 2992.067194][T29619] ? blk_queue_enter+0xbb3/0xe50 [ 2992.072134][T29619] ? blk_mq_try_issue_directly+0x1c0/0x1c0 [ 2992.077939][T29619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2992.084170][T29619] ? __kasan_check_read+0x11/0x20 [ 2992.089186][T29619] generic_make_request+0x23c/0xb50 [ 2992.094397][T29619] ? blk_queue_enter+0xe50/0xe50 [ 2992.099323][T29619] ? get_user_pages_fast+0x275/0x570 [ 2992.104599][T29619] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2992.110230][T29619] submit_bio+0x113/0x600 [ 2992.114557][T29619] ? submit_bio+0x113/0x600 [ 2992.119048][T29619] ? generic_make_request+0xb50/0xb50 [ 2992.124414][T29619] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2992.130205][T29619] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2992.135833][T29619] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2992.141640][T29619] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2992.146915][T29619] ? trace_hardirqs_on+0x67/0x240 [ 2992.151946][T29619] ? __kasan_check_read+0x11/0x20 [ 2992.156975][T29619] do_blockdev_direct_IO+0x6a0d/0x8420 [ 2992.162439][T29619] ? sb_init_dio_done_wq+0x80/0x80 [ 2992.167559][T29619] ? __kasan_check_read+0x11/0x20 [ 2992.172582][T29619] ? __lock_acquire+0x16f2/0x4a00 [ 2992.177610][T29619] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2992.184107][T29619] ? lock_downgrade+0x920/0x920 [ 2992.188951][T29619] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2992.195473][T29619] __blockdev_direct_IO+0xa1/0xca [ 2992.200498][T29619] ? __blockdev_direct_IO+0xa1/0xca [ 2992.205687][T29619] ? bget_one+0x30/0x30 [ 2992.209838][T29619] ext4_direct_IO+0xc0d/0x1c50 [ 2992.214595][T29619] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2992.221104][T29619] generic_file_direct_write+0x20a/0x4a0 [ 2992.226746][T29619] __generic_file_write_iter+0x2ee/0x630 [ 2992.232374][T29619] ext4_file_write_iter+0x317/0x13c0 [ 2992.237661][T29619] ? ext4_release_file+0x380/0x380 [ 2992.242758][T29619] ? mark_lock+0xc2/0x1220 [ 2992.247165][T29619] ? __kasan_check_read+0x11/0x20 [ 2992.252183][T29619] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2992.258414][T29619] ? iov_iter_init+0xee/0x220 [ 2992.263083][T29619] new_sync_write+0x4d3/0x770 [ 2992.267762][T29619] ? new_sync_read+0x800/0x800 [ 2992.272534][T29619] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2992.278696][T29619] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2992.283979][T29619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2992.290222][T29619] __vfs_write+0xe1/0x110 [ 2992.294543][T29619] vfs_write+0x268/0x5d0 [ 2992.298781][T29619] ksys_write+0x14f/0x290 [ 2992.303113][T29619] ? __ia32_sys_read+0xb0/0xb0 [ 2992.307872][T29619] ? do_syscall_64+0x26/0x760 [ 2992.312553][T29619] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2992.318621][T29619] ? do_syscall_64+0x26/0x760 [ 2992.323293][T29619] __x64_sys_write+0x73/0xb0 [ 2992.327902][T29619] do_syscall_64+0xfa/0x760 [ 2992.332400][T29619] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2992.338294][T29619] RIP: 0033:0x459f49 [ 2992.342215][T29619] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2992.363702][T29619] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2992.372647][T29619] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2992.381860][T29619] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2992.390448][T29619] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2992.398596][T29619] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2992.406666][T29619] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 23:22:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xf0ffffffffffff) 23:22:07 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0xb00}, 0x0) 23:22:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x100000000000000) 23:22:07 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa49\x00', 0x2}) [ 2992.650144][T29632] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2992.671793][T29620] device 2272 entered promiscuous mode [ 2992.741592][T29635] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:22:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = gettid() perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r3 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x34}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r4, &(0x7f0000000b00)="d02de79c926016b5cc6b3df3f78085f7341c38d57c5ab41ba41b341fab654cf9ba505c39ae5feb49a6f73ec9f969ea6ce65a509d4bb41fc22faf90161d44b7f77503d021cbb345e4a9dc234977bff68ae18a1211d76403b09a8d38a0616441adf18cc5e007acae7814abe2e984c3983e6327860ef0e3e26eb55042c5d0d64c874d7a9898d82e93b0829f0ba665d1340443f7aa76963e15b169fc664d5cb6d342f9a22ce890d0ce4620a7f930fde4f6c35fe36de6accbf03aaf5b8122b5cf6da2fb157ef1a6ae7bff550198e2a5b313859d676bba9412e66537a60282f8a4a2af52258e75b006361a9d19a7f720d07dff95a95f39acdbc965067ff9f2daf865df6151d85c30847df3d2b16a619d7e0efb30cae365f0ce1a3dd585339447ea540834b27c135a2ccaf2b900834a6046fcb94281c89737075bcbfe8eead477c34a61c8c4b1c29058d9513e95603dbf4ed2ae92aaf890fd81107b77f410f8b8e3c69700de5ac1e195cdaa23dbc9b7061c1ab113ec85a547162730e87226200f6b61c3c444dec993e6b46983723b0ddd21739f9e5bd43440e3ebf41c35c4098c330c6aa5ce29e2656a6c26e15a43ea20a8f815e9f008d74f22ccfcf47bf49b7d743751220addf0a04f0904bc9ce034b82879d821e468410703a80c68e16e50ff368769af48dc1a177bbec4202a8973da68e4b47039b26ad5334476ac7b130e8d03689c122dcf76f22d11a1729cb3af533decfd5cacca62e26a87c1f969c14be4f2ac46a1a16d2c494616c0c9d23bce55a0875d0dd219a650f2442a0d0ef946c659b09cb36944af10b46bafb343e5a48b9330f3f056d0905374ab52215fd17bb0ac89a2dc79478bf11437dce6b5e708783edbfab438b3d61c96b071c658fb751c5215d40270263404325fcd28263b1f89fad8481e15e12a7eb2a9e418148859519519e8a26e7ca0e785c795d03f7e3bc882beeef4b7df0146691b06b31afaa54f6156eaa1afd10f84fe9be1a7d664795f16b29a79a919cdd482bdbe54ff62b00a04b0c752ba7c41709ab32aac7487d422343acb6159bf72592c2d28c08677e529aeabdd579c22433aa37a641da6ab11f383c7c87f7f147c41e268c0fcf3be687fc1dfe813da9e70105d69dcc3914c66fff87849ad0c5c023f2fac4d67cb553472f750da839c48c9ac870ce244b40619174359454612a2f18bd91a712fad35bf9df0729144c9b20115d0677e038cc16efabfa8ba6cc0df37590c510d621a492ef2cd4610ad304c0e03e6886a714aa25bbb190c5855cb075d3b60fd5e5b12fbb3e2d35ba10cd0d771825704e77a795148a72343ab939aff7a21f7013f89e137371f8e19becd4f79c09714143ee27dd100c169136ad727541826ab2f8453cdf674e4c0da77de5772adb489eb4130900c3fd27da34f2327eebd245c8fcf5f707d13072f9edf998a3c25ddc5520f820371978e21c395ce5f747165079f6ee0124129852ad5ead35d70b4cb4be7245ddd277791f99901cc7c1ca574b86ad2bd31e24c9c866127918926737efdf3cc77f13e2f9d56acc01435061dfcf0fdb95e57c2931d80e06b731589941f9c7a8c0ee25c89fd89eecf3d0e2b956b9c9261e8c4d7a661a705495bdaec287e70cc1bdf9ee89fcf7a2a54e2c6d79d00471095796b9068b56bb5bfc19a7a1811a60fb0a140b7874612c64bf7dd602be62ea925464bf502f431c62025da25f08e59d4e7f571e9b075fa89cef6802695574886da96ddf2ee53d73d15dafd5b594a867857ab8eec806ebc08f88dc081f15f5d6d0355b9ea5dd4ec6646bda0c7d642ecf15f0edeac4696c51d9397788c838ef8cb062a7da8c0f9e40c6444a06ff87001e84744458ba04038c44e93ed2a453689093c23bf8e327b42c0ebbb48bd8d4027e3164745050480d751c28150fc7f9fac25b453efd768dd4834035d367841c076551a600a68b517e54960eb8792cb77875d777fcd4bdb4adc7102aadc7f3bf2d57855f3342bd79edaf0b355b7dd2b572abd34e634d25b971f55aef12a9083240d2a54498085a8ac0eb1fcd1648b06f12b183f5ed7005577b9a40a14a9de76fb4dadadb107baf0c19ceb33e004117ffce06637023ea0dc7ebc0a36ff438f297be0b2f8243939ae075f2f93e1e25a97b948e4d46aa641cf53c95d15c8643204486344e77ca70292811897fae1bc1ae9cd442c7b414615ccd4b083eae210392498a336ad83fb7d6a2a0c4fe38c99b895a4a0853b153bb96f611ab0a3a6069adece22ca3acd2fff61b01f91e313aa06e2e9cff74287c4590d331eb6eb4dbe75d945f2bba8b7c586658aa1de0362d1a8de4860e5352da233eee0ecd01dbd5c3c5d165fabba54a744ddd4e3de3d7ec681f3f35da83686d580c85d0002823d7c2a5b294bf7352525646fb243df6ae3f7478d7421c788ac0c13a3298d7a24125af9aaa26cb72721ba60fdde6688e219403e4a138daf957289ae1c97c7e5460ecd2d8fefc9fb45d5ebde6f57a911edfdd6e08f718c762b63b5a2ee19bd1ff12d5cfa6b3ec9f98615222d88e21a1554f2298f1832f2898b3372a9f6c34838bdd406aca942a22b21ed2af78bc65d7e7a6b08a6906c1e7ecd8b76e9d141672229e0e7f2031b1df730ca02bc282c69133d6427f8fa3c3b2520f4b78dd44d17654e84da8049cfdb2e0521330aefd351b14d63da4204d210f9e6256086804a960623a3d2ca19e031a82a7bb8427426a53b630ae8a172e7209bce7ae3dac01f95cf9a863b53c11bd773ef7c8cda019fafc384d23afcca074eff4a24fc8e42b7e7463da05c390804c93c279215c22b8972ed66aca4257031ffe437f46d96abda506832be987b311f8ce3a2ca9d604df6877a3bfdebf884baacfde27aa746758ead5702178d5a059c9be1bfabe95e4ffccbb9f055b862eb965708575e1577a54186252afed1a08b66df9f3a93ed626b92af7c19c2e686a989a9da2d608d077547d1947dbefa3222701f16a207c424f13171fb030b3a7fac4c00f162d70cd10ff28a7fdca2962b405e8123a2c7f6490eece511460b9ec44e8dfb566f4c36ffdf9f563c945e9cfedaa708bd7de1a3cbb08c997992bc5c686fb9656cbd663428a48ed748e16aa5c76f94b15a68fd79448adfb079e3448d1e3c901219fab3d5990e1f559a1142481441bdc3f6b710ab6218e396eba90f493b8269e9ff6ac9c603a2175990abc2e8013cd0ddba39df394a6b8fb98ee7f93f8c6f8ec7c26a774b65be4df809b7b7284722d0b1e22208df16f9b96e173afa5f1bce2764238dccbf8c87dc77f0cb4b4e6304584e7e2911bf13560cc9683e6b3d1bb319157512c34109f93277f58ae6ef76757285efaf193efc5e1e58bf91539e8aa3aee64a7958a9b23eaf5062285f05a6be75458707850594b32908df720632af5e33e70c571471ec0d5725a2e54db84807f1b81d439a43c1c63d1ed1a79d052d6bf826d649f3cb740c18afc25a7aaf60848cb19537bf225d550ea214ad0962a003abbad24f208b4d92a245fffdbec5d6ed17bf183b2ebec56c5fd1a3feeb854de651b6a91c18962bacaee9b98f7cd9621bb311137a230c3a2a4753bc9b93645be85c6cab341cb9f969005f5315234c01a84602b63ff6524c046d117cdcf1b4f24f70cffc061f9621cee000abb79733681f98648bb5a28eea15fac9dd9c7071bf95043c867397a86aeea775fc27d7e66f3b3ffcb740af238eff80acb3f376df7330226f6869575fb48a0c755ad61faea4263e8fa6f662b6f9af096840b8e1c2f13d157d9ce51dfcabd53a4f32dd43a6be153dd322a04476dc7fbcd33e64ccd362d2b0cbe67dd0a2b90998d19b90a2cf279e8a0ec9de0d17bda67e13b2ce94f95bac847e136c4390314fdf8d7eb64434a3fe84cf5c9a466a9a3a77b38c0b9c821363e96e2f64722e9e65c39b65029bea5ff5ef0f338bbfe346b845287b76ebe4491b8120ce79af4bb0c901903527405ad4ef9ab7d5a9ae6044d91a7a4298a2418991ba60fd6a1490606c5a0822bf2505f5af1267870cb281ae0465cba9ba00d3b6d10997ce547ba531026e8a74a08472ad9072be7565ace113faa7355df5666456fe0301662f8b15e2dcf88a646a1bbd0144e2049170486e596df923b054363a7ccb8b621c73b6ef3ed526f9348c0744c64a8b93a6aea43053b79fa28d9d1b5f59d72bb3e5e6e14e700ff7b25d24544249d4579f7b00bccd01d7615763ef2e2c72d684d5882187c0566cf6e03c12d43ab7d0f10c859872d7445b57beff84e9f393d6e69126710c3278f15f1a99dac4e48a051c06b2caa834f4db8395430307c955581bc558265734f05e670882f5264c68d5cc16578e9c0ca1be6b163d3e89e15d80aa6d06f534fbf3e71f1a77005d782ea151d39b2b29dafdbf3dfe070e4473eb4766bc839fa2dd2d5dee1e5a269463ee69e21d12f161b6d078562b260704df5a09fc1df2921fa54b1459fa4b8042680c9c00ba405d81d81a4fed7567561e0e0c7213df0bb1066a3d396da4da48889e5a142f1617bf01a105389f0495a4fdc7dacb8612073d560f1efa2d9bca65848a9b98d4e3f3950a704ef1bbaaa5d403c7726b43bf09d35f71580d4dbc2e829dd253b1652bccebd880705fd537991dd4c577cd4d8ef2a2951dac7eaa8a9c432aa709d0a908316be8e8b234c49e7f65ae26b63bd00384836c613d8dad1f25e6d22f67df66e4a3663e14da6e711ad716ef82f9ed54e0839a1fcd5c804ce9cc81732cdfe24f07084c60ce356a9aab26138271db171080370d5ac83fc15ba300a3f8a368da5799484382e99673856a95460add7f6f89b097c23d117fd1088b526762d8cff5c0d1c7a0f2647f658e9b92edc1cbf9c7fdfe2555eee14474580f348c5c14be1fda9bebbd32b46fa205175fdb1b3e6f63acfd6b936433a473c313a41a16aa574c89fc78b31f6a09c5308a9131c9da889f9a3a127faaec4c467b2015c191050c5570d52f5242b9de5130fe1164bd1a9ede13829e82da1756975909c3a0629b0f0361f43c96d3e9d54c213828b7a3837e35848fef12b958f7a9e722c3d3a7f7fa0edb4c0341506e399fe4100f54124505ecb5ef062b269481d04fae2dab51a752ebfad979f5716329b33f4c6db6740603c6737678147fd8c095843486eaf80d76f81ec24be0414fa4c3579fa6086c4efc84a0afc09f777347fd7b075fbc9373b34b86e13f33ceded0eae746c9db48c0587963c7c7fc9ce64c9e80059bf066ef6d4b9a98294f30eca18273601e7800485c24dc5e3a8e9b5f125dc1603df43f09a85280bfefcc4935abfa9ee91ba8f971b354697c8e98596a7e62c07b0ad399d577885adb989457c43c39bbe27734d09e771f347b8636bc7ff34cf60b479a03172fcdf42b42a024df50f59befaec0673c669615683293a6f2e302e7eb9dac413e1c52187724f9830749b3548cf6c69b1a623ecde41f63b2a97b875b1393ac2765f66b1781dadeac97f45608e8cb0271c974a079ec7c0e121ee2d43ddb8f985d7ed7adcfa4e261fd310c8533049a3410ae4847fba245b8417fdc51e27d857938d32e63684416ffb452e1b918521e4f3e8c61072c0a7b5e002b5f1cd3b4c73c0827a2a8806b1327cad250e64aa6191e6142077dccd2a6841770adfd257403161c6823b3bd24a1bd7732d297c757a748d2be79320317812cdec906b485f1507e81c8677425311d81fdd8d00cfe5369cb9e939d74877f3186769b399449f06fd3488ebd51bb1f39b9eb2b22f96455e762d8737adccb60bfa7d3c85313093f0ac5", &(0x7f0000000300)=""/136}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000980)={r5}) r8 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)={0xffffffffffffffff}, 0xc) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000a00)={r0, r8}) ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000800d127c88cc055ffffffffffff66b6d02b21acaaaaaaaaaa24000000000000aaaaaaaaaa1800"/52]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:22:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x394) [ 2992.820303][T29632] device 2273 entered promiscuous mode 23:22:07 executing program 3 (fault-call:6 fault-nth:25): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2992.956934][T29646] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2992.999524][T29635] device 1166 entered promiscuous mode 23:22:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x200000000000000) [ 2993.122436][T29652] FAULT_INJECTION: forcing a failure. [ 2993.122436][T29652] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2993.136308][T29652] CPU: 0 PID: 29652 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2993.144586][T29652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2993.154774][T29656] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2993.155358][T29652] Call Trace: [ 2993.155381][T29652] dump_stack+0x172/0x1f0 23:22:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x1000003a9) r1 = socket$kcm(0x2, 0x5, 0x84) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x76, &(0x7f0000000ac0)=r2, 0x8) r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r3, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) r4 = gettid() perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r5 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r5, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r7, 0x3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r7, 0x0, 0x49, 0x88, &(0x7f0000000340)="3936192e45da61978edd9e1c9ae6e8c589e1e73afae8f3688db7f4068b4a6d7ae3e299d72dda03044c9bdfa54ac2597a11d4f8a8ddb58da2b7b009db98716ca4d533e8529d11de0998", &(0x7f0000000440)=""/136, 0x200, 0x0, 0xf8, 0xb7, &(0x7f00000005c0)="9a5489903b56c8e460371a819c5e5cb7d8bc6ff8858ff3ae6dd2afea149f888ea96b3ae20096f74bf05d0587b0f85cb3cf62c25d3e2c4b081d951dab10e020cb9ac564633c49a8e95744fefa5905063a56979ecb1eb96b42728d727f005fa478c88bc569b27c04b37abc19ea4ad492bd153133a92e7626044a102c6c100ef2b08ae1c5d757c9a5bf19e23d80a4fe2ce9f16e1282608ee238dd042f146d5231dba966e3872ae2d158494d3a9ceaa04d8586fab0885964214ade3a42438a8ab07a8ae09e79bb302726690633112e22edf772c23ee4482640f8c74e571c9feb5bdaeda4dd0e3e9ccf34d3a501ab6211409322588df5f0e69607", &(0x7f00000006c0)="b2772f105207598cf188a27964560b297857107ac4e6f3e49b7e3e00417363ac3ea0253b91122e94c6f895c77c1cd668eace3006f8fd5bb6566e20df8eb8d868f4a1f7e09286a170d2ad23a396cbd5ae49ccee0286a6c2066d17c8f27aa3e0d437475d6e7e18838bb9c66036ecf3a924eb1a83b1b23e7ba6f35a6623852d6ae1847137262b7521fca5f5d4dcb9688bae13b11991174a2268f688452eb2247c842c8f35c0cb423b48db49c636c06b5ad9466361e21519b3"}, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r6, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000800d127c88cc055ffffffffffff6636d02b21acaaaa66980000000000000000aaaa00"/47]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2993.155404][T29652] should_fail.cold+0xa/0x15 [ 2993.177365][T29652] ? __kasan_check_read+0x11/0x20 [ 2993.182441][T29652] ? fault_create_debugfs_attr+0x180/0x180 [ 2993.188435][T29652] ? __kasan_check_read+0x11/0x20 [ 2993.193566][T29652] ? __lock_acquire+0x16f2/0x4a00 [ 2993.198707][T29652] should_fail_alloc_page+0x50/0x60 [ 2993.206741][T29652] __alloc_pages_nodemask+0x1a1/0x900 [ 2993.212338][T29652] ? ____cache_alloc_node+0x160/0x1d0 [ 2993.217998][T29652] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2993.223859][T29652] ? ____cache_alloc_node+0x160/0x1d0 [ 2993.229280][T29652] ? lock_downgrade+0x920/0x920 [ 2993.234159][T29652] cache_grow_begin+0x90/0xd20 [ 2993.238959][T29652] ? __kasan_check_read+0x11/0x20 [ 2993.243995][T29652] ? do_raw_spin_unlock+0x57/0x270 [ 2993.244013][T29652] ____cache_alloc_node+0x17a/0x1d0 [ 2993.244034][T29652] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2993.261297][T29652] kmem_cache_alloc+0x1ef/0x710 [ 2993.261320][T29652] ? mempool_alloc+0x380/0x380 [ 2993.261331][T29652] mempool_alloc_slab+0x47/0x60 [ 2993.261343][T29652] mempool_alloc+0x169/0x380 [ 2993.261361][T29652] ? mempool_destroy+0x40/0x40 [ 2993.261379][T29652] ? lock_downgrade+0x920/0x920 [ 2993.261397][T29652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2993.261412][T29652] ? __kasan_check_read+0x11/0x20 [ 2993.261431][T29652] bio_alloc_bioset+0x3bf/0x680 [ 2993.261451][T29652] ? blk_mq_sched_insert_requests+0x41b/0x680 [ 2993.276552][T29652] ? bvec_alloc+0x2f0/0x2f0 [ 2993.276570][T29652] ? __kasan_check_read+0x11/0x20 [ 2993.276585][T29652] ? mark_lock+0xc2/0x1220 [ 2993.276607][T29652] bio_clone_fast+0x26/0x110 [ 2993.276625][T29652] bio_split+0x86/0x260 [ 2993.276645][T29652] __blk_queue_split+0x8dd/0x1560 [ 2993.276669][T29652] ? blk_rq_map_sg+0x1b10/0x1b10 [ 2993.324964][T29652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2993.324988][T29652] blk_mq_make_request+0x17d/0x2280 [ 2993.325006][T29652] ? blk_queue_enter+0xbb3/0xe50 [ 2993.325029][T29652] ? blk_mq_try_issue_directly+0x1c0/0x1c0 [ 2993.361352][T29652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2993.361370][T29652] ? __kasan_check_read+0x11/0x20 [ 2993.361392][T29652] generic_make_request+0x23c/0xb50 [ 2993.361407][T29652] ? blk_queue_enter+0xe50/0xe50 [ 2993.361420][T29652] ? get_user_pages_fast+0x275/0x570 [ 2993.361440][T29652] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2993.361461][T29652] submit_bio+0x113/0x600 [ 2993.361474][T29652] ? submit_bio+0x113/0x600 [ 2993.361491][T29652] ? generic_make_request+0xb50/0xb50 [ 2993.361511][T29652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2993.361522][T29652] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2993.361535][T29652] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2993.361551][T29652] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2993.361567][T29652] ? trace_hardirqs_on+0x67/0x240 [ 2993.361580][T29652] ? __kasan_check_read+0x11/0x20 [ 2993.361601][T29652] do_blockdev_direct_IO+0x6a0d/0x8420 [ 2993.385359][T29652] ? sb_init_dio_done_wq+0x80/0x80 [ 2993.385381][T29652] ? __kasan_check_read+0x11/0x20 [ 2993.385397][T29652] ? __lock_acquire+0x16f2/0x4a00 [ 2993.385428][T29652] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2993.408463][T29652] ? lock_downgrade+0x920/0x920 [ 2993.408489][T29652] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2993.408509][T29652] __blockdev_direct_IO+0xa1/0xca [ 2993.408521][T29652] ? __blockdev_direct_IO+0xa1/0xca [ 2993.408538][T29652] ? bget_one+0x30/0x30 [ 2993.441459][T29652] ext4_direct_IO+0xc0d/0x1c50 [ 2993.441481][T29652] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2993.441508][T29652] generic_file_direct_write+0x20a/0x4a0 [ 2993.441529][T29652] __generic_file_write_iter+0x2ee/0x630 [ 2993.441548][T29652] ext4_file_write_iter+0x317/0x13c0 [ 2993.458097][T29652] ? ext4_release_file+0x380/0x380 [ 2993.458113][T29652] ? mark_lock+0xc2/0x1220 [ 2993.458135][T29652] ? __kasan_check_read+0x11/0x20 [ 2993.458153][T29652] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2993.458170][T29652] ? iov_iter_init+0xee/0x220 [ 2993.458194][T29652] new_sync_write+0x4d3/0x770 [ 2993.484654][T29652] ? new_sync_read+0x800/0x800 [ 2993.484683][T29652] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2993.484706][T29652] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2993.484725][T29652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2993.484742][T29652] __vfs_write+0xe1/0x110 [ 2993.484764][T29652] vfs_write+0x268/0x5d0 [ 2993.484784][T29652] ksys_write+0x14f/0x290 [ 2993.484798][T29652] ? __ia32_sys_read+0xb0/0xb0 [ 2993.484812][T29652] ? do_syscall_64+0x26/0x760 [ 2993.484827][T29652] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2993.484842][T29652] ? do_syscall_64+0x26/0x760 [ 2993.484860][T29652] __x64_sys_write+0x73/0xb0 [ 2993.484877][T29652] do_syscall_64+0xfa/0x760 [ 2993.484898][T29652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2993.484909][T29652] RIP: 0033:0x459f49 [ 2993.484924][T29652] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2993.484932][T29652] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2993.484946][T29652] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2993.484955][T29652] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2993.484963][T29652] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:22:08 executing program 3 (fault-call:6 fault-nth:26): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2993.484971][T29652] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2993.484980][T29652] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 [ 2993.747336][T29663] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 2993.778658][T29646] device 2274 entered promiscuous mode [ 2993.829539][T29656] device 1167 entered promiscuous mode [ 2993.865674][T29668] FAULT_INJECTION: forcing a failure. [ 2993.865674][T29668] name failslab, interval 1, probability 0, space 0, times 0 [ 2993.878522][T29668] CPU: 1 PID: 29668 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 2993.886433][T29668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2993.896608][T29668] Call Trace: [ 2993.899927][T29668] dump_stack+0x172/0x1f0 [ 2993.904284][T29668] should_fail.cold+0xa/0x15 [ 2993.908905][T29668] ? fault_create_debugfs_attr+0x180/0x180 [ 2993.914746][T29668] ? __kasan_check_read+0x11/0x20 [ 2993.919767][T29668] ? mark_lock+0xc2/0x1220 [ 2993.919786][T29668] __should_failslab+0x121/0x190 [ 2993.919803][T29668] should_failslab+0x9/0x14 [ 2993.919815][T29668] kmem_cache_alloc+0x47/0x710 [ 2993.919827][T29668] ? __lock_acquire+0x16f2/0x4a00 [ 2993.919844][T29668] ? __lock_acquire+0x16f2/0x4a00 [ 2993.948475][T29668] ? __debug_object_init+0x186/0xee0 [ 2993.953772][T29668] ? mempool_alloc+0x380/0x380 [ 2993.953785][T29668] mempool_alloc_slab+0x47/0x60 [ 2993.953801][T29668] mempool_alloc+0x169/0x380 [ 2993.968000][T29668] ? mempool_destroy+0x40/0x40 [ 2993.972786][T29668] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2993.978615][T29668] ? __kasan_check_read+0x11/0x20 [ 2993.983652][T29668] ? __lock_acquire+0x16f2/0x4a00 [ 2993.988680][T29668] ? __kasan_check_read+0x11/0x20 [ 2993.988706][T29668] sg_pool_alloc+0xb8/0xd0 [ 2993.988724][T29668] __sg_alloc_table+0x26b/0x3b0 [ 2993.988747][T29668] sg_alloc_table_chained+0xa9/0x200 [ 2994.008294][T29668] ? mac_pton+0x2e0/0x2e0 [ 2994.012625][T29668] scsi_init_io+0x127/0x6e0 [ 2994.012641][T29668] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2994.012658][T29668] sd_init_command+0x207/0x32d9 [ 2994.012673][T29668] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2994.012707][T29668] scsi_queue_rq+0x14a9/0x3020 [ 2994.027331][T29668] blk_mq_dispatch_rq_list+0x9f8/0x19e0 [ 2994.027351][T29668] ? lock_downgrade+0x920/0x920 [ 2994.027370][T29668] ? elv_rqhash_del+0x131/0x170 [ 2994.027388][T29668] ? cache_grow_begin.cold+0x2e/0x2f [ 2994.059083][T29668] ? blk_mq_get_driver_tag+0x590/0x590 [ 2994.064587][T29668] ? dd_dispatch_request+0x242/0x8e0 [ 2994.069903][T29668] ? scsi_mq_get_budget+0x155/0x320 [ 2994.075128][T29668] blk_mq_do_dispatch_sched+0x1a3/0x430 [ 2994.080704][T29668] ? blk_mq_sched_free_hctx_data+0x1f0/0x1f0 [ 2994.086715][T29668] blk_mq_sched_dispatch_requests+0x3f4/0x6d0 [ 2994.086738][T29668] ? lock_acquire+0x190/0x410 [ 2994.086773][T29668] ? blk_mq_sched_restart+0x90/0x90 [ 2994.086788][T29668] ? __kasan_check_read+0x11/0x20 [ 2994.086811][T29668] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2994.114026][T29668] __blk_mq_run_hw_queue+0x1cc/0x2e0 [ 2994.119948][T29668] ? blk_mq_hctx_mark_pending+0x250/0x250 [ 2994.125695][T29668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2994.126159][T29663] device 2275 entered promiscuous mode [ 2994.131947][T29668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2994.131966][T29668] __blk_mq_delay_run_hw_queue+0x53e/0x600 [ 2994.131986][T29668] blk_mq_run_hw_queue+0x19d/0x350 [ 2994.132002][T29668] ? blk_mq_delay_run_hw_queue+0x30/0x30 [ 2994.132025][T29668] ? dd_dispatch_request+0x8e0/0x8e0 [ 2994.132043][T29668] blk_mq_sched_insert_requests+0x308/0x680 [ 2994.132061][T29668] blk_mq_flush_plug_list+0x87a/0xd90 [ 2994.132083][T29668] ? blk_mq_insert_requests+0x640/0x640 [ 2994.132106][T29668] ? lock_downgrade+0x920/0x920 [ 2994.149718][T29668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2994.149742][T29668] blk_flush_plug_list+0x349/0x520 [ 2994.149759][T29668] ? blk_account_io_start+0xf3/0xd00 [ 2994.149777][T29668] ? __sanitizer_cov_trace_const_cmp2+0x1/0x20 [ 2994.149791][T29668] ? blk_insert_cloned_request+0x530/0x530 [ 2994.149810][T29668] ? bio_to_wbt_flags.isra.0.part.0+0x1d0/0x1d0 [ 2994.149829][T29668] blk_mq_make_request+0xaa8/0x2280 [ 2994.149848][T29668] ? blk_mq_try_issue_directly+0x1c0/0x1c0 [ 2994.160611][T29668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2994.160627][T29668] ? __kasan_check_read+0x11/0x20 [ 2994.160648][T29668] generic_make_request+0x23c/0xb50 [ 2994.160663][T29668] ? blk_queue_enter+0xe50/0xe50 [ 2994.160682][T29668] ? get_user_pages_fast+0x275/0x570 [ 2994.177228][T29668] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2994.177249][T29668] submit_bio+0x113/0x600 [ 2994.177265][T29668] ? submit_bio+0x113/0x600 [ 2994.270606][T29668] ? generic_make_request+0xb50/0xb50 [ 2994.270625][T29668] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2994.270644][T29668] ? do_blockdev_direct_IO+0x1a98/0x8420 [ 2994.288053][T29668] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2994.288074][T29668] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2994.288091][T29668] ? trace_hardirqs_on+0x67/0x240 [ 2994.288106][T29668] ? __kasan_check_read+0x11/0x20 [ 2994.288129][T29668] do_blockdev_direct_IO+0x6a0d/0x8420 [ 2994.288172][T29668] ? sb_init_dio_done_wq+0x80/0x80 [ 2994.288191][T29668] ? __kasan_check_read+0x11/0x20 [ 2994.288205][T29668] ? __lock_acquire+0x16f2/0x4a00 [ 2994.288244][T29668] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2994.299790][T29668] ? lock_downgrade+0x920/0x920 [ 2994.299815][T29668] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2994.299834][T29668] __blockdev_direct_IO+0xa1/0xca [ 2994.299848][T29668] ? __blockdev_direct_IO+0xa1/0xca [ 2994.299860][T29668] ? bget_one+0x30/0x30 [ 2994.299879][T29668] ext4_direct_IO+0xc0d/0x1c50 [ 2994.299894][T29668] ? ext4_dio_get_block_unwritten_sync+0x110/0x110 [ 2994.299916][T29668] generic_file_direct_write+0x20a/0x4a0 [ 2994.338947][T29668] __generic_file_write_iter+0x2ee/0x630 [ 2994.338970][T29668] ext4_file_write_iter+0x317/0x13c0 [ 2994.338990][T29668] ? ext4_release_file+0x380/0x380 [ 2994.339005][T29668] ? mark_lock+0xc2/0x1220 [ 2994.339026][T29668] ? __kasan_check_read+0x11/0x20 [ 2994.353799][T29668] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2994.353816][T29668] ? iov_iter_init+0xee/0x220 [ 2994.353835][T29668] new_sync_write+0x4d3/0x770 [ 2994.353855][T29668] ? new_sync_read+0x800/0x800 [ 2994.402905][T29668] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2994.402930][T29668] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2994.402948][T29668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2994.402969][T29668] __vfs_write+0xe1/0x110 [ 2994.402987][T29668] vfs_write+0x268/0x5d0 23:22:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x201000000000000) 23:22:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = gettid() perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r3 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x5450, 0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000000340)={0x1, 0x70, 0x5, 0xcf, 0x3, 0x1, 0x0, 0x6, 0x3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000300), 0x8}, 0x9480, 0xffffffff, 0xa10d, 0x1, 0x7fff, 0xeea, 0x7f}, r0, 0xd, r4, 0x6) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f00000002c0)={0x2, 0x35c}) r7 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x5450, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r5, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0xca, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x3}, 0x0, 0x0, &(0x7f00000004c0)={0x3, 0x1, 0xc9, 0x7}, &(0x7f0000000500)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x3}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0xffffffffffffffff, r7, 0x0, 0x12, &(0x7f00000003c0)='GPL\'{,em0eth1ppp1\x00', r8}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x3) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) r9 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000440)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000014c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51f1c3207f3e47f3, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, @perf_bp={&(0x7f0000000400), 0xc}, 0x24800, 0x5, 0x0, 0x0, 0x0, 0x64, 0x667a}, r9, 0xd, 0xffffffffffffffff, 0xd) openat$cgroup(r9, &(0x7f00000006c0)='\f\x00\x00\x15\xc1', 0x200002, 0x0) 23:22:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x39c) 23:22:09 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0xc00}, 0x0) [ 2994.403006][T29668] ksys_write+0x14f/0x290 [ 2994.403022][T29668] ? __ia32_sys_read+0xb0/0xb0 [ 2994.403042][T29668] ? do_syscall_64+0x26/0x760 [ 2994.449918][T29668] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2994.449940][T29668] ? do_syscall_64+0x26/0x760 [ 2994.467447][T29668] __x64_sys_write+0x73/0xb0 [ 2994.467468][T29668] do_syscall_64+0xfa/0x760 [ 2994.467493][T29668] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2994.467509][T29668] RIP: 0033:0x459f49 [ 2994.491368][T29668] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2994.491376][T29668] RSP: 002b:00007f7d33f68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2994.491391][T29668] RAX: ffffffffffffffda RBX: 00007f7d33f68c90 RCX: 0000000000459f49 [ 2994.491401][T29668] RDX: 000000010000000d RSI: 0000000020000000 RDI: 0000000000000004 [ 2994.491409][T29668] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2994.491418][T29668] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f696d4 [ 2994.491427][T29668] R13: 00000000004ca641 R14: 00000000004e27c0 R15: 0000000000000005 23:22:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x300000000000000) [ 2994.636570][T29674] device 1168 entered promiscuous mode 23:22:09 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x02:\x00', 0x2}) 23:22:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @local}, 0x3, 0x3, 0x1, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000440)="0ee5d0e3fb80697b74c1736b21ebf57c946260cacafdd29027c444fd7b94cd09f5b64c63e9c16f63c4345eef56b67af1ce1bf99ce59dc4fcb508d23a8275e2bb30f385f9b781f435b6edec8a30a8b5096eefde96aa25e81fa633a62fe1932f5c822d412ed246ed37cc90a747a97a10a13b74077f3ffe64e59fddd705b3839ce2c4eb5f8db02c459adfe6f03bb288025fd97958ad388fdabae41f868c7024b7dbbd34c65e71019c7db4829f", 0xab}, {&(0x7f0000000500)="bda1e5e7a927669675d96f4f7b5acba29c08f962f207240e58fcc6a28bee2acbea0df3ae4abaff4ba7c706eda77a2d1eca9e393d49921085729f68ca938a2bcf398fed35afdef4bbc8b896edef3e989a5bcc2b1f503d7c56fcada949806042a12750c1fe62", 0x65}], 0x2, &(0x7f0000000580)=[{0x10, 0x1f1, 0xfff}, {0xe8, 0x110, 0x20, "da100d895f146a3cb83101ec9cce25fde108263208d3530ecdd0eb2333526a6893e684d8af729b7d97fce627391611360df63a267896d7741434c5e02b6f9a18a64cac6a4498b995b32d34d3f8517b4a64dae3f22b113f3a8a9172c2fbca66c772e1e4bf6947e042b6287e4105424dd091b88579d0fcf544f4b513400ad72fe7eba77e2e9974fd90caddb545068b01738453bd906ec21b1104388bfcb33379b5e0f2858dcb2cbd7ba23376d2835c2d5b0052c0f2a19ec72de74a9d1af71d33440864b000089774a73ec7846f1f32ec80791d50"}, {0xc0, 0x88, 0x800, "119bb3f9f877ed2dd20caca9538d88d366e3e06ff08b163d73c4232c53a30dc2122a7cf40a70fd30e4cc2d121981bc5d2604cfc9150daab2bab1ee9772562283418b984de01ee44db24278ded0f4174dead10e5a464c1b9486731390498804e10f099d1efe6b75126b411e297c2d8e585b880a10e0c833ef6f10a5fc50cd9437190e6090ecc56694b41c45c16548f482e8bca798d1acf37788f7bf976d209bec73b9b15fb820ffdd89735138418139"}, {0x88, 0x0, 0x3, "a06b192a4c85caffd869f29a6774759faee7fc765c40e4a5fa7ad16b7d07de457d020cef2b3095bd35ba36e0782d0fece5c308d1e0558f34e0851832a0da99da65dfad6c19479982f6528d9fbe8728796189db66bc6d4cbe6a98799b846517f8bd19a0579d47871f0eabe65c9806435b3e625c699c351e47"}], 0x240}, 0x4000080) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = gettid() perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r3 = socket$kcm(0x2, 0x5, 0x84) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) write$cgroup_subtree(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="7e4a7a006386dd20bfa6"], 0x9213) ioctl$TUNSETLINK(r4, 0x400454cd, 0x206) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:22:09 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2994.922066][T29680] device 2276 entered promiscuous mode 23:22:09 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100000002) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2995.133926][T29691] device 1169 entered promiscuous mode 23:22:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x400000000000000) 23:22:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3a4) [ 2995.276285][T29694] device 2277 entered promiscuous mode 23:22:10 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100000003) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:22:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x500000000000000) [ 2995.531719][T29713] device 1170 entered promiscuous mode 23:22:10 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100000004) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:22:10 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0xd00}, 0x0) [ 2995.679333][T29728] validate_nla: 6 callbacks suppressed [ 2995.679377][T29728] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:22:10 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100000005) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2995.845529][T29716] device 2278 entered promiscuous mode 23:22:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3aa) 23:22:10 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa4:\x00', 0x2}) [ 2995.955738][T29728] device 1171 entered promiscuous mode 23:22:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0x29, 0x5, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:22:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x600000000000000) [ 2996.034359][T29745] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:22:10 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100000006) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2996.177116][T29754] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:22:11 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100000007) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2996.437549][T29745] device 2279 entered promiscuous mode [ 2996.463822][T29763] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:22:11 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0xe00}, 0x0) 23:22:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = gettid() r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x5450, 0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0x3b, 0x4, 0x0, 0x5, 0x0, 0x1ff, 0x410, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3f, 0x3, @perf_config_ext={0x7f, 0x9}, 0x4, 0x0, 0x4, 0x8, 0x7, 0x8, 0xffff}, r1, 0x0, r2, 0x8) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r3 = gettid() perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r4 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r4, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000800d127c88cc055ffffffffffff6636d02b21acaaaaaaaaaa24000000000000aaaaaaaaaa1800000000000000001f000000"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:22:11 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100000008) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:22:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x602000000000000) [ 2996.719663][T29754] device 1172 entered promiscuous mode [ 2996.789731][T29763] device 2280 entered promiscuous mode 23:22:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3ac) [ 2996.897243][T29785] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:22:11 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x0f;\x00', 0x2}) [ 2996.981614][T29789] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:22:11 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100000009) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:22:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) [ 2997.223480][T29785] device 1173 entered promiscuous mode 23:22:12 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0xe8c}, 0x0) 23:22:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x700000000000000) 23:22:12 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000a) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2997.506334][T29812] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 2997.565894][T29789] device 2281 entered promiscuous mode [ 2997.611039][T29819] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:22:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d000598d95a80648c63940d0124fcd5ec20c60179d54ef0a3953000100002400200a06d053582c13715", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000840)={&(0x7f0000000600)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000680)=""/86, 0x56}, {&(0x7f0000000700)=""/11, 0xb}], 0x2, &(0x7f0000000780)=""/188, 0xbc}, 0x2200) bpf$MAP_CREATE(0x0, &(0x7f0000000880)={0x11, 0x2, 0x1, 0x5e3, 0x10, 0x1, 0x1, [], r2, r0, 0x0, 0x5}, 0x3c) socketpair(0xa, 0x4, 0xff, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) openat$cgroup(r3, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) r5 = gettid() perf_event_open(0x0, r5, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r6 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r6, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r7, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="de000800d12753e75eeb9783e060ffff6636d02b21acaaaaaaaaaa24000000000000aaaaaaaaaa18aaaaaaaaaa26000000000000"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r8, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:22:12 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000b) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:22:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x800000000000000) [ 2997.731194][T29812] device 1174 entered promiscuous mode [ 2997.780189][T29819] device 2282 entered promiscuous mode [ 2997.855386][T29827] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:22:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3bc) [ 2997.970670][T29830] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2998.006619][T29837] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:22:12 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000c) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:22:12 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa4;\x00', 0x2}) [ 2998.105384][T29827] device 1175 entered promiscuous mode 23:22:12 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0xec0}, 0x0) 23:22:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x900000000000000) 23:22:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000440)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000014c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51f1c3207f3e47f3, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, @perf_bp={&(0x7f0000000400), 0xc}, 0x24800, 0x5, 0x0, 0x0, 0x0, 0x64, 0x667a}, r0, 0xd, 0xffffffffffffffff, 0xd) r1 = socket$kcm(0x2, 0x5, 0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x76, &(0x7f0000000ac0)=r2, 0x8) openat$cgroup_ro(r2, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) r4 = gettid() perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r5 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r5, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r6, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000800d127c88cc055ffffffffffff6636d02b21acaaaaaaaaaa240000000000288f6351aaaa180000000000000000000000a1"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 2998.505930][T29837] device 2283 entered promiscuous mode 23:22:13 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000f) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2998.627160][T29861] device 1176 entered promiscuous mode 23:22:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xa00000000000000) [ 2998.724858][T29866] device 2284 entered promiscuous mode 23:22:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3ca) 23:22:13 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100000010) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2999.114397][T29875] device 1177 entered promiscuous mode 23:22:13 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x3f00}, 0x0) 23:22:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x5450, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x5) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) r6 = socket$kcm(0x2, 0x5, 0x84) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x14}, 0x10) setsockopt$sock_attach_bpf(r6, 0x84, 0x76, &(0x7f0000000ac0)=r8, 0x4) r9 = openat$cgroup_ro(r7, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r9, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r9, &(0x7f0000000040), &(0x7f0000000300)=""/157}, 0x20) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:22:13 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x03<\x00', 0x2}) 23:22:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xa01000000000000) 23:22:14 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x100008800) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 2999.507064][T29879] device 2285 entered promiscuous mode 23:22:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3d2) 23:22:14 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x12000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:22:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0xffffffc6) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = gettid() perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x3, 0x3, 0x1f, 0x1, 0x0, 0x9, 0x88320, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={0xffffffffffffffff, 0x11}, 0x8080, 0x1000, 0x80000000, 0x5, 0xfffffffffffffffa, 0x2f, 0x8000}, 0x0, 0xd, r0, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r3 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000800d127c88cc155ffffffff00000000aaaaaaaaaa1800"/36]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) r6 = socket$kcm(0x2, 0x5, 0x84) r7 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x5450, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f0000000380)=0xfffffffffffffff7) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r6, 0x84, 0x76, &(0x7f0000000ac0)=r8, 0x8) openat$cgroup_ro(r8, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) [ 2999.794616][T29899] device 1178 entered promiscuous mode 23:22:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xa03000000000000) 23:22:14 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r1}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r1, 0x81}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = gettid() write$cgroup_pid(r2, &(0x7f0000000000)=r3, 0x12) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:22:14 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7e4a7a006386dd20bfa6"], 0x9213) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000100)=0xb4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) close(r2) 23:22:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='-\x00') r3 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000800d127c88cc055ffffffffffff6636d02b21acffc2aaaaaa24000000000000aaaeaaaaaa1800"/52]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 3000.226760][T29913] device 2286 entered promiscuous mode [ 3000.388277][T29924] device 1179 entered promiscuous mode 23:22:15 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x4000}, 0x0) 23:22:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3d4) 23:22:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xc03000000000000) 23:22:15 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa4<\x00', 0x2}) [ 3000.842333][T29946] device 2287 entered promiscuous mode [ 3000.878198][T29959] validate_nla: 9 callbacks suppressed [ 3000.878207][T29959] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:22:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x30200, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0xb, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = gettid() perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = socket$kcm(0x2, 0x5, 0x84) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r0, 0xffffffffffffffff, &(0x7f0000000440)=""/243, 0x2}, 0x20) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0xe7153ef40ec84af) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[@ANYBLOB="7e4a7a006386dd20bfa6"], 0x9213) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'veth1_to_bond\x00', 0x3c03}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) write$cgroup_int(r5, &(0x7f0000000340)=0x1, 0x12) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0x8a2d7, 0x2, 0xcd3, 0xd2d, 0x8}) [ 3000.958742][T29949] device 1180 entered promiscuous mode 23:22:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0xe00000000000000) [ 3001.015088][T29959] device 2288 entered promiscuous mode 23:22:15 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa4=\x00', 0x2}) 23:22:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3da) [ 3001.175963][T29967] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:22:15 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x5865}, 0x0) 23:22:16 executing program 3: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x4) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000d80)=ANY=[], &(0x7f0000000600)=""/181, 0x0, 0xb5}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) openat$cgroup_ro(r2, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r2, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x7, 0x1}, 0x0, 0x0, &(0x7f0000000540)={0x0, 0x3, 0x5, 0x8}, &(0x7f0000000580)=0x6, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x3d0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b00)={r1, 0x10, &(0x7f0000000ac0)={&(0x7f0000000900)=""/167, 0xa7, r3}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r3, 0xffffffffffffffeb) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f0000000280)={&(0x7f0000000240)=""/25, 0x19, r3}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r0, 0x10, &(0x7f0000000300)={&(0x7f0000000180)=""/181, 0xb5, r4}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) r6 = gettid() r7 = socket$kcm(0x2, 0x5, 0x84) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r7, 0x84, 0x76, &(0x7f0000000ac0)=r8, 0x8) r9 = openat$cgroup_ro(r8, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r6, r9, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r9, 0x21d92ae56d8bd57a, 0x1, 0x9, &(0x7f0000000040)=[0x0], 0x1}, 0x20) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 3001.351468][T29978] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3001.526712][T29967] device 1181 entered promiscuous mode [ 3001.583387][T29967] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:22:16 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0x2, 0x5, 0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x76, &(0x7f0000000ac0)=r2, 0x8) r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r3, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) r4 = socket$kcm(0x2, 0x5, 0x84) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x76, &(0x7f0000000ac0)=r5, 0x8) r6 = openat$cgroup_ro(r5, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r6, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) sendmsg$tipc(r6, &(0x7f00000002c0)={&(0x7f0000000100)=@id={0x1e, 0x3, 0x0, {0x4e24, 0x1}}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000180)="3369845c1f13ea3d7c10c9fa1168d21899f9fe2d78e0d8235a7f16d8fd72f0f3ee2fa844850cecec577d55b241d56122a241759aed896482b0c6b774b4a018f6d2e9e1bd1e2ef560fa19646c39e20221a19949ffef0116d28b61876167886092c63993acd7046e49f7c4eb8e9e6cb22990bfe07c2b5f6b7d503041da1a06d9af2804db9675d383c9efb8184a6749499f00596c4224503156c88d79e04669141f10c7779c5922", 0xa6}], 0x1, &(0x7f0000000280)="3848da463a604407b27fb83979a773d3a14888db51fac033108689107ef6ec6c1b5b8cdea7296fe857b420834bdde186e323326afcfe750c16e9008623b3", 0x3e, 0x40}, 0x6001041) openat$cgroup_ro(r3, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r7, 0x3) openat$cgroup(r7, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r8 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000014c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51f1c3207f3e47f3, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, @perf_bp={&(0x7f0000000400), 0xc}, 0x24800, 0x5, 0x0, 0x0, 0x0, 0x64, 0x667a}, r8, 0xd, 0xffffffffffffffff, 0xd) openat$cgroup_ro(r8, 0x0, 0x26e1, 0x1a0ffffffff) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r9, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 3001.833806][T29978] device 2289 entered promiscuous mode [ 3001.835435][ T26] audit: type=1804 audit(1572391336.534:44): pid=29993 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name=2F02726F75702E73746170 dev="sda1" ino=16547 res=1 [ 3001.868180][T29995] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:22:16 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x1, 0x1, 0xa3, 0x2, 0x0, 0x80, 0x4910c, 0x7, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000040), 0x15}, 0x10, 0x9, 0x6, 0x8, 0x3, 0x1, 0x2729}, r1, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 3001.913866][T29967] device 1182 entered promiscuous mode 23:22:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x1200000000000000) 23:22:16 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7e4a7a006386dd20bfa6"], 0x9213) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'bridge_slave_1\x00', 0x2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r1, 0x3) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)="4feaef"}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d000598d95a80648c63940d0124fcd5ec20c60179d54ef0a3953000100002400200a06d053582c13715", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000180), 0x4) gettid() ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 3002.059736][T29995] device 2290 entered promiscuous mode 23:22:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3dc) [ 3002.161856][T30003] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:22:16 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa4>\x00', 0x2}) [ 3002.260133][T30010] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3002.271802][T30003] device 1183 entered promiscuous mode 23:22:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000440)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000014c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51f1c3207f3e47f3, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, @perf_bp={&(0x7f0000000400), 0xc}, 0x24800, 0x5, 0x0, 0x0, 0x0, 0x64, 0x667a}, r5, 0xd, 0xffffffffffffffff, 0xd) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={r5, 0x15, 0x1, 0x5, &(0x7f0000000040)=[0x0], 0x1}, 0x20) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000440)=ANY=[@ANYBLOB="02000800d127c88cc055ffffffffffff6636d02b21acaaaaaaaaaa41000000000000aaaaaaaaaa180000000000000000000000001a9332b7ecabb7561b0efdc2a13fa752141eb01d6fd665b314664b1462c914d2737bba58669fdcacef615a64ef25c3fd3e2b03f2e20027cb322e97562704d64fbf0e39b290da72f4442c2952e5c4228134951da37ee07ed177b24d61e6e243f5ab6a89388ca5025d2cb268a54199a458b2d5cf530a92d45516b94d770d10c6e521271cd9a16e297036cd72437a45e36c353a4669ba91312901fc3fe10990c84a671ebc9f0bc74f6d0604d030511b62bc170b20fd4e0b4241ae"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:22:17 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x6000}, 0x0) 23:22:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x1202000000000000) [ 3002.385497][T30015] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3002.516989][T30026] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 3002.656166][T30010] device 2291 entered promiscuous mode 23:22:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3e2) [ 3002.778216][T30031] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3002.879161][T30026] device 1184 entered promiscuous mode 23:22:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x1401000000000000) 23:22:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_bp={&(0x7f0000000040), 0xa}, 0x38946e6ae566e8a0, 0xf3b, 0x9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 3002.950028][T30036] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3003.110509][T30031] device 2292 entered promiscuous mode [ 3003.120272][T30044] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:22:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000340)=ANY=[@ANYBLOB="0200080800000000000000ffffffffff6636d02b21acaaaaaaaaaa24000000000000aaaaaaaaaa18000000000000000007d40b09082fc9162b6502c74e00000000"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 3003.296983][T30044] device 1185 entered promiscuous mode 23:22:18 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x348) r0 = socket$kcm(0x2, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x76, &(0x7f0000000ac0)=r1, 0x8) openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:22:18 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x00?\x00', 0x2}) [ 3003.363887][T30045] device 2293 entered promiscuous mode 23:22:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3e4) [ 3003.410351][T30044] device 1186 entered promiscuous mode 23:22:18 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x6558}, 0x0) 23:22:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x1803000000000000) 23:22:18 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)={0x0, 0x1}, 0xc) socket$kcm(0x29, 0x5, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) perf_event_open(&(0x7f00000037c0)={0x3, 0x70, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2402, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x12100, 0x9, 0x0, 0x4, 0x7fffffff, 0x6, 0x3}, 0x0, 0x693, r1, 0x3) r2 = socket$kcm(0x2, 0x5, 0x84) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0)=r3, 0x8) openat$cgroup_ro(r3, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x5, 0x84) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x76, &(0x7f0000000ac0)=r5, 0x8) openat$cgroup_ro(r5, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000440)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000014c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51f1c3207f3e47f3, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x7f, 0x4, 0x7, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, @perf_bp={&(0x7f0000000400), 0xc}, 0x24800, 0x5, 0x0, 0x0, 0x0, 0x64, 0x667a}, r6, 0xd, 0xffffffffffffffff, 0xd) openat$cgroup_ro(r0, 0x0, 0x26e1, 0x1a0ffffffff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r7, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:22:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cgroup.events\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000005c0)={&(0x7f00000003c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) r3 = socket$kcm(0x2, 0x5, 0x84) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0)=r4, 0x8) r5 = openat$cgroup_ro(r4, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r5, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='%\x00', r5}, 0x10) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x5450, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x3, 0xd3, 0xf7, 0xf7, 0x0, 0x2, 0x800, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x4}, 0x808, 0xfffffffffffffffd, 0xffffffe1, 0x2, 0x3, 0x0, 0x8}, r2, 0xf, r6, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r7 = gettid() perf_event_open(0x0, r7, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r8 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r8, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x4, 0x2, 0x6, 0x9, 0x0, 0x5, 0x40601, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffa, 0x4, @perf_config_ext={0x2, 0x77f}, 0x80, 0xfffffffffffffffc, 0x8, 0x0, 0x4, 0x5, 0x1}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) ioctl$TUNSETTXFILTER(r9, 0x400454d1, &(0x7f0000000440)=ANY=[@ANYBLOB="02000800d127c88cc055ffff07ffffff6636d02b21acaaaaaaaa0000aaaaaaaaaa18000000000900000000000000f557980b6ce7e0b9ba0a9eea2f35af24ef5ca21d4523706110522c348a05d6fdfa260b1fad6bfd5a2f9f8305ed4326db30f74d9c0f56a14e3f463f2daefab84306bda792eb33153855637e189800cafeabff0f46984bf9db81597bd46fb07b3bd3b76051af9a4a80501b5eb5e59edca58c0572107ca6535d00040000000000002356f964d8bb46ab4ce54ecee873a0f7b08480423ffa45133cd7a0f04f0748b34520fb55d249d72815c6914492efae8f6337f89012a74f044875462cc9456d83b3577f1e3beb104dd4d15c6be1c2d2f43e5b224f7e71eeb7b921ca03e58ec86e593f"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r10, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:22:18 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x26e1, 0x1a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:22:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0xffffff43) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r3, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x4]}, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) close(0xffffffffffffffff) r5 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000440)=r5, 0x12) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3f, 0x5, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x5, 0x10000, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x9, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, @perf_config_ext={0x8ab, 0x5}, 0x24800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x667a}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x801c581f, 0x20000000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f00000000c0)='memory'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r5, 0xffffffffffffffff, 0x0, 0xc, &(0x7f00000000c0)='cgroup.stat\x00'}, 0x30) write$cgroup_int(r2, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00'}, 0x10) [ 3004.154759][T30068] device 2294 entered promiscuous mode [ 3004.216541][T30069] device 1187 entered promiscuous mode 23:22:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3ea) 23:22:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x1a00000000000000) 23:22:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r2, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r3 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f0000000340)=ANY=[@ANYBLOB="02000800d127c88cc055ffffffffffff6636d02b21acaaaaaaaaaa24000000000000aaaaaaaaaa1800000000000000000000000037d41b5a4bac38413fbbd35a298256f19de22cd41e06c03ca0c3907bc93946d4d83b01d3ecbeb90675bed03e3f7f509b0416bcfe3c"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:22:19 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa4?\x00', 0x2}) [ 3004.863481][T30091] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3004.958707][T30097] device 2295 entered promiscuous mode 23:22:19 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x8100}, 0x0) [ 3005.053299][T30091] CPU: 1 PID: 30091 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 3005.064717][T30091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3005.074808][T30091] Call Trace: [ 3005.078345][T30091] dump_stack+0x172/0x1f0 [ 3005.084035][T30091] dump_header+0x10b/0x82d [ 3005.088959][T30091] ? oom_kill_process+0x94/0x3f0 [ 3005.094047][T30091] oom_kill_process.cold+0x10/0x15 [ 3005.099176][T30091] out_of_memory+0x334/0x1340 [ 3005.099193][T30091] ? lock_downgrade+0x920/0x920 [ 3005.099211][T30091] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 3005.099224][T30091] ? oom_killer_disable+0x280/0x280 [ 3005.099247][T30091] mem_cgroup_out_of_memory+0x1d8/0x240 [ 3005.099262][T30091] ? memcg_stat_show+0xc40/0xc40 [ 3005.099282][T30091] ? do_raw_spin_unlock+0x57/0x270 [ 3005.099301][T30091] ? _raw_spin_unlock+0x2d/0x50 [ 3005.099319][T30091] try_charge+0xf4b/0x1440 [ 3005.099344][T30091] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 3005.099357][T30091] ? percpu_ref_tryget_live+0x111/0x290 [ 3005.099374][T30091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3005.099392][T30091] ? __kasan_check_read+0x11/0x20 [ 3005.121866][T30091] ? get_mem_cgroup_from_mm+0x156/0x320 [ 3005.121884][T30091] mem_cgroup_try_charge+0x136/0x590 [ 3005.121904][T30091] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 3005.121921][T30091] __handle_mm_fault+0x1f0d/0x4040 [ 3005.121938][T30091] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 3005.121955][T30091] ? handle_mm_fault+0x292/0xaa0 [ 3005.143976][T30091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3005.143994][T30091] ? __kasan_check_read+0x11/0x20 [ 3005.144015][T30091] handle_mm_fault+0x3b7/0xaa0 [ 3005.144038][T30091] __do_page_fault+0x536/0xdd0 [ 3005.144060][T30091] do_page_fault+0x38/0x590 [ 3005.144078][T30091] page_fault+0x39/0x40 [ 3005.161146][T30091] RIP: 0033:0x41173f [ 3005.161161][T30091] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 3005.161168][T30091] RSP: 002b:00007ffeb5a3aa20 EFLAGS: 00010206 [ 3005.161179][T30091] RAX: 00007f7d33ee6000 RBX: 0000000000020000 RCX: 0000000000459f9a [ 3005.161187][T30091] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 3005.161195][T30091] RBP: 00007ffeb5a3ab00 R08: ffffffffffffffff R09: 0000000000000000 [ 3005.161203][T30091] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffeb5a3abf0 [ 3005.161209][T30091] R13: 00007f7d33f06700 R14: 0000000000000003 R15: 000000000075c124 [ 3005.209132][T30091] memory: usage 10304kB, limit 0kB, failcnt 29 [ 3005.227226][T30091] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3005.330583][T30091] Memory cgroup stats for /syz3: [ 3005.330688][T30091] anon 106496 [ 3005.330688][T30091] file 65536 [ 3005.330688][T30091] kernel_stack 65536 [ 3005.330688][T30091] slab 9797632 [ 3005.330688][T30091] sock 0 [ 3005.330688][T30091] shmem 0 [ 3005.330688][T30091] file_mapped 0 [ 3005.330688][T30091] file_dirty 0 [ 3005.330688][T30091] file_writeback 0 [ 3005.330688][T30091] anon_thp 0 [ 3005.330688][T30091] inactive_anon 0 [ 3005.330688][T30091] active_anon 147456 [ 3005.330688][T30091] inactive_file 86016 [ 3005.330688][T30091] active_file 0 [ 3005.330688][T30091] unevictable 0 [ 3005.330688][T30091] slab_reclaimable 4190208 [ 3005.330688][T30091] slab_unreclaimable 5607424 [ 3005.330688][T30091] pgfault 709995 [ 3005.330688][T30091] pgmajfault 0 [ 3005.330688][T30091] workingset_refault 0 [ 3005.330688][T30091] workingset_activate 0 [ 3005.330688][T30091] workingset_nodereclaim 0 [ 3005.330688][T30091] pgrefill 0 [ 3005.330688][T30091] pgscan 233 [ 3005.330688][T30091] pgsteal 222 [ 3005.330688][T30091] pgactivate 0 [ 3005.438601][T30091] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=8749,uid=0 [ 3005.457705][T30091] Memory cgroup out of memory: Killed process 8749 (syz-executor.3) total-vm:72452kB, anon-rss:112kB, file-rss:35776kB, shmem-rss:0kB, UID:0 pgtables:126976kB oom_score_adj:0 [ 3005.481340][ T1071] oom_reaper: reaped process 8749 (syz-executor.3), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 3005.481567][T30098] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 3005.512823][T30098] CPU: 1 PID: 30098 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 3005.522322][T30098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3005.522329][T30098] Call Trace: [ 3005.522355][T30098] dump_stack+0x172/0x1f0 [ 3005.522374][T30098] dump_header+0x10b/0x82d [ 3005.522392][T30098] oom_kill_process.cold+0x10/0x15 [ 3005.522409][T30098] out_of_memory+0x334/0x1340 [ 3005.522429][T30098] ? oom_killer_disable+0x280/0x280 [ 3005.522458][T30098] mem_cgroup_out_of_memory+0x1d8/0x240 [ 3005.522471][T30098] ? memcg_stat_show+0xc40/0xc40 [ 3005.522494][T30098] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 3005.522510][T30098] ? cgroup_file_notify+0x140/0x1b0 [ 3005.522527][T30098] memory_max_write+0x262/0x3a0 [ 3005.522545][T30098] ? mem_cgroup_write+0x370/0x370 [ 3005.522561][T30098] ? lock_acquire+0x190/0x410 [ 3005.522578][T30098] ? kernfs_fop_write+0x227/0x480 [ 3005.522599][T30098] cgroup_file_write+0x241/0x790 [ 3005.522618][T30098] ? mem_cgroup_write+0x370/0x370 [ 3005.558724][T30098] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 3005.604230][T30098] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 3005.604250][T30098] kernfs_fop_write+0x2b8/0x480 [ 3005.604269][T30098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3005.604285][T30098] __vfs_write+0x8a/0x110 [ 3005.604304][T30098] ? kernfs_fop_open+0xd80/0xd80 [ 3005.648302][T30098] vfs_write+0x268/0x5d0 [ 3005.648323][T30098] ksys_write+0x14f/0x290 [ 3005.648341][T30098] ? __ia32_sys_read+0xb0/0xb0 [ 3005.648362][T30098] ? do_syscall_64+0x26/0x760 [ 3005.676061][T30098] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3005.682315][T30098] ? do_syscall_64+0x26/0x760 [ 3005.687030][T30098] __x64_sys_write+0x73/0xb0 [ 3005.691650][T30098] do_syscall_64+0xfa/0x760 [ 3005.696181][T30098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3005.702086][T30098] RIP: 0033:0x459f49 [ 3005.705992][T30098] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3005.706000][T30098] RSP: 002b:00007f7d33f26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3005.706015][T30098] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f49 [ 3005.706023][T30098] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 3005.706032][T30098] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 3005.706040][T30098] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d33f276d4 [ 3005.706049][T30098] R13: 00000000004ca630 R14: 00000000004e27a8 R15: 00000000ffffffff [ 3005.773924][T30098] memory: usage 10188kB, limit 0kB, failcnt 38 [ 3005.789043][T30098] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 3005.791308][T30101] device 1188 entered promiscuous mode [ 3005.796309][T30098] Memory cgroup stats for /syz3: [ 3005.796409][T30098] anon 106496 [ 3005.796409][T30098] file 65536 [ 3005.796409][T30098] kernel_stack 0 [ 3005.796409][T30098] slab 9797632 [ 3005.796409][T30098] sock 0 [ 3005.796409][T30098] shmem 0 [ 3005.796409][T30098] file_mapped 0 [ 3005.796409][T30098] file_dirty 0 [ 3005.796409][T30098] file_writeback 0 [ 3005.796409][T30098] anon_thp 0 [ 3005.796409][T30098] inactive_anon 0 [ 3005.796409][T30098] active_anon 147456 [ 3005.796409][T30098] inactive_file 86016 [ 3005.796409][T30098] active_file 0 [ 3005.796409][T30098] unevictable 0 23:22:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0xfffffe34) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 3005.796409][T30098] slab_reclaimable 4190208 [ 3005.796409][T30098] slab_unreclaimable 5607424 [ 3005.796409][T30098] pgfault 709995 [ 3005.796409][T30098] pgmajfault 0 [ 3005.796409][T30098] workingset_refault 0 [ 3005.796409][T30098] workingset_activate 0 [ 3005.796409][T30098] workingset_nodereclaim 0 [ 3005.796409][T30098] pgrefill 0 [ 3005.796409][T30098] pgscan 233 [ 3005.796409][T30098] pgsteal 222 [ 3005.796409][T30098] pgactivate 0 [ 3005.938497][T30098] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=30091,uid=0 [ 3005.955389][T30098] Memory cgroup out of memory: Killed process 30098 (syz-executor.3) total-vm:72980kB, anon-rss:180kB, file-rss:35800kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:1000 [ 3005.974549][ T1071] oom_reaper: reaped process 30098 (syz-executor.3), now anon-rss:0kB, file-rss:34840kB, shmem-rss:0kB 23:22:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3ec) [ 3006.017673][T30112] device 2296 entered promiscuous mode [ 3006.050871][T30117] device 1189 entered promiscuous mode 23:22:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x2000000000000000) 23:22:20 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) gettid() r1 = socket$kcm(0x2, 0x5, 0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x76, &(0x7f0000000ac0)=r2, 0x8) openat$cgroup_ro(r2, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r2, 0x0, 0x26e1, 0x0) [ 3006.173801][T30130] validate_nla: 8 callbacks suppressed [ 3006.173847][T30130] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3006.192647][T30131] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:22:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000040)={'syz_tun\x00', @dev={[], 0x26}}) 23:22:21 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = socket$kcm(0x2, 0x5, 0x84) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x76, &(0x7f0000000ac0)=r2, 0x8) openat$cgroup_ro(r2, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r2, &(0x7f0000000180)="e5444c5b1da7fc008d22c8a61ad021f95cd48e5dbea8190b7d7bca2e35774f27a6a96ae4a21b83d68c484f95fcd5d4696df7a5125e1da22cb8bb170aa9279fb555f1654bce302d7a5442e2d226bc1966b97b335378586a54144b3779e17f3b055f0c219e21ad268f1cc18810cb10ac3503790c7482beac90d931d2b24d4a60d6770bfaab227fbbcf4f1c79abc40678428236", &(0x7f0000000240)="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"}, 0x20) socket$kcm(0x29, 0x0, 0x0) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 3006.492491][T30130] device 2297 entered promiscuous mode 23:22:21 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x8c0e}, 0x0) 23:22:21 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x00\x00@\x00', 0x2}) [ 3006.582023][T30131] device 1190 entered promiscuous mode 23:22:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3f2) 23:22:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x2201000000000000) [ 3006.795560][T30149] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3006.892057][T30152] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:22:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 3007.087217][T30149] device 2298 entered promiscuous mode 23:22:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x3fa) [ 3007.150853][T30152] device 1191 entered promiscuous mode 23:22:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x2202000000000000) [ 3007.228694][T30161] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:22:22 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0xc00e}, 0x0) [ 3007.342065][T30166] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 23:22:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 3007.716937][T30161] device 2299 entered promiscuous mode 23:22:22 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa4@\x00', 0x2}) 23:22:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a803a8c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x500) [ 3008.007278][T30194] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3008.106534][T30166] device 1192 entered promiscuous mode [ 3008.586113][T30194] device 2300 entered promiscuous mode [ 3008.630682][ T8573] device 0 left promiscuous mode [ 3008.642518][T30210] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 3008.719706][ T8573] device 1 left promiscuous mode [ 3008.745745][T30209] IPVS: ftp: loaded support on port[0] = 21 [ 3008.789473][ T8573] device 2 left promiscuous mode [ 3008.859287][ T8573] device 3 left promiscuous mode [ 3008.985338][ T8573] device 4 left promiscuous mode [ 3009.063677][ T8573] device 5 left promiscuous mode [ 3009.112764][ T8573] device 6 left promiscuous mode [ 3009.192041][ T8573] device 7 left promiscuous mode [ 3009.296870][ T8573] device 8 left promiscuous mode [ 3009.352674][T30209] chnl_net:caif_netlink_parms(): no params data found [ 3009.375947][ T8573] device 9 left promiscuous mode [ 3009.453812][ T8573] device 10 left promiscuous mode [ 3009.539549][ T8573] device 11 left promiscuous mode [ 3009.551703][T30209] bridge0: port 1(bridge_slave_0) entered blocking state [ 3009.558978][T30209] bridge0: port 1(bridge_slave_0) entered disabled state [ 3009.573241][T30209] device bridge_slave_0 entered promiscuous mode [ 3009.586270][T30209] bridge0: port 2(bridge_slave_1) entered blocking state [ 3009.593560][T30209] bridge0: port 2(bridge_slave_1) entered disabled state [ 3009.608086][T30209] device bridge_slave_1 entered promiscuous mode [ 3009.637111][ T8573] device 12 left promiscuous mode [ 3009.691132][T30209] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3009.718370][T30209] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3009.781135][T30209] team0: Port device team_slave_0 added [ 3009.788839][ T8573] device 13 left promiscuous mode [ 3009.815615][T30209] team0: Port device team_slave_1 added [ 3009.866623][ T8573] device 14 left promiscuous mode [ 3009.919365][T30209] device hsr_slave_0 entered promiscuous mode [ 3009.962744][T30209] device hsr_slave_1 entered promiscuous mode [ 3010.019147][T30209] debugfs: Directory 'hsr0' with parent '/' already present! [ 3010.026925][ T8573] device 15 left promiscuous mode [ 3010.079872][ T8573] device 16 left promiscuous mode [ 3010.129225][ T8573] device 17 left promiscuous mode [ 3010.178492][T30209] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3010.187625][ T8573] device 18 left promiscuous mode [ 3010.219505][T28854] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 3010.244900][T28854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3010.254966][T28854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3010.273522][T30209] 8021q: adding VLAN 0 to HW filter on device team0 [ 3010.282340][ T8573] device 19 left promiscuous mode [ 3010.306145][T28592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3010.317365][T28592] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3010.329369][T28592] bridge0: port 1(bridge_slave_0) entered blocking state [ 3010.336561][T28592] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3010.348483][ T8573] device 20 left promiscuous mode [ 3010.371877][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3010.383571][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3010.394278][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3010.404208][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 3010.411510][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3010.423179][ T8573] device 21 left promiscuous mode [ 3010.444101][T15355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3010.467399][T28592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3010.480833][ T8573] device 22 left promiscuous mode [ 3010.503257][T28592] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3010.516719][T28592] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3010.538108][ T8573] device 23 left promiscuous mode [ 3010.552363][T15355] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3010.575628][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3010.585881][ T8573] device 24 left promiscuous mode [ 3010.610756][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3010.626254][T30209] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3010.635946][ T8573] device 25 left promiscuous mode [ 3010.676313][T30209] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3010.689677][ T8573] device 26 left promiscuous mode [ 3010.744160][ T8573] device 27 left promiscuous mode [ 3010.800076][ T8573] device 28 left promiscuous mode 23:22:25 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'cpu'}, {0x2b, 'memory'}, {0x0, 'rdma'}]}, 0x13) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) gettid() r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x5450, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:22:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) r3 = socket$kcm(0x2, 0x5, 0x84) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x76, &(0x7f0000000ac0)=r4, 0x8) r5 = openat$cgroup_ro(r4, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r5, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r5, &(0x7f0000000300)}, 0x20) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$TUNSETTXFILTER(r6, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) 23:22:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x2203000000000000) 23:22:25 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x1a000}, 0x0) 23:22:25 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa4A\x00', 0x2}) [ 3010.850363][ T8573] device 29 left promiscuous mode [ 3010.920086][ T8573] device 30 left promiscuous mode [ 3010.933108][T30239] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 3011.003903][ T8573] device 31 left promiscuous mode [ 3011.099913][ T8573] device 32 left promiscuous mode 23:22:25 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa4B\x00', 0x2}) [ 3011.179226][ T8573] device 33 left promiscuous mode 23:22:25 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 23:22:25 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) recvmsg(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x34000}, 0x0) [ 3011.259368][ T8573] device 34 left promiscuous mode [ 3011.322839][ T8573] device 35 left promiscuous mode 23:22:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xebdad23d24b0b899) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) r1 = gettid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0xa6f54f15e4426112) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x5450, 0xffffffffffffffff) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000ac0), 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f00000002c0)={0x2, 0x8, [@random="d127c88cc055", @broadcast, @random="6636d02b21ac", @dev={[], 0x24}, @empty, @dev={[], 0x18}, @empty, @empty]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x4, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb9c6, 0x1, @perf_config_ext={0xf9, 0x3ff}, 0x38946e6ae566e8a0, 0xf3b, 0xa2d9, 0x2, 0xcd3, 0xd2d, 0x8}) [ 3011.414821][ T8573] device 36 left promiscuous mode [ 3011.501803][ T8573] device 37 left promiscuous mode 23:22:26 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x80000000, 0xbb60fcb4168df46a}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x76, &(0x7f0000000ac0)=r1, 0x8) openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x5450, 0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000000180)={0x2, 0x70, 0x60, 0x0, 0x3, 0x1, 0x0, 0xfffffffffffffffd, 0xc00, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000080)}, 0x218, 0xffffffffffffff50, 0x11b7, 0x2, 0x8, 0x9, 0xaa}, r1, 0x6, r2, 0xea3d07778b392573) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) r4 = gettid() r5 = socket$kcm(0x2, 0x5, 0x84) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x2761, 0x0) r7 = socket$kcm(0x2, 0x5, 0x84) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$sock_attach_bpf(r7, 0x84, 0x76, &(0x7f0000000ac0)=r8, 0x8) openat$cgroup_ro(r8, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r8, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x84, 0x76, &(0x7f0000000ac0)=r6, 0x8) r9 = openat$cgroup_ro(r6, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r9, 0x0, 0x12, &(0x7f0000000540)='cpuacct.usage_all\x00'}, 0x30) write$cgroup_pid(r9, &(0x7f0000000100)=r4, 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) [ 3011.619330][ T8573] device 38 left promiscuous mode 23:22:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454da, 0x400010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'yam\x00\x00\x10\x00\x00\x00\\\x11\x00\x0f\xa4C\x00', 0x2}) [ 3011.689265][ T8573] device 39 left promiscuous mode [ 3011.786763][ T8573] device 40 left promiscuous mode [ 3011.874795][ T8573] device 41 left promiscuous mode [ 3011.953814][ T8573] device 42 left promiscuous mode [ 3012.020552][ T8573] device 43 left promiscuous mode [ 3012.069686][ T8573] device 44 left promiscuous mode [ 3012.129136][ T8573] device 45 left promiscuous mode [ 3012.209216][ T8573] device 46 left promiscuous mode [ 3012.249410][ T8573] device 47 left promiscuous mode [ 3012.289873][ T8573] device 48 left promiscuous mode [ 3012.349159][ T8573] device 49 left promiscuous mode [ 3012.389575][ T8573] device 50 left promiscuous mode [ 3012.429501][ T8573] device 51 left promiscuous mode [ 3012.489564][ T8573] device 52 left promiscuous mode [ 3012.540645][ T8573] device 53 left promiscuous mode [ 3012.589522][ T8573] device 54 left promiscuous mode [ 3012.649254][ T8573] device 55 left promiscuous mode [ 3012.689716][ T8573] device 56 left promiscuous mode [ 3012.739261][ T8573] device 57 left promiscuous mode [ 3012.779310][ T8573] device 58 left promiscuous mode [ 3012.819364][ T8573] device 59 left promiscuous mode [ 3012.889132][ T8573] device 60 left promiscuous mode [ 3012.949388][ T8573] device 61 left promiscuous mode [ 3012.999624][ T8573] device 62 left promiscuous mode [ 3013.079300][ T8573] device 63 left promiscuous mode [ 3013.129512][ T8573] device 64 left promiscuous mode [ 3013.209242][ T8573] device 65 left promiscuous mode [ 3013.269381][ T8573] device 66 left promiscuous mode [ 3013.329270][ T8573] device 67 left promiscuous mode [ 3013.389315][ T8573] device 68 left promiscuous mode [ 3013.439312][ T8573] device 69 left promiscuous mode [ 3013.519500][ T8573] device 70 left promiscuous mode [ 3013.579167][ T8573] device 71 left promiscuous mode [ 3013.639911][ T8573] device 72 left promiscuous mode [ 3013.689408][ T8573] device 73 left promiscuous mode [ 3013.739094][ T8573] device 74 left promiscuous mode [ 3013.809487][ T8573] device 75 left promiscuous mode [ 3013.869151][ T8573] device 76 left promiscuous mode [ 3013.919619][ T8573] device 77 left promiscuous mode [ 3013.979379][ T8573] device 78 left promiscuous mode [ 3014.039404][ T8573] device 79 left promiscuous mode [ 3014.129385][ T8573] device 80 left promiscuous mode [ 3014.169497][ T8573] device 81 left promiscuous mode [ 3014.209734][ T8573] device 82 left promiscuous mode [ 3014.249592][ T8573] device 83 left promiscuous mode [ 3014.309483][ T8573] device 84 left promiscuous mode [ 3014.379245][ T8573] device 85 left promiscuous mode [ 3014.439671][ T8573] device 86 left promiscuous mode [ 3014.489570][ T8573] device 87 left promiscuous mode [ 3014.539713][ T8573] device 88 left promiscuous mode [ 3014.589568][ T8573] device 89 left promiscuous mode [ 3014.649390][ T8573] device 90 left promiscuous mode [ 3014.689459][ T8573] device 91 left promiscuous mode [ 3014.769285][ T8573] device 92 left promiscuous mode [ 3014.809624][ T8573] device 93 left promiscuous mode [ 3014.879460][ T8573] device 94 left promiscuous mode [ 3014.949262][ T8573] device 95 left promiscuous mode [ 3014.990007][ T8573] device 96 left promiscuous mode [ 3015.059490][ T8573] device 97 left promiscuous mode [ 3015.139238][ T8573] device 98 left promiscuous mode [ 3015.199445][ T8573] device 99 left promiscuous mode [ 3015.249358][ T8573] device 100 left promiscuous mode [ 3015.309388][ T8573] device 101 left promiscuous mode [ 3015.389199][ T8573] device 102 left promiscuous mode [ 3015.479365][ T8573] device 103 left promiscuous mode [ 3015.529481][ T8573] device 104 left promiscuous mode [ 3015.579339][ T8573] device 105 left promiscuous mode [ 3015.639924][ T8573] device 106 left promiscuous mode [ 3015.699492][ T8573] device 107 left promiscuous mode [ 3015.739575][ T8573] device 108 left promiscuous mode [ 3015.799209][ T8573] device 109 left promiscuous mode [ 3015.839552][ T8573] device 110 left promiscuous mode [ 3015.879508][ T8573] device 111 left promiscuous mode [ 3015.919443][ T8573] device 112 left promiscuous mode [ 3015.989364][ T8573] device 113 left promiscuous mode [ 3016.049590][ T8573] device 114 left promiscuous mode [ 3016.129767][ T8573] device 115 left promiscuous mode [ 3016.209335][ T8573] device 116 left promiscuous mode [ 3016.309187][ T8573] device 117 left promiscuous mode [ 3016.359801][ T8573] device 118 left promiscuous mode [ 3016.419588][ T8573] device 119 left promiscuous mode [ 3016.459642][ T8573] device 120 left promiscuous mode [ 3016.539138][ T8573] device 121 left promiscuous mode [ 3016.589535][ T8573] device 122 left promiscuous mode [ 3016.649189][ T8573] device 123 left promiscuous mode [ 3016.689480][ T8573] device 124 left promiscuous mode [ 3016.749186][ T8573] device 125 left promiscuous mode [ 3016.799692][ T8573] device 126 left promiscuous mode [ 3016.869165][ T8573] device 127 left promiscuous mode [ 3016.919565][ T8573] device 128 left promiscuous mode [ 3016.989335][ T8573] device 129 left promiscuous mode [ 3017.059574][ T8573] device 130 left promiscuous mode [ 3017.109553][ T8573] device 131 left promiscuous mode [ 3017.169486][ T8573] device 132 left promiscuous mode [ 3017.229484][ T8573] device 133 left promiscuous mode [ 3017.299220][ T8573] device 134 left promiscuous mode [ 3017.359670][ T8573] device 135 left promiscuous mode [ 3017.419479][ T8573] device 136 left promiscuous mode [ 3017.459761][ T8573] device 137 left promiscuous mode [ 3017.519156][ T8573] device 138 left promiscuous mode [ 3017.579693][ T8573] device 139 left promiscuous mode [ 3017.639273][ T8573] device 140 left promiscuous mode [ 3017.679537][ T8573] device 141 left promiscuous mode [ 3017.719688][ T8573] device 142 left promiscuous mode [ 3017.779203][ T8573] device 143 left promiscuous mode [ 3017.849494][ T8573] device 144 left promiscuous mode [ 3017.919566][ T8573] device 145 left promiscuous mode [ 3017.979468][ T8573] device 146 left promiscuous mode [ 3018.019496][ T8573] device 147 left promiscuous mode [ 3018.079472][ T8573] device 148 left promiscuous mode [ 3018.119629][ T8573] device 149 left promiscuous mode [ 3018.189348][ T8573] device 150 left promiscuous mode [ 3018.249600][ T8573] device 151 left promiscuous mode [ 3018.299559][ T8573] device 152 left promiscuous mode [ 3018.359231][ T8573] device 153 left promiscuous mode [ 3018.399531][ T8573] device 154 left promiscuous mode [ 3018.469346][ T8573] device 155 left promiscuous mode [ 3018.539505][ T8573] device 156 left promiscuous mode [ 3018.599328][ T8573] device 157 left promiscuous mode [ 3018.659257][ T8573] device 158 left promiscuous mode [ 3018.709596][ T8573] device 159 left promiscuous mode [ 3018.769598][ T8573] device 160 left promiscuous mode [ 3018.829453][ T8573] device 161 left promiscuous mode [ 3018.869408][ T8573] device 162 left promiscuous mode [ 3018.929369][ T8573] device 163 left promiscuous mode [ 3019.009446][ T8573] device 164 left promiscuous mode [ 3019.059523][ T8573] device 165 left promiscuous mode [ 3019.119401][ T8573] device 166 left promiscuous mode [ 3019.219291][ T8573] device 167 left promiscuous mode [ 3019.279377][ T8573] device 168 left promiscuous mode [ 3019.359152][ T8573] device 169 left promiscuous mode [ 3019.409626][ T8573] device 170 left promiscuous mode [ 3019.479439][ T8573] device 171 left promiscuous mode [ 3019.539252][ T8573] device 172 left promiscuous mode [ 3019.579570][ T8573] device 173 left promiscuous mode [ 3019.659104][ T8573] device 174 left promiscuous mode [ 3019.719570][ T8573] device 175 left promiscuous mode [ 3019.779315][ T8573] device 176 left promiscuous mode [ 3019.819291][ T8573] device 177 left promiscuous mode [ 3019.869496][ T8573] device 178 left promiscuous mode [ 3019.909523][ T8573] device 179 left promiscuous mode [ 3019.969445][ T8573] device 180 left promiscuous mode [ 3020.039436][ T8573] device 181 left promiscuous mode [ 3020.099220][ T8573] device 182 left promiscuous mode [ 3020.169609][ T8573] device 183 left promiscuous mode [ 3020.229592][ T8573] device 184 left promiscuous mode [ 3020.289501][ T8573] device 185 left promiscuous mode [ 3020.339700][ T8573] device 186 left promiscuous mode [ 3020.399222][ T8573] device 187 left promiscuous mode [ 3020.439613][ T8573] device 188 left promiscuous mode [ 3020.519348][ T8573] device 189 left promiscuous mode [ 3020.569523][ T8573] device 190 left promiscuous mode [ 3020.619428][ T8573] device 191 left promiscuous mode [ 3020.679409][ T8573] device 192 left promiscuous mode [ 3020.739402][ T8573] device 193 left promiscuous mode [ 3020.819199][ T8573] device 194 left promiscuous mode [ 3020.869517][ T8573] device 195 left promiscuous mode [ 3020.939310][ T8573] device 196 left promiscuous mode [ 3020.989557][ T8573] device 197 left promiscuous mode [ 3021.029671][ T8573] device 198 left promiscuous mode [ 3021.089560][ T8573] device 199 left promiscuous mode [ 3021.129520][ T8573] device 200 left promiscuous mode [ 3021.189369][ T8573] device 201 left promiscuous mode [ 3021.279329][ T8573] device 202 left promiscuous mode [ 3021.339457][ T8573] device 203 left promiscuous mode [ 3021.389398][ T8573] device 204 left promiscuous mode [ 3021.469261][ T8573] device 205 left promiscuous mode [ 3021.519539][ T8573] device 206 left promiscuous mode [ 3021.589430][ T8573] device 207 left promiscuous mode [ 3021.639863][ T8573] device 208 left promiscuous mode [ 3021.699425][ T8573] device 209 left promiscuous mode [ 3021.749462][ T8573] device 210 left promiscuous mode [ 3021.810774][ T8573] device 211 left promiscuous mode [ 3021.869448][ T8573] device 212 left promiscuous mode [ 3021.939200][ T8573] device 213 left promiscuous mode [ 3022.009415][ T8573] device 214 left promiscuous mode [ 3022.069386][ T8573] device 215 left promiscuous mode [ 3022.119529][ T8573] device 216 left promiscuous mode [ 3022.179575][ T8573] device 217 left promiscuous mode [ 3022.249307][ T8573] device 218 left promiscuous mode [ 3022.319472][ T8573] device 219 left promiscuous mode [ 3022.360000][ T8573] device 220 left promiscuous mode [ 3022.439203][ T8573] device 221 left promiscuous mode [ 3022.489630][ T8573] device 222 left promiscuous mode [ 3022.549439][ T8573] device 223 left promiscuous mode [ 3022.609580][ T8573] device 224 left promiscuous mode [ 3022.669511][ T8573] device 225 left promiscuous mode [ 3022.749251][ T8573] device 226 left promiscuous mode [ 3022.809402][ T8573] device 227 left promiscuous mode [ 3022.889424][ T8573] device 228 left promiscuous mode [ 3022.939407][ T8573] device 229 left promiscuous mode [ 3023.019630][ T8573] device 230 left promiscuous mode [ 3023.079397][ T8573] device 231 left promiscuous mode [ 3023.139409][ T8573] device 232 left promiscuous mode [ 3023.189610][ T8573] device 233 left promiscuous mode [ 3023.249602][ T8573] device 234 left promiscuous mode [ 3023.329512][ T8573] device 235 left promiscuous mode [ 3023.369599][ T8573] device 236 left promiscuous mode [ 3023.439518][ T8573] device 237 left promiscuous mode [ 3023.479350][ T8573] device 238 left promiscuous mode [ 3023.539316][ T8573] device 239 left promiscuous mode [ 3023.619243][ T8573] device 240 left promiscuous mode [ 3023.689345][ T8573] device 241 left promiscuous mode [ 3023.749479][ T8573] device 242 left promiscuous mode [ 3023.789486][ T8573] device 243 left promiscuous mode [ 3023.849372][ T8573] device 244 left promiscuous mode [ 3023.909362][ T8573] device 245 left promiscuous mode [ 3023.969348][ T8573] device 246 left promiscuous mode [ 3024.029377][ T8573] device 247 left promiscuous mode [ 3024.109183][ T8573] device 248 left promiscuous mode [ 3024.179530][ T8573] device 249 left promiscuous mode [ 3024.219640][ T8573] device 250 left promiscuous mode [ 3024.279215][ T8573] device 251 left promiscuous mode [ 3024.349463][ T8573] device 252 left promiscuous mode [ 3024.419442][ T8573] device 253 left promiscuous mode [ 3024.479395][ T8573] device 254 left promiscuous mode [ 3024.529651][ T8573] device 255 left promiscuous mode [ 3024.569565][ T8573] device 256 left promiscuous mode [ 3024.639414][ T8573] device 257 left promiscuous mode [ 3024.689465][ T8573] device 258 left promiscuous mode [ 3024.769467][ T8573] device 259 left promiscuous mode [ 3024.809525][ T8573] device 260 left promiscuous mode [ 3024.859382][ T8573] device 261 left promiscuous mode [ 3024.919707][ T8573] device 262 left promiscuous mode [ 3024.949612][ T8573] device 263 left promiscuous mode [ 3025.009502][ T8573] device 264 left promiscuous mode [ 3025.069403][ T8573] device 265 left promiscuous mode [ 3025.129383][ T8573] device 266 left promiscuous mode [ 3025.179629][ T8573] device 267 left promiscuous mode [ 3025.239600][ T8573] device 268 left promiscuous mode [ 3025.290619][ T8573] device 269 left promiscuous mode [ 3025.359456][ T8573] device 270 left promiscuous mode [ 3025.409330][ T8573] device 271 left promiscuous mode [ 3025.479416][ T8573] device 272 left promiscuous mode [ 3025.529524][ T8573] device 273 left promiscuous mode [ 3025.589312][ T8573] device 274 left promiscuous mode [ 3025.649572][ T8573] device 275 left promiscuous mode [ 3025.699096][ T8573] device 276 left promiscuous mode [ 3025.779142][ T8573] device 277 left promiscuous mode [ 3025.819911][ T8573] device 278 left promiscuous mode [ 3025.889323][ T8573] device 279 left promiscuous mode [ 3025.949240][ T8573] device 280 left promiscuous mode [ 3026.029223][ T8573] device 281 left promiscuous mode [ 3026.099517][ T8573] device 282 left promiscuous mode [ 3026.159586][ T8573] device 283 left promiscuous mode [ 3026.220412][ T8573] device 284 left promiscuous mode [ 3026.269601][ T8573] device 285 left promiscuous mode [ 3026.329181][ T8573] device 286 left promiscuous mode [ 3026.379476][ T8573] device 287 left promiscuous mode [ 3026.419556][ T8573] device 288 left promiscuous mode [ 3026.479384][ T8573] device 289 left promiscuous mode [ 3026.549299][ T8573] device 290 left promiscuous mode [ 3026.589482][ T8573] device 291 left promiscuous mode [ 3026.629517][ T8573] device 292 left promiscuous mode [ 3026.669483][ T8573] device 293 left promiscuous mode [ 3026.739357][ T8573] device 294 left promiscuous mode [ 3026.799381][ T8573] device 295 left promiscuous mode [ 3026.859332][ T8573] device 296 left promiscuous mode [ 3026.909444][ T8573] device 297 left promiscuous mode [ 3026.969428][ T8573] device 298 left promiscuous mode [ 3027.029375][ T8573] device 299 left promiscuous mode [ 3027.079575][ T8573] device 300 left promiscuous mode [ 3027.149560][ T8573] device 301 left promiscuous mode [ 3027.219450][ T8573] device 302 left promiscuous mode [ 3027.289334][ T8573] device 303 left promiscuous mode [ 3027.339604][ T8573] device 304 left promiscuous mode [ 3027.419160][ T8573] device 305 left promiscuous mode [ 3027.469561][ T8573] device 306 left promiscuous mode [ 3027.509642][ T8573] device 307 left promiscuous mode [ 3027.549548][ T8573] device 308 left promiscuous mode [ 3027.619333][ T8573] device 309 left promiscuous mode [ 3027.659308][ T8573] device 310 left promiscuous mode [ 3027.749352][ T8573] device 311 left promiscuous mode [ 3027.819531][ T8573] device 312 left promiscuous mode [ 3027.889352][ T8573] device 313 left promiscuous mode [ 3027.949357][ T8573] device 314 left promiscuous mode [ 3027.989650][ T8573] device 315 left promiscuous mode [ 3028.059395][ T8573] device 316 left promiscuous mode [ 3028.129597][ T8573] device 317 left promiscuous mode [ 3028.209103][ T8573] device 318 left promiscuous mode [ 3028.279573][ T8573] device 319 left promiscuous mode [ 3028.329112][ T8573] device 320 left promiscuous mode [ 3028.369522][ T8573] device 321 left promiscuous mode [ 3028.439383][ T8573] device 322 left promiscuous mode [ 3028.509344][ T8573] device 323 left promiscuous mode [ 3028.559566][ T8573] device 324 left promiscuous mode [ 3028.619187][ T8573] device 325 left promiscuous mode [ 3028.679399][ T8573] device 326 left promiscuous mode [ 3028.729402][ T8573] device 327 left promiscuous mode [ 3028.799547][ T8573] device 328 left promiscuous mode [ 3028.859289][ T8573] device 329 left promiscuous mode [ 3028.919584][ T8573] device 330 left promiscuous mode [ 3028.979432][ T8573] device 331 left promiscuous mode [ 3029.019586][ T8573] device 332 left promiscuous mode [ 3029.059574][ T8573] device 333 left promiscuous mode [ 3029.099679][ T8573] device 334 left promiscuous mode [ 3029.139580][ T8573] device 335 left promiscuous mode [ 3029.209241][ T8573] device 336 left promiscuous mode [ 3029.259395][ T8573] device 337 left promiscuous mode [ 3029.309389][ T8573] device 338 left promiscuous mode [ 3029.379381][ T8573] device 339 left promiscuous mode [ 3029.429528][ T8573] device 340 left promiscuous mode [ 3029.489444][ T8573] device 341 left promiscuous mode [ 3029.559284][ T8573] device 342 left promiscuous mode [ 3029.621191][ T8573] device 343 left promiscuous mode [ 3029.689336][ T8573] device 344 left promiscuous mode [ 3029.729404][ T8573] device 345 left promiscuous mode [ 3029.799565][ T8573] device 346 left promiscuous mode [ 3029.839330][ T8573] device 347 left promiscuous mode [ 3029.939221][ T8573] device 348 left promiscuous mode [ 3029.999330][ T8573] device 349 left promiscuous mode [ 3030.049507][ T8573] device 350 left promiscuous mode [ 3030.099509][ T8573] device 351 left promiscuous mode [ 3030.159539][ T8573] device 352 left promiscuous mode [ 3030.219354][ T8573] device 353 left promiscuous mode [ 3030.279595][ T8573] device 354 left promiscuous mode [ 3030.359375][ T8573] device 355 left promiscuous mode [ 3030.439197][ T8573] device 356 left promiscuous mode [ 3030.489578][ T8573] device 357 left promiscuous mode [ 3030.539146][ T8573] device 358 left promiscuous mode [ 3030.609403][ T8573] device 359 left promiscuous mode [ 3030.679424][ T8573] device 360 left promiscuous mode [ 3030.739573][ T8573] device 361 left promiscuous mode [ 3030.809229][ T8573] device 362 left promiscuous mode [ 3030.889194][ T8573] device 363 left promiscuous mode [ 3030.939578][ T8573] device 364 left promiscuous mode [ 3030.999521][ T8573] device 365 left promiscuous mode [ 3031.039528][ T8573] device 366 left promiscuous mode [ 3031.109350][ T8573] device 367 left promiscuous mode [ 3031.180237][ T8573] device 368 left promiscuous mode [ 3031.229094][ T8573] device 369 left promiscuous mode [ 3031.279563][ T8573] device 370 left promiscuous mode [ 3031.319641][ T8573] device 371 left promiscuous mode [ 3031.399181][ T8573] device 372 left promiscuous mode [ 3031.449569][ T8573] device 373 left promiscuous mode [ 3031.489577][ T8573] device 374 left promiscuous mode [ 3031.529550][ T8573] device 375 left promiscuous mode [ 3031.609351][ T8573] device 376 left promiscuous mode [ 3031.679360][ T8573] device 377 left promiscuous mode [ 3031.739354][ T8573] device 378 left promiscuous mode [ 3031.801130][ T8573] device 379 left promiscuous mode [ 3031.869370][ T8573] device 380 left promiscuous mode [ 3031.939466][ T8573] device 381 left promiscuous mode [ 3032.009343][ T8573] device 382 left promiscuous mode [ 3032.069497][ T8573] device 383 left promiscuous mode [ 3032.109589][ T8573] device 384 left promiscuous mode [ 3032.149622][ T8573] device 385 left promiscuous mode [ 3032.229305][ T8573] device 386 left promiscuous mode [ 3032.289498][ T8573] device 387 left promiscuous mode [ 3032.349662][ T8573] device 388 left promiscuous mode [ 3032.389425][ T8573] device 389 left promiscuous mode [ 3032.449355][ T8573] device 390 left promiscuous mode [ 3032.529259][ T8573] device 391 left promiscuous mode [ 3032.589264][ T8573] device 392 left promiscuous mode [ 3032.629269][ T8573] device 393 left promiscuous mode [ 3032.689323][ T8573] device 394 left promiscuous mode [ 3032.759558][ T8573] device 395 left promiscuous mode [ 3032.829458][ T8573] device 396 left promiscuous mode [ 3032.899519][ T8573] device 397 left promiscuous mode [ 3032.959441][ T8573] device 398 left promiscuous mode [ 3032.999492][ T8573] device 399 left promiscuous mode [ 3033.039566][ T8573] device 400 left promiscuous mode [ 3033.099364][ T8573] device 401 left promiscuous mode [ 3033.159586][ T8573] device 402 left promiscuous mode [ 3033.219274][ T8573] device 403 left promiscuous mode [ 3033.279463][ T8573] device 404 left promiscuous mode [ 3033.339485][ T8573] device 405 left promiscuous mode [ 3033.409355][ T8573] device 406 left promiscuous mode [ 3033.459543][ T8573] device 407 left promiscuous mode [ 3033.509592][ T8573] device 408 left promiscuous mode [ 3033.569603][ T8573] device 409 left promiscuous mode [ 3033.639382][ T8573] device 410 left promiscuous mode [ 3033.689128][ T8573] device 411 left promiscuous mode [ 3033.749335][ T8573] device 412 left promiscuous mode [ 3033.810359][ T8573] device 413 left promiscuous mode [ 3033.869352][ T8573] device 414 left promiscuous mode [ 3033.909486][ T8573] device 415 left promiscuous mode [ 3033.979421][ T8573] device 416 left promiscuous mode [ 3034.019401][ T8573] device 417 left promiscuous mode [ 3034.059404][ T8573] device 418 left promiscuous mode [ 3034.109583][ T8573] device 419 left promiscuous mode [ 3034.159508][ T8573] device 420 left promiscuous mode [ 3034.219488][ T8573] device 421 left promiscuous mode [ 3034.279417][ T8573] device 422 left promiscuous mode [ 3034.319555][ T8573] device 423 left promiscuous mode [ 3034.359660][ T8573] device 424 left promiscuous mode [ 3034.429328][ T8573] device 425 left promiscuous mode [ 3034.479540][ T8573] device 426 left promiscuous mode [ 3034.539591][ T8573] device 427 left promiscuous mode [ 3034.579572][ T8573] device 428 left promiscuous mode [ 3034.619497][ T8573] device 429 left promiscuous mode [ 3034.660513][ T8573] device 430 left promiscuous mode [ 3034.719219][ T8573] device 431 left promiscuous mode [ 3034.799182][ T8573] device 432 left promiscuous mode [ 3034.869680][ T8573] device 433 left promiscuous mode [ 3034.909587][ T8573] device 434 left promiscuous mode [ 3034.969548][ T8573] device 435 left promiscuous mode [ 3035.009525][ T8573] device 436 left promiscuous mode [ 3035.079495][ T8573] device 437 left promiscuous mode [ 3035.119354][ T8573] device 438 left promiscuous mode [ 3035.199813][ T8573] device 439 left promiscuous mode [ 3035.249593][ T8573] device 440 left promiscuous mode [ 3035.309507][ T8573] device 441 left promiscuous mode [ 3035.349587][ T8573] device 442 left promiscuous mode [ 3035.409498][ T8573] device 443 left promiscuous mode [ 3035.479420][ T8573] device 444 left promiscuous mode [ 3035.529572][ T8573] device 445 left promiscuous mode [ 3035.589427][ T8573] device 446 left promiscuous mode [ 3035.629572][ T8573] device 447 left promiscuous mode [ 3035.699391][ T8573] device 448 left promiscuous mode [ 3035.749698][ T8573] device 449 left promiscuous mode [ 3035.809227][ T8573] device 450 left promiscuous mode [ 3035.849860][ T8573] device 451 left promiscuous mode [ 3035.929127][ T8573] device 452 left promiscuous mode [ 3035.979594][ T8573] device 453 left promiscuous mode [ 3036.029262][ T8573] device 454 left promiscuous mode [ 3036.079643][ T8573] device 455 left promiscuous mode [ 3036.159157][ T8573] device 456 left promiscuous mode [ 3036.229609][ T8573] device 457 left promiscuous mode [ 3036.269607][ T8573] device 458 left promiscuous mode [ 3036.329418][ T8573] device 459 left promiscuous mode [ 3036.399568][ T8573] device 460 left promiscuous mode [ 3036.469388][ T8573] device 461 left promiscuous mode [ 3036.510543][ T8573] device 462 left promiscuous mode [ 3036.589122][ T8573] device 463 left promiscuous mode [ 3036.649335][ T8573] device 464 left promiscuous mode [ 3036.709338][ T8573] device 465 left promiscuous mode [ 3036.759653][ T8573] device 466 left promiscuous mode [ 3036.799391][ T8573] device 467 left promiscuous mode [ 3036.849674][ T8573] device 468 left promiscuous mode [ 3036.889486][ T8573] device 469 left promiscuous mode [ 3036.929542][ T8573] device 470 left promiscuous mode [ 3036.969500][ T8573] device 471 left promiscuous mode [ 3037.039326][ T8573] device 472 left promiscuous mode [ 3037.099338][ T8573] device 473 left promiscuous mode [ 3037.159334][ T8573] device 474 left promiscuous mode [ 3037.239329][ T8573] device 475 left promiscuous mode [ 3037.289497][ T8573] device 476 left promiscuous mode [ 3037.329430][ T8573] device 477 left promiscuous mode [ 3037.389271][ T8573] device 478 left promiscuous mode [ 3037.449447][ T8573] device 479 left promiscuous mode [ 3037.499520][ T8573] device 480 left promiscuous mode [ 3037.539486][ T8573] device 481 left promiscuous mode [ 3037.609370][ T8573] device 482 left promiscuous mode [ 3037.689282][ T8573] device 483 left promiscuous mode [ 3037.759371][ T8573] device 484 left promiscuous mode [ 3037.799683][ T8573] device 485 left promiscuous mode [ 3037.869190][ T8573] device 486 left promiscuous mode [ 3037.909580][ T8573] device 487 left promiscuous mode [ 3037.969649][ T8573] device 488 left promiscuous mode [ 3038.009627][ T8573] device 489 left promiscuous mode [ 3038.079354][ T8573] device 490 left promiscuous mode [ 3038.139374][ T8573] device 491 left promiscuous mode [ 3038.209409][ T8573] device 492 left promiscuous mode [ 3038.269515][ T8573] device 493 left promiscuous mode [ 3038.309554][ T8573] device 494 left promiscuous mode [ 3038.370135][ T8573] device 495 left promiscuous mode [ 3038.429344][ T8573] device 496 left promiscuous mode [ 3038.469597][ T8573] device 497 left promiscuous mode [ 3038.509592][ T8573] device 498 left promiscuous mode [ 3038.569600][ T8573] device 499 left promiscuous mode [ 3038.609432][ T8573] device 500 left promiscuous mode [ 3038.649587][ T8573] device 501 left promiscuous mode [ 3038.729239][ T8573] device 502 left promiscuous mode [ 3038.809359][ T8573] device 503 left promiscuous mode [ 3038.859574][ T8573] device 504 left promiscuous mode [ 3038.929421][ T8573] device 505 left promiscuous mode [ 3038.999665][ T8573] device 506 left promiscuous mode [ 3039.039553][ T8573] device 507 left promiscuous mode [ 3039.109414][ T8573] device 508 left promiscuous mode [ 3039.189197][ T8573] device 509 left promiscuous mode [ 3039.249429][ T8573] device 510 left promiscuous mode [ 3039.309400][ T8573] device 511 left promiscuous mode [ 3039.369417][ T8573] device 512 left promiscuous mode [ 3039.449235][ T8573] device 513 left promiscuous mode [ 3039.509463][ T8573] device 514 left promiscuous mode [ 3039.559690][ T8573] device 515 left promiscuous mode [ 3039.629334][ T8573] device 516 left promiscuous mode [ 3039.689352][ T8573] device 517 left promiscuous mode [ 3039.759547][ T8573] device 518 left promiscuous mode [ 3039.799652][ T8573] device 519 left promiscuous mode [ 3039.849574][ T8573] device 520 left promiscuous mode [ 3039.919466][ T8573] device 521 left promiscuous mode [ 3039.969619][ T8573] device 522 left promiscuous mode [ 3040.029705][ T8573] device 523 left promiscuous mode [ 3040.079175][ T8573] device 524 left promiscuous mode [ 3040.129574][ T8573] device 525 left promiscuous mode [ 3040.189387][ T8573] device 526 left promiscuous mode [ 3040.249422][ T8573] device 527 left promiscuous mode [ 3040.299603][ T8573] device 528 left promiscuous mode [ 3040.373104][ T8573] device 529 left promiscuous mode [ 3040.449549][ T8573] device 530 left promiscuous mode [ 3040.509563][ T8573] device 531 left promiscuous mode [ 3040.569593][ T8573] device 532 left promiscuous mode [ 3040.619439][ T8573] device 533 left promiscuous mode [ 3040.689852][ T8573] device 534 left promiscuous mode [ 3040.779304][ T8573] device 535 left promiscuous mode [ 3040.839573][ T8573] device 536 left promiscuous mode [ 3040.909435][ T8573] device 537 left promiscuous mode [ 3040.949626][ T8573] device 538 left promiscuous mode [ 3040.989596][ T8573] device 539 left promiscuous mode [ 3041.049396][ T8573] device 540 left promiscuous mode [ 3041.109522][ T8573] device 541 left promiscuous mode [ 3041.159508][ T8573] device 542 left promiscuous mode [ 3041.229292][ T8573] device 543 left promiscuous mode [ 3041.269357][ T8573] device 544 left promiscuous mode [ 3041.329365][ T8573] device 545 left promiscuous mode [ 3041.389354][ T8573] device 546 left promiscuous mode [ 3041.459580][ T8573] device 547 left promiscuous mode [ 3041.519283][ T8573] device 548 left promiscuous mode [ 3041.559475][ T8573] device 549 left promiscuous mode [ 3041.609436][ T8573] device 550 left promiscuous mode [ 3041.659522][ T8573] device 551 left promiscuous mode [ 3041.709365][ T8573] device 552 left promiscuous mode [ 3041.789314][ T8573] device 553 left promiscuous mode [ 3041.829451][ T8573] device 554 left promiscuous mode [ 3041.879549][ T8573] device 555 left promiscuous mode [ 3041.919550][ T8573] device 556 left promiscuous mode [ 3041.959649][ T8573] device 557 left promiscuous mode [ 3042.019214][ T8573] device 558 left promiscuous mode [ 3042.059545][ T8573] device 559 left promiscuous mode [ 3042.119346][ T8573] device 560 left promiscuous mode [ 3042.189374][ T8573] device 561 left promiscuous mode [ 3042.239510][ T8573] device 562 left promiscuous mode [ 3042.279671][ T8573] device 563 left promiscuous mode [ 3042.339594][ T8573] device 564 left promiscuous mode [ 3042.379594][ T8573] device 565 left promiscuous mode [ 3042.439621][ T8573] device 566 left promiscuous mode [ 3042.479600][ T8573] device 567 left promiscuous mode [ 3042.519554][ T8573] device 568 left promiscuous mode [ 3042.559621][ T8573] device 569 left promiscuous mode [ 3042.619374][ T8573] device 570 left promiscuous mode [ 3042.679594][ T8573] device 571 left promiscuous mode [ 3042.749350][ T8573] device 572 left promiscuous mode [ 3042.819321][ T8573] device 573 left promiscuous mode [ 3042.859444][ T8573] device 574 left promiscuous mode [ 3042.919401][ T8573] device 575 left promiscuous mode [ 3042.989612][ T8573] device 576 left promiscuous mode [ 3043.029717][ T8573] device 577 left promiscuous mode [ 3043.099405][ T8573] device 578 left promiscuous mode [ 3043.169349][ T8573] device 579 left promiscuous mode [ 3043.219367][ T8573] device 580 left promiscuous mode [ 3043.269607][ T8573] device 581 left promiscuous mode [ 3043.309513][ T8573] device 582 left promiscuous mode [ 3043.389652][ T8573] device 583 left promiscuous mode [ 3043.429527][ T8573] device 584 left promiscuous mode [ 3043.499339][ T8573] device 585 left promiscuous mode [ 3043.549632][ T8573] device 586 left promiscuous mode [ 3043.589638][ T8573] device 587 left promiscuous mode [ 3043.659409][ T8573] device 588 left promiscuous mode [ 3043.709582][ T8573] device 589 left promiscuous mode [ 3043.769433][ T8573] device 590 left promiscuous mode [ 3043.819602][ T8573] device 591 left promiscuous mode [ 3043.889479][ T8573] device 592 left promiscuous mode [ 3043.959505][ T8573] device 593 left promiscuous mode [ 3044.009505][ T8573] device 594 left promiscuous mode [ 3044.059497][ T8573] device 595 left promiscuous mode [ 3044.129316][ T8573] device 596 left promiscuous mode [ 3044.189366][ T8573] device 597 left promiscuous mode [ 3044.249335][ T8573] device 598 left promiscuous mode [ 3044.309318][ T8573] device 599 left promiscuous mode [ 3044.379545][ T8573] device 600 left promiscuous mode [ 3044.429546][ T8573] device 601 left promiscuous mode [ 3044.469404][ T8573] device 602 left promiscuous mode [ 3044.529336][ T8573] device 603 left promiscuous mode [ 3044.599572][ T8573] device 604 left promiscuous mode [ 3044.659214][ T8573] device 605 left promiscuous mode [ 3044.729412][ T8573] device 606 left promiscuous mode [ 3044.819340][ T8573] device 607 left promiscuous mode [ 3044.879566][ T8573] device 608 left promiscuous mode [ 3044.919593][ T8573] device 609 left promiscuous mode [ 3044.979401][ T8573] device 610 left promiscuous mode [ 3045.039414][ T8573] device 611 left promiscuous mode [ 3045.089560][ T8573] device 612 left promiscuous mode [ 3045.129630][ T8573] device 613 left promiscuous mode [ 3045.199424][ T8573] device 614 left promiscuous mode [ 3045.250469][ T8573] device 615 left promiscuous mode [ 3045.319515][ T8573] device 616 left promiscuous mode [ 3045.369521][ T8573] device 617 left promiscuous mode [ 3045.429657][ T8573] device 618 left promiscuous mode [ 3045.489317][ T8573] device 619 left promiscuous mode [ 3045.559666][ T8573] device 620 left promiscuous mode [ 3045.599324][ T8573] device 621 left promiscuous mode [ 3045.659371][ T8573] device 622 left promiscuous mode [ 3045.749356][ T8573] device 623 left promiscuous mode [ 3045.800833][ T8573] device 624 left promiscuous mode [ 3045.839491][ T8573] device 625 left promiscuous mode [ 3045.899304][ T8573] device 626 left promiscuous mode [ 3045.949555][ T8573] device 627 left promiscuous mode [ 3045.999149][ T8573] device 628 left promiscuous mode [ 3046.053218][ T8573] device 629 left promiscuous mode [ 3046.109488][ T8573] device 630 left promiscuous mode [ 3046.149584][ T8573] device 631 left promiscuous mode [ 3046.199622][ T8573] device 632 left promiscuous mode [ 3046.269570][ T8573] device 633 left promiscuous mode [ 3046.310532][ T8573] device 634 left promiscuous mode [ 3046.389378][ T8573] device 635 left promiscuous mode [ 3046.439722][ T8573] device 636 left promiscuous mode [ 3046.509313][ T8573] device 637 left promiscuous mode [ 3046.589095][ T8573] device 638 left promiscuous mode [ 3046.639687][ T8573] device 639 left promiscuous mode [ 3046.709207][ T8573] device 640 left promiscuous mode [ 3046.779530][ T8573] device 641 left promiscuous mode [ 3046.839739][ T8573] device 642 left promiscuous mode [ 3046.899294][ T8573] device 643 left promiscuous mode [ 3046.939565][ T8573] device 644 left promiscuous mode [ 3046.980570][ T8573] device 645 left promiscuous mode [ 3047.049411][ T8573] device 646 left promiscuous mode [ 3047.099594][ T8573] device 647 left promiscuous mode [ 3047.159575][ T8573] device 648 left promiscuous mode [ 3047.209194][ T8573] device 649 left promiscuous mode [ 3047.259571][ T8573] device 650 left promiscuous mode [ 3047.299642][ T8573] device 651 left promiscuous mode [ 3047.369907][ T8573] device 652 left promiscuous mode [ 3047.429294][ T8573] device 653 left promiscuous mode [ 3047.499347][ T8573] device 654 left promiscuous mode [ 3047.569395][ T8573] device 655 left promiscuous mode [ 3047.629424][ T8573] device 656 left promiscuous mode [ 3047.679491][ T8573] device 657 left promiscuous mode [ 3047.739703][ T8573] device 658 left promiscuous mode [ 3047.789232][ T8573] device 659 left promiscuous mode [ 3047.839613][ T8573] device 660 left promiscuous mode [ 3047.879568][ T8573] device 661 left promiscuous mode [ 3047.939402][ T8573] device 662 left promiscuous mode [ 3047.999412][ T8573] device 663 left promiscuous mode [ 3048.049629][ T8573] device 664 left promiscuous mode [ 3048.109530][ T8573] device 665 left promiscuous mode [ 3048.189129][ T8573] device 666 left promiscuous mode [ 3048.269353][ T8573] device 667 left promiscuous mode [ 3048.329518][ T8573] device 668 left promiscuous mode [ 3048.379584][ T8573] device 669 left promiscuous mode [ 3048.449415][ T8573] device 670 left promiscuous mode [ 3048.499524][ T8573] device 671 left promiscuous mode [ 3048.539562][ T8573] device 672 left promiscuous mode [ 3048.579648][ T8573] device 673 left promiscuous mode [ 3048.619616][ T8573] device 674 left promiscuous mode [ 3048.689493][ T8573] device 675 left promiscuous mode [ 3048.769202][ T8573] device 676 left promiscuous mode [ 3048.829338][ T8573] device 677 left promiscuous mode [ 3048.879577][ T8573] device 678 left promiscuous mode [ 3048.939370][ T8573] device 679 left promiscuous mode [ 3048.979512][ T8573] device 680 left promiscuous mode [ 3049.019508][ T8573] device 681 left promiscuous mode [ 3049.059543][ T8573] device 682 left promiscuous mode [ 3049.099510][ T8573] device 683 left promiscuous mode [ 3049.169299][ T8573] device 684 left promiscuous mode [ 3049.229360][ T8573] device 685 left promiscuous mode [ 3049.289315][ T8573] device 686 left promiscuous mode [ 3049.349447][ T8573] device 687 left promiscuous mode [ 3049.399594][ T8573] device 688 left promiscuous mode [ 3049.469410][ T8573] device 689 left promiscuous mode [ 3049.519525][ T8573] device 690 left promiscuous mode [ 3049.559511][ T8573] device 691 left promiscuous mode [ 3049.629366][ T8573] device 692 left promiscuous mode [ 3049.689382][ T8573] device 693 left promiscuous mode [ 3049.749480][ T8573] device 694 left promiscuous mode [ 3049.809391][ T8573] device 695 left promiscuous mode [ 3049.849410][ T8573] device 696 left promiscuous mode [ 3049.919184][ T8573] device 697 left promiscuous mode [ 3049.989437][ T8573] device 698 left promiscuous mode [ 3050.029385][ T8573] device 699 left promiscuous mode [ 3050.069505][ T8573] device 700 left promiscuous mode [ 3050.119498][ T8573] device 701 left promiscuous mode [ 3050.159632][ T8573] device 702 left promiscuous mode [ 3050.199466][ T8573] device 703 left promiscuous mode [ 3050.239517][ T8573] device 704 left promiscuous mode [ 3050.279635][ T8573] device 705 left promiscuous mode [ 3050.349442][ T8573] device 706 left promiscuous mode [ 3050.399532][ T8573] device 707 left promiscuous mode [ 3050.449578][ T8573] device 708 left promiscuous mode [ 3050.509646][ T8573] device 709 left promiscuous mode [ 3050.549602][ T8573] device 710 left promiscuous mode [ 3050.609456][ T8573] device 711 left promiscuous mode [ 3050.689216][ T8573] device 712 left promiscuous mode [ 3050.749318][ T8573] device 713 left promiscuous mode [ 3050.809438][ T8573] device 714 left promiscuous mode [ 3050.859591][ T8573] device 715 left promiscuous mode [ 3050.899563][ T8573] device 716 left promiscuous mode [ 3050.969316][ T8573] device 717 left promiscuous mode [ 3051.029605][ T8573] device 718 left promiscuous mode [ 3051.079908][ T8573] device 719 left promiscuous mode [ 3051.149280][ T8573] device 720 left promiscuous mode [ 3051.199446][ T8573] device 721 left promiscuous mode [ 3051.279218][ T8573] device 722 left promiscuous mode [ 3051.329566][ T8573] device 723 left promiscuous mode [ 3051.399518][ T8573] device 724 left promiscuous mode [ 3051.459321][ T8573] device 725 left promiscuous mode [ 3051.529392][ T8573] device 726 left promiscuous mode [ 3051.579572][ T8573] device 727 left promiscuous mode [ 3051.639616][ T8573] device 728 left promiscuous mode [ 3051.709330][ T8573] device 729 left promiscuous mode [ 3051.779573][ T8573] device 730 left promiscuous mode [ 3051.839627][ T8573] device 731 left promiscuous mode [ 3051.899530][ T8573] device 732 left promiscuous mode [ 3051.939628][ T8573] device 733 left promiscuous mode [ 3052.019369][ T8573] device 734 left promiscuous mode [ 3052.069372][ T8573] device 735 left promiscuous mode [ 3052.119567][ T8573] device 736 left promiscuous mode [ 3052.179433][ T8573] device 737 left promiscuous mode [ 3052.240266][ T8573] device 738 left promiscuous mode [ 3052.299350][ T8573] device 739 left promiscuous mode [ 3052.359644][ T8573] device 740 left promiscuous mode [ 3052.399593][ T8573] device 741 left promiscuous mode [ 3052.439516][ T8573] device 742 left promiscuous mode [ 3052.479594][ T8573] device 743 left promiscuous mode [ 3052.529386][ T8573] device 744 left promiscuous mode [ 3052.589403][ T8573] device 745 left promiscuous mode [ 3052.639553][ T8573] device 746 left promiscuous mode [ 3052.679618][ T8573] device 747 left promiscuous mode [ 3052.719586][ T8573] device 748 left promiscuous mode [ 3052.779227][ T8573] device 749 left promiscuous mode [ 3052.839589][ T8573] device 750 left promiscuous mode [ 3052.899349][ T8573] device 751 left promiscuous mode [ 3052.949546][ T8573] device 752 left promiscuous mode [ 3052.989610][ T8573] device 753 left promiscuous mode [ 3053.039555][ T8573] device 754 left promiscuous mode [ 3053.109472][ T8573] device 755 left promiscuous mode [ 3053.149711][ T8573] device 756 left promiscuous mode [ 3053.239290][ T8573] device 757 left promiscuous mode [ 3053.309361][ T8573] device 758 left promiscuous mode [ 3053.369340][ T8573] device 759 left promiscuous mode [ 3053.429425][ T8573] device 760 left promiscuous mode [ 3053.479785][ T8573] device 761 left promiscuous mode [ 3053.569141][ T8573] device 762 left promiscuous mode [ 3053.629526][ T8573] device 763 left promiscuous mode [ 3053.689486][ T8573] device 764 left promiscuous mode [ 3053.749344][ T8573] device 765 left promiscuous mode [ 3053.829293][ T8573] device 766 left promiscuous mode [ 3053.909311][ T8573] device 767 left promiscuous mode [ 3053.959561][ T8573] device 768 left promiscuous mode [ 3054.029307][ T8573] device 769 left promiscuous mode [ 3054.109521][ T8573] device 770 left promiscuous mode [ 3054.159577][ T8573] device 771 left promiscuous mode [ 3054.229415][ T8573] device 772 left promiscuous mode [ 3054.269888][ T8573] device 773 left promiscuous mode [ 3054.329368][ T8573] device 774 left promiscuous mode [ 3054.389362][ T8573] device 775 left promiscuous mode [ 3054.449334][ T8573] device 776 left promiscuous mode [ 3054.519371][ T8573] device 777 left promiscuous mode [ 3054.569486][ T8573] device 778 left promiscuous mode [ 3054.609515][ T8573] device 779 left promiscuous mode [ 3054.649435][ T8573] device 780 left promiscuous mode [ 3054.699327][ T8573] device 781 left promiscuous mode [ 3054.799261][ T8573] device 782 left promiscuous mode [ 3054.849764][ T8573] device 783 left promiscuous mode [ 3054.909357][ T8573] device 784 left promiscuous mode [ 3054.969500][ T8573] device 785 left promiscuous mode [ 3055.039348][ T8573] device 786 left promiscuous mode [ 3055.089528][ T8573] device 787 left promiscuous mode [ 3055.169157][ T8573] device 788 left promiscuous mode [ 3055.249332][ T8573] device 789 left promiscuous mode [ 3055.329187][ T8573] device 790 left promiscuous mode [ 3055.389349][ T8573] device 791 left promiscuous mode [ 3055.439402][ T8573] device 792 left promiscuous mode [ 3055.509530][ T8573] device 793 left promiscuous mode [ 3055.569427][ T8573] device 794 left promiscuous mode [ 3055.649334][ T8573] device 795 left promiscuous mode [ 3055.699542][ T8573] device 796 left promiscuous mode [ 3055.749558][ T8573] device 797 left promiscuous mode [ 3055.789595][ T8573] device 798 left promiscuous mode [ 3055.829656][ T8573] device 799 left promiscuous mode [ 3055.869606][ T8573] device 800 left promiscuous mode [ 3055.909582][ T8573] device 801 left promiscuous mode [ 3055.989880][ T8573] device 802 left promiscuous mode [ 3056.069158][ T8573] device 803 left promiscuous mode [ 3056.109610][ T8573] device 804 left promiscuous mode [ 3056.179412][ T8573] device 805 left promiscuous mode [ 3056.219391][ T8573] device 806 left promiscuous mode [ 3056.299482][ T8573] device 807 left promiscuous mode [ 3056.379158][ T8573] device 808 left promiscuous mode [ 3056.439349][ T8573] device 809 left promiscuous mode [ 3056.499331][ T8573] device 810 left promiscuous mode [ 3056.559581][ T8573] device 811 left promiscuous mode [ 3056.629356][ T8573] device 812 left promiscuous mode [ 3056.669553][ T8573] device 813 left promiscuous mode [ 3056.709546][ T8573] device 814 left promiscuous mode [ 3056.749713][ T8573] device 815 left promiscuous mode [ 3056.789895][ T8573] device 816 left promiscuous mode [ 3056.889226][ T8573] device 817 left promiscuous mode [ 3056.959533][ T8573] device 818 left promiscuous mode [ 3056.999677][ T8573] device 819 left promiscuous mode [ 3057.069442][ T8573] device 820 left promiscuous mode [ 3057.119584][ T8573] device 821 left promiscuous mode [ 3057.159542][ T8573] device 822 left promiscuous mode [ 3057.209578][ T8573] device 823 left promiscuous mode [ 3057.259362][ T8573] device 824 left promiscuous mode [ 3057.329508][ T8573] device 825 left promiscuous mode [ 3057.379528][ T8573] device 826 left promiscuous mode [ 3057.449403][ T8573] device 827 left promiscuous mode [ 3057.499555][ T8573] device 828 left promiscuous mode [ 3057.559668][ T8573] device 829 left promiscuous mode [ 3057.599634][ T8573] device 830 left promiscuous mode [ 3057.659428][ T8573] device 831 left promiscuous mode [ 3057.719597][ T8573] device 832 left promiscuous mode [ 3057.779345][ T8573] device 833 left promiscuous mode [ 3057.849460][ T8573] device 834 left promiscuous mode [ 3057.909335][ T8573] device 835 left promiscuous mode [ 3057.969396][ T8573] device 836 left promiscuous mode [ 3058.029372][ T8573] device 837 left promiscuous mode [ 3058.079526][ T8573] device 838 left promiscuous mode [ 3058.129415][ T8573] device 839 left promiscuous mode [ 3058.179574][ T8573] device 840 left promiscuous mode [ 3058.229523][ T8573] device 841 left promiscuous mode [ 3058.269417][ T8573] device 842 left promiscuous mode [ 3058.319170][ T8573] device 843 left promiscuous mode [ 3058.369563][ T8573] device 844 left promiscuous mode [ 3058.429661][ T8573] device 845 left promiscuous mode [ 3058.489521][ T8573] device 846 left promiscuous mode [ 3058.549515][ T8573] device 847 left promiscuous mode [ 3058.589552][ T8573] device 848 left promiscuous mode [ 3058.659450][ T8573] device 849 left promiscuous mode [ 3058.709372][ T8573] device 850 left promiscuous mode [ 3058.770699][ T8573] device 851 left promiscuous mode [ 3058.849151][ T8573] device 852 left promiscuous mode [ 3058.919560][ T8573] device 853 left promiscuous mode [ 3058.959617][ T8573] device 854 left promiscuous mode [ 3059.019521][ T8573] device 855 left promiscuous mode [ 3059.059462][ T8573] device 856 left promiscuous mode [ 3059.099474][ T8573] device 857 left promiscuous mode [ 3059.139607][ T8573] device 858 left promiscuous mode [ 3059.179516][ T8573] device 859 left promiscuous mode [ 3059.219697][ T8573] device 860 left promiscuous mode [ 3059.279411][ T8573] device 861 left promiscuous mode [ 3059.379156][ T8573] device 862 left promiscuous mode [ 3059.429556][ T8573] device 863 left promiscuous mode [ 3059.469587][ T8573] device 864 left promiscuous mode [ 3059.529467][ T8573] device 865 left promiscuous mode [ 3059.570506][ T8573] device 866 left promiscuous mode [ 3059.629364][ T8573] device 867 left promiscuous mode [ 3059.699390][ T8573] device 868 left promiscuous mode [ 3059.749584][ T8573] device 869 left promiscuous mode [ 3059.809582][ T8573] device 870 left promiscuous mode [ 3059.859451][ T8573] device 871 left promiscuous mode [ 3059.929364][ T8573] device 872 left promiscuous mode [ 3059.989309][ T8573] device 873 left promiscuous mode [ 3060.049373][ T8573] device 874 left promiscuous mode [ 3060.129561][ T8573] device 875 left promiscuous mode [ 3060.199566][ T8573] device 876 left promiscuous mode [ 3060.259626][ T8573] device 877 left promiscuous mode [ 3060.329299][ T8573] device 878 left promiscuous mode [ 3060.389529][ T8573] device 879 left promiscuous mode [ 3060.449273][ T8573] device 880 left promiscuous mode [ 3060.519384][ T8573] device 881 left promiscuous mode [ 3060.579547][ T8573] device 882 left promiscuous mode [ 3060.619562][ T8573] device 883 left promiscuous mode [ 3060.689522][ T8573] device 884 left promiscuous mode [ 3060.749398][ T8573] device 885 left promiscuous mode [ 3060.809342][ T8573] device 886 left promiscuous mode [ 3060.869367][ T8573] device 887 left promiscuous mode [ 3060.919508][ T8573] device 888 left promiscuous mode [ 3060.979562][ T8573] device 889 left promiscuous mode [ 3061.029281][ T8573] device 890 left promiscuous mode [ 3061.089324][ T8573] device 891 left promiscuous mode [ 3061.169281][ T8573] device 892 left promiscuous mode [ 3061.219535][ T8573] device 893 left promiscuous mode [ 3061.289361][ T8573] device 894 left promiscuous mode [ 3061.359587][ T8573] device 895 left promiscuous mode [ 3061.399575][ T8573] device 896 left promiscuous mode [ 3061.469296][ T8573] device 897 left promiscuous mode [ 3061.509586][ T8573] device 898 left promiscuous mode [ 3061.549618][ T8573] device 899 left promiscuous mode [ 3061.589802][ T8573] device 900 left promiscuous mode [ 3061.649234][ T8573] device 901 left promiscuous mode [ 3061.729369][ T8573] device 902 left promiscuous mode [ 3061.789556][ T8573] device 903 left promiscuous mode [ 3061.859613][ T8573] device 904 left promiscuous mode [ 3061.899599][ T8573] device 905 left promiscuous mode [ 3061.969926][ T8573] device 906 left promiscuous mode [ 3062.029540][ T8573] device 907 left promiscuous mode [ 3062.079683][ T8573] device 908 left promiscuous mode [ 3062.149496][ T8573] device 909 left promiscuous mode [ 3062.209300][ T8573] device 910 left promiscuous mode [ 3062.269329][ T8573] device 911 left promiscuous mode [ 3062.349325][ T8573] device 912 left promiscuous mode [ 3062.399569][ T8573] device 913 left promiscuous mode [ 3062.459523][ T8573] device 914 left promiscuous mode [ 3062.499461][ T8573] device 915 left promiscuous mode [ 3062.569366][ T8573] device 916 left promiscuous mode [ 3062.629362][ T8573] device 917 left promiscuous mode [ 3062.689367][ T8573] device 918 left promiscuous mode [ 3062.749344][ T8573] device 919 left promiscuous mode [ 3062.819562][ T8573] device 920 left promiscuous mode [ 3062.869468][ T8573] device 921 left promiscuous mode [ 3062.929354][ T8573] device 922 left promiscuous mode [ 3062.989391][ T8573] device 923 left promiscuous mode [ 3063.069897][ T8573] device 924 left promiscuous mode [ 3063.129362][ T8573] device 925 left promiscuous mode [ 3063.209408][ T8573] device 926 left promiscuous mode [ 3063.259574][ T8573] device 927 left promiscuous mode [ 3063.319555][ T8573] device 928 left promiscuous mode [ 3063.379736][ T8573] device 929 left promiscuous mode [ 3063.439331][ T8573] device 930 left promiscuous mode [ 3063.479715][ T8573] device 931 left promiscuous mode [ 3063.549136][ T8573] device 932 left promiscuous mode [ 3063.619566][ T8573] device 933 left promiscuous mode [ 3063.659602][ T8573] device 934 left promiscuous mode [ 3063.709672][ T8573] device 935 left promiscuous mode [ 3063.779560][ T8573] device 936 left promiscuous mode [ 3063.819703][ T8573] device 937 left promiscuous mode [ 3063.869607][ T8573] device 938 left promiscuous mode [ 3063.949629][ T8573] device 939 left promiscuous mode [ 3063.999141][ T8573] device 940 left promiscuous mode [ 3064.049550][ T8573] device 941 left promiscuous mode [ 3064.109397][ T8573] device 942 left promiscuous mode [ 3064.159524][ T8573] device 943 left promiscuous mode [ 3064.209166][ T8573] device 944 left promiscuous mode [ 3064.259495][ T8573] device 945 left promiscuous mode [ 3064.299537][ T8573] device 946 left promiscuous mode [ 3064.369438][ T8573] device 947 left promiscuous mode [ 3064.419513][ T8573] device 948 left promiscuous mode [ 3064.459519][ T8573] device 949 left promiscuous mode [ 3064.499479][ T8573] device 950 left promiscuous mode [ 3064.539538][ T8573] device 951 left promiscuous mode [ 3064.579460][ T8573] device 952 left promiscuous mode [ 3064.619576][ T8573] device 953 left promiscuous mode [ 3064.659620][ T8573] device 954 left promiscuous mode [ 3064.719593][ T8573] device 955 left promiscuous mode [ 3064.789411][ T8573] device 956 left promiscuous mode [ 3064.849341][ T8573] device 957 left promiscuous mode [ 3064.909419][ T8573] device 958 left promiscuous mode [ 3064.949348][ T8573] device 959 left promiscuous mode [ 3065.019251][ T8573] device 960 left promiscuous mode [ 3065.089315][ T8573] device 961 left promiscuous mode [ 3065.159463][ T8573] device 962 left promiscuous mode [ 3065.219647][ T8573] device 963 left promiscuous mode [ 3065.259579][ T8573] device 964 left promiscuous mode [ 3065.300456][ T8573] device 965 left promiscuous mode [ 3065.369320][ T8573] device 966 left promiscuous mode [ 3065.419544][ T8573] device 967 left promiscuous mode [ 3065.499386][ T8573] device 968 left promiscuous mode [ 3065.549587][ T8573] device 969 left promiscuous mode [ 3065.599541][ T8573] device 970 left promiscuous mode [ 3065.659628][ T8573] device 971 left promiscuous mode [ 3065.729323][ T8573] device 972 left promiscuous mode [ 3065.789334][ T8573] device 973 left promiscuous mode [ 3065.839586][ T8573] device 974 left promiscuous mode [ 3065.899400][ T8573] device 975 left promiscuous mode [ 3065.959297][ T8573] device 976 left promiscuous mode [ 3066.019311][ T8573] device Zd left promiscuous mode [ 3066.069484][ T8573] device cd left promiscuous mode [ 3066.139357][ T8573] device 00 left promiscuous mode [ 3066.199647][ T8573] device 10 left promiscuous mode [ 3066.269276][ T8573] device 0Z left promiscuous mode [ 3066.309614][ T8573] device 1Z left promiscuous mode [ 3066.369440][ T8573] device 0c left promiscuous mode [ 3066.439575][ T8573] device 1c left promiscuous mode [ 3066.479618][ T8573] device 0 left promiscuous mode [ 3066.519553][ T8573] device 1 left promiscuous mode [ 3066.559632][ T8573] device 977 left promiscuous mode [ 3066.619489][ T8573] device 978 left promiscuous mode [ 3066.659427][ T8573] device 979 left promiscuous mode [ 3066.699341][ T8573] device 980 left promiscuous mode [ 3066.779541][ T8573] device 981 left promiscuous mode [ 3066.829636][ T8573] device 982 left promiscuous mode [ 3066.889371][ T8573] device 983 left promiscuous mode [ 3066.979198][ T8573] device 984 left promiscuous mode [ 3067.039342][ T8573] device 985 left promiscuous mode [ 3067.099318][ T8573] device 986 left promiscuous mode [ 3067.169537][ T8573] device 987 left promiscuous mode [ 3067.229612][ T8573] device 988 left promiscuous mode [ 3067.279585][ T8573] device 989 left promiscuous mode [ 3067.329662][ T8573] device 990 left promiscuous mode [ 3067.389466][ T8573] device 991 left promiscuous mode [ 3067.439514][ T8573] device 992 left promiscuous mode [ 3067.509431][ T8573] device 993 left promiscuous mode [ 3067.569428][ T8573] device 994 left promiscuous mode [ 3067.649166][ T8573] device 995 left promiscuous mode [ 3067.699623][ T8573] device 996 left promiscuous mode [ 3067.769427][ T8573] device 997 left promiscuous mode [ 3067.819535][ T8573] device 998 left promiscuous mode [ 3067.859493][ T8573] device 999 left promiscuous mode [ 3067.919354][ T8573] device 1000 left promiscuous mode [ 3067.969528][ T8573] device 1001 left promiscuous mode [ 3068.069106][ T8573] device 1002 left promiscuous mode [ 3068.119547][ T8573] device 1003 left promiscuous mode [ 3068.179324][ T8573] device 1004 left promiscuous mode [ 3068.249346][ T8573] device 1005 left promiscuous mode [ 3068.329168][ T8573] device 1006 left promiscuous mode [ 3068.379526][ T8573] device 1007 left promiscuous mode [ 3068.419467][ T8573] device 1008 left promiscuous mode [ 3068.459492][ T8573] device 1009 left promiscuous mode [ 3068.499537][ T8573] device 1010 left promiscuous mode [ 3068.559370][ T8573] device 1011 left promiscuous mode [ 3068.629483][ T8573] device 1012 left promiscuous mode [ 3068.689185][ T8573] device 1013 left promiscuous mode [ 3068.769220][ T8573] device 1014 left promiscuous mode [ 3068.829373][ T8573] device 1015 left promiscuous mode [ 3068.879579][ T8573] device 1016 left promiscuous mode [ 3068.919773][ T8573] device 1017 left promiscuous mode [ 3068.979441][ T8573] device 1018 left promiscuous mode [ 3069.049592][ T8573] device 1019 left promiscuous mode [ 3069.129325][ T8573] device 1020 left promiscuous mode [ 3069.209234][ T8573] device 1021 left promiscuous mode [ 3069.259594][ T8573] device 1022 left promiscuous mode [ 3069.319500][ T8573] device 1023 left promiscuous mode [ 3069.399174][ T8573] device 1024 left promiscuous mode [ 3069.479233][ T8573] device 1025 left promiscuous mode [ 3069.549354][ T8573] device 1026 left promiscuous mode [ 3069.609486][ T8573] device 1027 left promiscuous mode [ 3069.649518][ T8573] device 1028 left promiscuous mode [ 3069.699151][ T8573] device 1029 left promiscuous mode [ 3069.739644][ T8573] device 1030 left promiscuous mode [ 3069.801492][ T8573] device 1031 left promiscuous mode [ 3069.859259][ T8573] device 1032 left promiscuous mode [ 3069.949350][ T8573] device 1033 left promiscuous mode [ 3069.999319][ T8573] device 1034 left promiscuous mode [ 3070.049647][ T8573] device 1035 left promiscuous mode [ 3070.119469][ T8573] device 1036 left promiscuous mode [ 3070.179346][ T8573] device 1037 left promiscuous mode [ 3070.229593][ T8573] device 1038 left promiscuous mode [ 3070.269606][ T8573] device 1039 left promiscuous mode [ 3070.339504][ T8573] device 1040 left promiscuous mode [ 3070.389580][ T8573] device 1041 left promiscuous mode [ 3070.429557][ T8573] device 1042 left promiscuous mode [ 3070.499961][ T8573] device 1043 left promiscuous mode [ 3070.589350][ T8573] device 1044 left promiscuous mode [ 3070.649358][ T8573] device 1045 left promiscuous mode [ 3070.689511][ T8573] device 1046 left promiscuous mode [ 3070.729524][ T8573] device 1047 left promiscuous mode [ 3070.769753][ T8573] device 1048 left promiscuous mode [ 3070.829421][ T8573] device 1049 left promiscuous mode [ 3070.869600][ T8573] device 1050 left promiscuous mode [ 3070.919534][ T8573] device 1051 left promiscuous mode [ 3070.969542][ T8573] device 1052 left promiscuous mode [ 3071.019375][ T8573] device 1053 left promiscuous mode [ 3071.079328][ T8573] device 1054 left promiscuous mode [ 3071.139340][ T8573] device 1055 left promiscuous mode [ 3071.189598][ T8573] device 1056 left promiscuous mode [ 3071.239406][ T8573] device 1057 left promiscuous mode [ 3071.289559][ T8573] device 1058 left promiscuous mode [ 3071.349250][ T8573] device 1059 left promiscuous mode [ 3071.409170][ T8573] device 1060 left promiscuous mode [ 3071.479329][ T8573] device 1061 left promiscuous mode [ 3071.519566][ T8573] device 1062 left promiscuous mode [ 3071.579365][ T8573] device 1063 left promiscuous mode [ 3071.639409][ T8573] device 1064 left promiscuous mode [ 3071.709250][ T8573] device 1065 left promiscuous mode [ 3071.749601][ T8573] device 1066 left promiscuous mode [ 3071.809370][ T8573] device 1067 left promiscuous mode [ 3071.849544][ T8573] device 1068 left promiscuous mode [ 3071.889566][ T8573] device 1069 left promiscuous mode [ 3071.969154][ T8573] device 1070 left promiscuous mode [ 3072.029390][ T8573] device 1071 left promiscuous mode [ 3072.079547][ T8573] device 1072 left promiscuous mode [ 3072.119553][ T8573] device 1073 left promiscuous mode [ 3072.179580][ T8573] device 1074 left promiscuous mode [ 3072.229393][ T8573] device 1075 left promiscuous mode [ 3072.279750][ T8573] device 1076 left promiscuous mode [ 3072.349972][ T8573] device 1077 left promiscuous mode [ 3072.399569][ T8573] device 1078 left promiscuous mode [ 3072.449547][ T8573] device 1079 left promiscuous mode [ 3072.499493][ T8573] device 1080 left promiscuous mode [ 3072.569395][ T8573] device 1081 left promiscuous mode [ 3072.629490][ T8573] device 1082 left promiscuous mode [ 3072.669469][ T8573] device 1083 left promiscuous mode [ 3072.739645][ T8573] device 1084 left promiscuous mode [ 3072.779668][ T8573] device 1085 left promiscuous mode [ 3072.849432][ T8573] device 1086 left promiscuous mode [ 3072.900631][ T8573] device 1087 left promiscuous mode [ 3072.949218][ T8573] device 1088 left promiscuous mode [ 3072.999542][ T8573] device 1089 left promiscuous mode [ 3073.069424][ T8573] device 1090 left promiscuous mode [ 3073.129411][ T8573] device 1091 left promiscuous mode [ 3073.209392][ T8573] device 1092 left promiscuous mode [ 3073.269423][ T8573] device 1093 left promiscuous mode [ 3073.329406][ T8573] device 1094 left promiscuous mode [ 3073.379609][ T8573] device 1095 left promiscuous mode [ 3073.449385][ T8573] device 1096 left promiscuous mode [ 3073.529274][ T8573] device 1097 left promiscuous mode [ 3073.579618][ T8573] device 1098 left promiscuous mode [ 3073.649334][ T8573] device 1099 left promiscuous mode [ 3073.719525][ T8573] device 1100 left promiscuous mode [ 3073.769358][ T8573] device 1101 left promiscuous mode [ 3073.819594][ T8573] device 1102 left promiscuous mode [ 3073.879615][ T8573] device 1103 left promiscuous mode [ 3073.919379][ T8573] device 1104 left promiscuous mode [ 3073.979351][ T8573] device 1105 left promiscuous mode [ 3074.029551][ T8573] device 1106 left promiscuous mode [ 3074.089414][ T8573] device 1107 left promiscuous mode [ 3074.159210][ T8573] device 1108 left promiscuous mode [ 3074.230060][ T8573] device 1109 left promiscuous mode [ 3074.289478][ T8573] device 1110 left promiscuous mode [ 3074.329608][ T8573] device 1111 left promiscuous mode [ 3074.379459][ T8573] device 1112 left promiscuous mode [ 3074.429574][ T8573] device 1113 left promiscuous mode [ 3074.479444][ T8573] device 1114 left promiscuous mode [ 3074.539465][ T8573] device 1115 left promiscuous mode [ 3074.579640][ T8573] device 1116 left promiscuous mode [ 3074.639423][ T8573] device 1117 left promiscuous mode [ 3074.729371][ T8573] device 1118 left promiscuous mode [ 3074.779150][ T8573] device 1119 left promiscuous mode [ 3074.840150][ T8573] device 1120 left promiscuous mode [ 3074.899577][ T8573] device 1121 left promiscuous mode [ 3074.939544][ T8573] device 1122 left promiscuous mode [ 3074.979540][ T8573] device 1123 left promiscuous mode [ 3075.049480][ T8573] device 1124 left promiscuous mode [ 3075.109457][ T8573] device 1125 left promiscuous mode [ 3075.179305][ T8573] device 1126 left promiscuous mode [ 3075.249370][ T8573] device 1127 left promiscuous mode [ 3075.319557][ T8573] device 1128 left promiscuous mode [ 3075.379438][ T8573] device 1129 left promiscuous mode [ 3075.429663][ T8573] device 1130 left promiscuous mode [ 3075.469574][ T8573] device 1131 left promiscuous mode [ 3075.509679][ T8573] device 1132 left promiscuous mode [ 3075.559536][ T8573] device 1133 left promiscuous mode [ 3075.599459][ T8573] device 1134 left promiscuous mode [ 3075.639416][ T8573] device 1135 left promiscuous mode [ 3075.709236][ T8573] device 1136 left promiscuous mode [ 3075.749584][ T8573] device 1137 left promiscuous mode [ 3075.789630][ T8573] device 1138 left promiscuous mode [ 3075.849202][ T8573] device 1139 left promiscuous mode [ 3075.889588][ T8573] device 1140 left promiscuous mode [ 3075.929603][ T8573] device 1141 left promiscuous mode [ 3075.969494][ T8573] device 1142 left promiscuous mode [ 3076.039426][ T8573] device 1143 left promiscuous mode [ 3076.109247][ T8573] device 1144 left promiscuous mode [ 3076.179350][ T8573] device 1145 left promiscuous mode [ 3076.229466][ T8573] device 1146 left promiscuous mode [ 3076.309182][ T8573] device 1147 left promiscuous mode [ 3076.359478][ T8573] device 1148 left promiscuous mode [ 3076.400628][ T8573] device 1149 left promiscuous mode [ 3076.469276][ T8573] device 1150 left promiscuous mode [ 3076.509374][ T8573] device 1151 left promiscuous mode [ 3076.589375][ T8573] device 1152 left promiscuous mode [ 3076.639580][ T8573] device 1153 left promiscuous mode [ 3076.699646][ T8573] device 1154 left promiscuous mode [ 3076.769330][ T8573] device 1155 left promiscuous mode [ 3076.839554][ T8573] device 1156 left promiscuous mode [ 3076.879607][ T8573] device 1157 left promiscuous mode [ 3076.919730][ T8573] device 1158 left promiscuous mode [ 3076.959493][ T8573] device 1159 left promiscuous mode [ 3077.019481][ T8573] device 1160 left promiscuous mode [ 3077.059586][ T8573] device 1161 left promiscuous mode [ 3077.119593][ T8573] device 1162 left promiscuous mode [ 3077.159548][ T8573] device 1163 left promiscuous mode [ 3077.229362][ T8573] device 1164 left promiscuous mode [ 3077.289560][ T8573] device 1165 left promiscuous mode [ 3077.359350][ T8573] device 1166 left promiscuous mode [ 3077.419621][ T8573] device 1167 left promiscuous mode [ 3077.459580][ T8573] device 1168 left promiscuous mode [ 3077.499680][ T8573] device 1169 left promiscuous mode [ 3077.539614][ T8573] device 1170 left promiscuous mode [ 3077.579559][ T8573] device 1171 left promiscuous mode [ 3077.619551][ T8573] device 1172 left promiscuous mode [ 3077.679589][ T8573] device 1173 left promiscuous mode [ 3077.739232][ T8573] device 1174 left promiscuous mode [ 3077.809501][ T8573] device 1175 left promiscuous mode [ 3077.859581][ T8573] device 1176 left promiscuous mode [ 3077.899670][ T8573] device 1177 left promiscuous mode [ 3077.969329][ T8573] device 1178 left promiscuous mode [ 3078.019402][ T8573] device 1179 left promiscuous mode [ 3078.059595][ T8573] device 1180 left promiscuous mode [ 3078.129287][ T8573] device 1181 left promiscuous mode [ 3078.199425][ T8573] device 1182 left promiscuous mode [ 3078.249613][ T8573] device 1183 left promiscuous mode [ 3078.319325][ T8573] device 1184 left promiscuous mode [ 3078.399391][ T8573] device 1185 left promiscuous mode [ 3078.449477][ T8573] device 1186 left promiscuous mode [ 3078.489587][ T8573] device 1187 left promiscuous mode [ 3078.549586][ T8573] device 1188 left promiscuous mode [ 3078.619430][ T8573] device 1189 left promiscuous mode [ 3078.679881][ T8573] device 1190 left promiscuous mode [ 3078.719434][ T8573] device 1191 left promiscuous mode [ 3078.769586][ T8573] device 1192 left promiscuous mode [ 3078.809625][ T8573] device 1193 left promiscuous mode [ 3078.879416][ T8573] device 1194 left promiscuous mode [ 3078.939155][ T8573] device 1195 left promiscuous mode [ 3078.999467][ T8573] device 1196 left promiscuous mode [ 3079.059444][ T8573] device 1197 left promiscuous mode [ 3079.119383][ T8573] device 1198 left promiscuous mode [ 3079.199660][ T8573] device 1199 left promiscuous mode [ 3079.279394][ T8573] device 1200 left promiscuous mode [ 3079.319709][ T8573] device 1201 left promiscuous mode [ 3079.359681][ T8573] device 1202 left promiscuous mode [ 3079.419424][ T8573] device 1203 left promiscuous mode [ 3079.489410][ T8573] device 1204 left promiscuous mode [ 3079.549647][ T8573] device 1205 left promiscuous mode [ 3079.619468][ T8573] device 1206 left promiscuous mode [ 3079.659498][ T8573] device 1207 left promiscuous mode [ 3079.729559][ T8573] device 1208 left promiscuous mode [ 3079.769595][ T8573] device 1209 left promiscuous mode [ 3079.819567][ T8573] device 1210 left promiscuous mode [ 3079.879534][ T8573] device 1211 left promiscuous mode [ 3079.939358][ T8573] device 1212 left promiscuous mode [ 3079.979385][ T8573] device 1213 left promiscuous mode [ 3080.039518][ T8573] device 1214 left promiscuous mode [ 3080.119399][ T8573] device 1215 left promiscuous mode [ 3080.209387][ T8573] device 1216 left promiscuous mode [ 3080.259497][ T8573] device 1217 left promiscuous mode [ 3080.309695][ T8573] device 1218 left promiscuous mode [ 3080.379541][ T8573] device 1219 left promiscuous mode [ 3080.429616][ T8573] device 1220 left promiscuous mode [ 3080.489582][ T8573] device 1221 left promiscuous mode [ 3080.539507][ T8573] device 1222 left promiscuous mode [ 3080.599559][ T8573] device 1223 left promiscuous mode [ 3080.649775][ T8573] device 1224 left promiscuous mode [ 3080.709215][ T8573] device 1225 left promiscuous mode [ 3080.769611][ T8573] device 1226 left promiscuous mode [ 3080.809604][ T8573] device 1227 left promiscuous mode [ 3080.889306][ T8573] device 1228 left promiscuous mode [ 3080.939567][ T8573] device 1229 left promiscuous mode [ 3080.979505][ T8573] device 1230 left promiscuous mode [ 3081.049502][ T8573] device 1231 left promiscuous mode [ 3081.129288][ T8573] device 1232 left promiscuous mode [ 3081.190003][ T8573] device 1233 left promiscuous mode [ 3081.259515][ T8573] device 1234 left promiscuous mode [ 3081.329385][ T8573] device 1235 left promiscuous mode [ 3081.379169][ T8573] device 1236 left promiscuous mode [ 3081.439379][ T8573] device 1237 left promiscuous mode [ 3081.509341][ T8573] device 1238 left promiscuous mode [ 3081.579599][ T8573] device 1239 left promiscuous mode [ 3081.639293][ T8573] device 1240 left promiscuous mode [ 3081.709600][ T8573] device 1241 left promiscuous mode [ 3081.779356][ T8573] device 1242 left promiscuous mode [ 3081.839713][ T8573] device 1243 left promiscuous mode [ 3081.899389][ T8573] device 1244 left promiscuous mode [ 3081.969550][ T8573] device 1245 left promiscuous mode [ 3082.029733][ T8573] device 1246 left promiscuous mode [ 3082.089559][ T8573] device 1247 left promiscuous mode [ 3082.129526][ T8573] device 1248 left promiscuous mode [ 3082.179195][ T8573] device 1249 left promiscuous mode [ 3082.249221][ T8573] device 1250 left promiscuous mode [ 3082.299667][ T8573] device 1251 left promiscuous mode [ 3082.369976][ T8573] device 1252 left promiscuous mode [ 3082.459377][ T8573] device 1253 left promiscuous mode [ 3082.529569][ T8573] device 1254 left promiscuous mode [ 3082.569488][ T8573] device 1255 left promiscuous mode [ 3082.639496][ T8573] device 1256 left promiscuous mode [ 3082.689584][ T8573] device 1257 left promiscuous mode [ 3082.759890][ T8573] device 1258 left promiscuous mode [ 3082.829341][ T8573] device 1259 left promiscuous mode [ 3082.879429][ T8573] device 1260 left promiscuous mode [ 3082.949280][ T8573] device 1261 left promiscuous mode [ 3082.989689][ T8573] device 1262 left promiscuous mode [ 3083.049346][ T8573] device 1263 left promiscuous mode [ 3083.109343][ T8573] device 1264 left promiscuous mode [ 3083.169500][ T8573] device 1265 left promiscuous mode [ 3083.249138][ T8573] device 1266 left promiscuous mode [ 3083.299668][ T8573] device 1267 left promiscuous mode [ 3083.339598][ T8573] device 1268 left promiscuous mode [ 3083.399460][ T8573] device 1269 left promiscuous mode [ 3083.449528][ T8573] device 1270 left promiscuous mode [ 3083.549183][ T8573] device 1271 left promiscuous mode [ 3083.609371][ T8573] device 1272 left promiscuous mode [ 3083.679401][ T8573] device 1273 left promiscuous mode [ 3083.749447][ T8573] device 1274 left promiscuous mode [ 3083.819387][ T8573] device 1275 left promiscuous mode [ 3083.889474][ T8573] device 1276 left promiscuous mode [ 3083.949415][ T8573] device 1277 left promiscuous mode [ 3083.999673][ T8573] device 1278 left promiscuous mode [ 3084.059220][ T8573] device 1279 left promiscuous mode [ 3084.129404][ T8573] device 1280 left promiscuous mode [ 3084.179565][ T8573] device 1281 left promiscuous mode [ 3084.249987][ T8573] device 1282 left promiscuous mode [ 3084.349138][ T8573] device 1283 left promiscuous mode [ 3084.429336][ T8573] device 1284 left promiscuous mode [ 3084.489444][ T8573] device 1285 left promiscuous mode [ 3084.549489][ T8573] device 1286 left promiscuous mode [ 3084.619239][ T8573] device 1287 left promiscuous mode [ 3084.679273][ T8573] device 1288 left promiscuous mode [ 3084.729559][ T8573] device 1289 left promiscuous mode [ 3084.789634][ T8573] device 1290 left promiscuous mode [ 3084.829622][ T8573] device 1291 left promiscuous mode [ 3084.899379][ T8573] device 1292 left promiscuous mode [ 3084.949555][ T8573] device 1293 left promiscuous mode [ 3084.989516][ T8573] device 1294 left promiscuous mode [ 3085.029536][ T8573] device 1295 left promiscuous mode [ 3085.089870][ T8573] device 1296 left promiscuous mode [ 3085.169154][ T8573] device 1297 left promiscuous mode [ 3085.219723][ T8573] device 1298 left promiscuous mode [ 3085.279393][ T8573] device 1299 left promiscuous mode [ 3085.339399][ T8573] device 1300 left promiscuous mode [ 3085.409301][ T8573] device 1301 left promiscuous mode [ 3085.489177][ T8573] device 1302 left promiscuous mode [ 3085.549450][ T8573] device 1303 left promiscuous mode [ 3085.599583][ T8573] device 1304 left promiscuous mode [ 3085.639674][ T8573] device 1305 left promiscuous mode [ 3085.689171][ T8573] device 1306 left promiscuous mode [ 3085.739632][ T8573] device 1307 left promiscuous mode [ 3085.799561][ T8573] device 1308 left promiscuous mode [ 3085.839323][ T8573] device 1309 left promiscuous mode [ 3085.879642][ T8573] device 1310 left promiscuous mode [ 3085.949358][ T8573] device 1311 left promiscuous mode [ 3086.009481][ T8573] device 1312 left promiscuous mode [ 3086.059594][ T8573] device 1313 left promiscuous mode [ 3086.130008][ T8573] device 1314 left promiscuous mode [ 3086.199268][ T8573] device 1315 left promiscuous mode [ 3086.269336][ T8573] device 1316 left promiscuous mode [ 3086.349328][ T8573] device 1317 left promiscuous mode [ 3086.409276][ T8573] device 1318 left promiscuous mode [ 3086.469304][ T8573] device 1319 left promiscuous mode [ 3086.549168][ T8573] device 1320 left promiscuous mode [ 3086.609405][ T8573] device 1321 left promiscuous mode [ 3086.689262][ T8573] device 1322 left promiscuous mode [ 3086.759606][ T8573] device 1323 left promiscuous mode [ 3086.819339][ T8573] device 1324 left promiscuous mode [ 3086.869528][ T8573] device 1325 left promiscuous mode [ 3086.929563][ T8573] device 1326 left promiscuous mode [ 3086.989547][ T8573] device 1327 left promiscuous mode [ 3087.069129][ T8573] device 1328 left promiscuous mode [ 3087.129355][ T8573] device 1329 left promiscuous mode [ 3087.179564][ T8573] device 1330 left promiscuous mode [ 3087.219741][ T8573] device 1331 left promiscuous mode [ 3087.289360][ T8573] device 1332 left promiscuous mode [ 3087.340602][ T8573] device 1333 left promiscuous mode [ 3087.389211][ T8573] device 1334 left promiscuous mode [ 3087.439608][ T8573] device 1335 left promiscuous mode [ 3087.499434][ T8573] device 1336 left promiscuous mode [ 3087.569209][ T8573] device 1337 left promiscuous mode [ 3087.639409][ T8573] device 1338 left promiscuous mode [ 3087.689643][ T8573] device 1339 left promiscuous mode [ 3087.739149][ T8573] device 1340 left promiscuous mode [ 3087.799579][ T8573] device 1341 left promiscuous mode [ 3087.869278][ T8573] device 1342 left promiscuous mode [ 3087.939348][ T8573] device 1343 left promiscuous mode [ 3088.019373][ T8573] device 1344 left promiscuous mode [ 3088.059342][ T8573] device 1345 left promiscuous mode [ 3088.129526][ T8573] device 1346 left promiscuous mode [ 3088.179406][ T8573] device 1347 left promiscuous mode [ 3088.219372][ T8573] device 1348 left promiscuous mode [ 3088.289595][ T8573] device 1349 left promiscuous mode [ 3088.349205][ T8573] device 1350 left promiscuous mode [ 3088.389597][ T8573] device 1351 left promiscuous mode [ 3088.449655][ T8573] device 1352 left promiscuous mode [ 3088.510125][ T8573] device 1353 left promiscuous mode [ 3088.589139][ T8573] device 1354 left promiscuous mode [ 3088.649395][ T8573] device 1355 left promiscuous mode [ 3088.689433][ T8573] device 1356 left promiscuous mode [ 3088.729373][ T8573] device 1357 left promiscuous mode [ 3088.789391][ T8573] device 1358 left promiscuous mode [ 3088.859176][ T8573] device 1359 left promiscuous mode [ 3088.900551][ T8573] device 1360 left promiscuous mode [ 3088.949438][ T8573] device 1361 left promiscuous mode [ 3088.989562][ T8573] device 1362 left promiscuous mode [ 3089.049519][ T8573] device 1363 left promiscuous mode [ 3089.099357][ T8573] device 1364 left promiscuous mode [ 3089.179331][ T8573] device 1365 left promiscuous mode [ 3089.219304][ T8573] device 1366 left promiscuous mode [ 3089.269655][ T8573] device 1367 left promiscuous mode [ 3089.309418][ T8573] device 1368 left promiscuous mode [ 3089.379504][ T8573] device 1369 left promiscuous mode [ 3089.479439][ T8573] device 1370 left promiscuous mode [ 3089.519324][ T8573] device 1371 left promiscuous mode [ 3089.579399][ T8573] device 1372 left promiscuous mode [ 3089.629592][ T8573] device 1373 left promiscuous mode [ 3089.699361][ T8573] device 1374 left promiscuous mode [ 3089.749589][ T8573] device 1375 left promiscuous mode [ 3089.809530][ T8573] device 1376 left promiscuous mode [ 3089.849537][ T8573] device 1377 left promiscuous mode [ 3089.919385][ T8573] device 1378 left promiscuous mode [ 3089.979349][ T8573] device 1379 left promiscuous mode [ 3090.039596][ T8573] device 1380 left promiscuous mode [ 3090.079343][ T8573] device 1381 left promiscuous mode [ 3090.149573][ T8573] device 1382 left promiscuous mode [ 3090.199414][ T8573] device 1383 left promiscuous mode [ 3090.270565][ T8573] device 1384 left promiscuous mode [ 3090.319262][ T8573] device 1385 left promiscuous mode [ 3090.359428][ T8573] device 1386 left promiscuous mode [ 3090.409615][ T8573] device 1387 left promiscuous mode [ 3090.449635][ T8573] device 1388 left promiscuous mode [ 3090.509524][ T8573] device 1389 left promiscuous mode [ 3090.579605][ T8573] device 1390 left promiscuous mode [ 3090.619764][ T8573] device 1391 left promiscuous mode [ 3090.683046][ T8573] device 1392 left promiscuous mode [ 3090.759638][ T8573] device 1393 left promiscuous mode [ 3090.829417][ T8573] device 1394 left promiscuous mode [ 3090.879621][ T8573] device 1395 left promiscuous mode [ 3090.949506][ T8573] device 1396 left promiscuous mode [ 3090.989493][ T8573] device 1397 left promiscuous mode [ 3091.059363][ T8573] device 1398 left promiscuous mode [ 3091.129338][ T8573] device 1399 left promiscuous mode [ 3091.189476][ T8573] device 1400 left promiscuous mode [ 3091.269561][ T8573] device 1401 left promiscuous mode [ 3091.309616][ T8573] device 1402 left promiscuous mode [ 3091.349620][ T8573] device 1403 left promiscuous mode [ 3091.409318][ T8573] device 1404 left promiscuous mode [ 3091.449595][ T8573] device 1405 left promiscuous mode [ 3091.509207][ T8573] device 1406 left promiscuous mode [ 3091.549432][ T8573] device 1407 left promiscuous mode [ 3091.599595][ T8573] device 1408 left promiscuous mode [ 3091.659611][ T8573] device 1409 left promiscuous mode [ 3091.729443][ T8573] device 1410 left promiscuous mode [ 3091.789410][ T8573] device 1411 left promiscuous mode [ 3091.839597][ T8573] device 1412 left promiscuous mode [ 3091.889120][ T8573] device 1413 left promiscuous mode [ 3091.939612][ T8573] device 1414 left promiscuous mode [ 3091.979606][ T8573] device 1415 left promiscuous mode [ 3092.039502][ T8573] device 1416 left promiscuous mode [ 3092.099505][ T8573] device 1417 left promiscuous mode [ 3092.149402][ T8573] device 1418 left promiscuous mode [ 3092.209553][ T8573] device 1419 left promiscuous mode [ 3092.279614][ T8573] device 1420 left promiscuous mode [ 3092.339228][ T8573] device 1421 left promiscuous mode [ 3092.419424][ T8573] device 1422 left promiscuous mode [ 3092.509321][ T8573] device 1423 left promiscuous mode [ 3092.549518][ T8573] device 1424 left promiscuous mode [ 3092.609392][ T8573] device 1425 left promiscuous mode [ 3092.679692][ T8573] device 1426 left promiscuous mode [ 3092.739222][ T8573] device 1427 left promiscuous mode [ 3092.790146][ T8573] device 1428 left promiscuous mode [ 3092.859259][ T8573] device 1429 left promiscuous mode [ 3092.929323][ T8573] device 1430 left promiscuous mode [ 3092.989578][ T8573] device 1431 left promiscuous mode [ 3093.049367][ T8573] device 1432 left promiscuous mode [ 3093.109485][ T8573] device 1433 left promiscuous mode [ 3093.159555][ T8573] device 1434 left promiscuous mode [ 3093.229453][ T8573] device 1435 left promiscuous mode [ 3093.299577][ T8573] device 1436 left promiscuous mode [ 3093.349417][ T8573] device 1437 left promiscuous mode [ 3093.399905][ T8573] device 1438 left promiscuous mode [ 3093.460565][ T8573] device 1439 left promiscuous mode [ 3093.529711][ T8573] device 1440 left promiscuous mode [ 3093.589348][ T8573] device 1441 left promiscuous mode [ 3093.649357][ T8573] device 1442 left promiscuous mode [ 3093.709294][ T8573] device 1443 left promiscuous mode [ 3093.779556][ T8573] device 1444 left promiscuous mode [ 3093.839641][ T8573] device 1445 left promiscuous mode [ 3093.880460][ T8573] device 1446 left promiscuous mode [ 3093.959181][ T8573] device 1447 left promiscuous mode [ 3094.019417][ T8573] device 1448 left promiscuous mode [ 3094.079518][ T8573] device 1449 left promiscuous mode [ 3094.129640][ T8573] device 1450 left promiscuous mode [ 3094.199364][ T8573] device 1451 left promiscuous mode [ 3094.249581][ T8573] device 1452 left promiscuous mode [ 3094.299534][ T8573] device 1453 left promiscuous mode [ 3094.359348][ T8573] device 1454 left promiscuous mode [ 3094.420227][ T8573] device 1455 left promiscuous mode [ 3094.469124][ T8573] device 1456 left promiscuous mode [ 3094.519569][ T8573] device 1457 left promiscuous mode [ 3094.579434][ T8573] device 1458 left promiscuous mode [ 3094.639516][ T8573] device 1459 left promiscuous mode [ 3094.689651][ T8573] device 1460 left promiscuous mode [ 3094.759538][ T8573] device 1461 left promiscuous mode [ 3094.809323][ T8573] device 1462 left promiscuous mode [ 3094.859504][ T8573] device 1463 left promiscuous mode [ 3094.899614][ T8573] device 1464 left promiscuous mode [ 3094.959532][ T8573] device 1465 left promiscuous mode [ 3094.999609][ T8573] device 1466 left promiscuous mode [ 3095.059556][ T8573] device 1467 left promiscuous mode [ 3095.119299][ T8573] device 1468 left promiscuous mode [ 3095.189323][ T8573] device 1469 left promiscuous mode [ 3095.279328][ T8573] device 1470 left promiscuous mode [ 3095.359325][ T8573] device 1471 left promiscuous mode [ 3095.399457][ T8573] device 1472 left promiscuous mode [ 3095.459352][ T8573] device 1473 left promiscuous mode [ 3095.509552][ T8573] device 1474 left promiscuous mode [ 3095.569477][ T8573] device 1475 left promiscuous mode [ 3095.619532][ T8573] device 1476 left promiscuous mode [ 3095.679817][ T8573] device 1477 left promiscuous mode [ 3095.723640][ T8573] device 1478 left promiscuous mode [ 3095.779590][ T8573] device 1479 left promiscuous mode [ 3095.819600][ T8573] device 1480 left promiscuous mode [ 3095.879561][ T8573] device 1481 left promiscuous mode [ 3095.919533][ T8573] device 1482 left promiscuous mode [ 3095.979575][ T8573] device 1483 left promiscuous mode [ 3096.039622][ T8573] device 1484 left promiscuous mode [ 3096.079692][ T8573] device 1485 left promiscuous mode [ 3096.139417][ T8573] device 1486 left promiscuous mode [ 3096.229226][ T8573] device 1487 left promiscuous mode [ 3096.289537][ T8573] device 1488 left promiscuous mode [ 3096.329361][ T8573] device 1489 left promiscuous mode [ 3096.399597][ T8573] device 1490 left promiscuous mode [ 3096.479164][ T8573] device 1491 left promiscuous mode [ 3096.529595][ T8573] device 1492 left promiscuous mode [ 3096.569581][ T8573] device 1493 left promiscuous mode [ 3096.639484][ T8573] device 1494 left promiscuous mode [ 3096.689361][ T8573] device 1495 left promiscuous mode [ 3096.759627][ T8573] device 1496 left promiscuous mode [ 3096.809582][ T8573] device 1497 left promiscuous mode [ 3096.899200][ T8573] device 1498 left promiscuous mode [ 3096.959398][ T8573] device 1499 left promiscuous mode [ 3097.009608][ T8573] device 1500 left promiscuous mode [ 3097.069410][ T8573] device 1501 left promiscuous mode [ 3097.169162][ T8573] device 1502 left promiscuous mode [ 3097.219594][ T8573] device 1503 left promiscuous mode [ 3097.259534][ T8573] device 1504 left promiscuous mode [ 3097.299585][ T8573] device 1505 left promiscuous mode [ 3097.369432][ T8573] device 1506 left promiscuous mode [ 3097.429309][ T8573] device 1507 left promiscuous mode [ 3097.489496][ T8573] device 1508 left promiscuous mode [ 3097.539511][ T8573] device 1509 left promiscuous mode [ 3097.579645][ T8573] device 1510 left promiscuous mode [ 3097.629249][ T8573] device 1511 left promiscuous mode [ 3097.709491][ T8573] device 1512 left promiscuous mode [ 3097.769441][ T8573] device 1513 left promiscuous mode [ 3097.859602][ T8573] device 1514 left promiscuous mode [ 3097.899631][ T8573] device 1515 left promiscuous mode [ 3097.969447][ T8573] device 1516 left promiscuous mode [ 3098.039540][ T8573] device 1517 left promiscuous mode [ 3098.099413][ T8573] device 1518 left promiscuous mode [ 3098.159413][ T8573] device 1519 left promiscuous mode [ 3098.209436][ T8573] device 1520 left promiscuous mode [ 3098.279405][ T8573] device 1521 left promiscuous mode [ 3098.339580][ T8573] device 1522 left promiscuous mode [ 3098.399378][ T8573] device 1523 left promiscuous mode [ 3098.459328][ T8573] device 1524 left promiscuous mode [ 3098.529544][ T8573] device 1525 left promiscuous mode [ 3098.569615][ T8573] device 1526 left promiscuous mode [ 3098.639621][ T8573] device 1527 left promiscuous mode [ 3098.719248][ T8573] device 1528 left promiscuous mode [ 3098.769578][ T8573] device 1529 left promiscuous mode [ 3098.809399][ T8573] device 1530 left promiscuous mode [ 3098.849361][ T8573] device 1531 left promiscuous mode [ 3098.899358][ T8573] device 1532 left promiscuous mode [ 3098.959547][ T8573] device 1533 left promiscuous mode [ 3098.999666][ T8573] device 1534 left promiscuous mode [ 3099.069383][ T8573] device 1535 left promiscuous mode [ 3099.129355][ T8573] device 1536 left promiscuous mode [ 3099.189365][ T8573] device 1537 left promiscuous mode [ 3099.239612][ T8573] device 1538 left promiscuous mode [ 3099.309400][ T8573] device 1539 left promiscuous mode [ 3099.359501][ T8573] device 1540 left promiscuous mode [ 3099.399392][ T8573] device 1541 left promiscuous mode [ 3099.469564][ T8573] device 1542 left promiscuous mode [ 3099.519464][ T8573] device 1543 left promiscuous mode [ 3099.569285][ T8573] device 1544 left promiscuous mode [ 3099.639443][ T8573] device 1545 left promiscuous mode [ 3099.679359][ T8573] device 1546 left promiscuous mode [ 3099.729608][ T8573] device 1547 left promiscuous mode [ 3099.789390][ T8573] device 1548 left promiscuous mode [ 3099.869454][ T8573] device 1549 left promiscuous mode [ 3099.939535][ T8573] device 1550 left promiscuous mode [ 3100.009412][ T8573] device 1551 left promiscuous mode [ 3100.059622][ T8573] device 1552 left promiscuous mode [ 3100.119638][ T8573] device 1553 left promiscuous mode [ 3100.159610][ T8573] device 1554 left promiscuous mode [ 3100.199418][ T8573] device 1555 left promiscuous mode [ 3100.269347][ T8573] device 1556 left promiscuous mode [ 3100.329375][ T8573] device 1557 left promiscuous mode [ 3100.389405][ T8573] device 1558 left promiscuous mode [ 3100.449348][ T8573] device 1559 left promiscuous mode [ 3100.519510][ T8573] device 1560 left promiscuous mode [ 3100.589482][ T8573] device 1561 left promiscuous mode [ 3100.639572][ T8573] device 1562 left promiscuous mode [ 3100.679716][ T8573] device 1563 left promiscuous mode [ 3100.739596][ T8573] device 1564 left promiscuous mode [ 3100.799211][ T8573] device 1565 left promiscuous mode [ 3100.859530][ T8573] device 1566 left promiscuous mode [ 3100.899498][ T8573] device 1567 left promiscuous mode [ 3100.949401][ T8573] device 1568 left promiscuous mode [ 3100.989349][ T8573] device 1569 left promiscuous mode [ 3101.049349][ T8573] device 1570 left promiscuous mode [ 3101.099658][ T8573] device 1571 left promiscuous mode [ 3101.179200][ T8573] device 1572 left promiscuous mode [ 3101.239516][ T8573] device 1573 left promiscuous mode [ 3101.299477][ T8573] device 1574 left promiscuous mode [ 3101.349548][ T8573] device 1575 left promiscuous mode [ 3101.399378][ T8573] device 1576 left promiscuous mode [ 3101.449640][ T8573] device 1577 left promiscuous mode [ 3101.510044][ T8573] device 1578 left promiscuous mode [ 3101.569165][ T8573] device 1579 left promiscuous mode [ 3101.629410][ T8573] device 1580 left promiscuous mode [ 3101.679586][ T8573] device 1581 left promiscuous mode [ 3101.729679][ T8573] device 1582 left promiscuous mode [ 3101.789419][ T8573] device 1583 left promiscuous mode [ 3101.849480][ T8573] device 1584 left promiscuous mode [ 3101.889379][ T8573] device 1585 left promiscuous mode [ 3101.959640][ T8573] device 1586 left promiscuous mode [ 3101.999613][ T8573] device 1587 left promiscuous mode [ 3102.039578][ T8573] device 1588 left promiscuous mode [ 3102.109337][ T8573] device 1589 left promiscuous mode [ 3102.179404][ T8573] device 1590 left promiscuous mode [ 3102.249373][ T8573] device 1591 left promiscuous mode [ 3102.309430][ T8573] device 1592 left promiscuous mode [ 3102.389418][ T8573] device 1593 left promiscuous mode [ 3102.439657][ T8573] device 1594 left promiscuous mode [ 3102.499543][ T8573] device 1595 left promiscuous mode [ 3102.579129][ T8573] device 1596 left promiscuous mode [ 3102.639417][ T8573] device 1597 left promiscuous mode [ 3102.689606][ T8573] device 1598 left promiscuous mode [ 3102.749650][ T8573] device 1599 left promiscuous mode [ 3102.809440][ T8573] device 1600 left promiscuous mode [ 3102.869407][ T8573] device 1601 left promiscuous mode [ 3102.919571][ T8573] device 1602 left promiscuous mode [ 3102.959584][ T8573] device 1603 left promiscuous mode [ 3103.029352][ T8573] device 1604 left promiscuous mode [ 3103.119420][ T8573] device 1605 left promiscuous mode [ 3103.159614][ T8573] device 1606 left promiscuous mode [ 3103.229461][ T8573] device 1607 left promiscuous mode [ 3103.289409][ T8573] device 1608 left promiscuous mode [ 3103.349523][ T8573] device 1609 left promiscuous mode [ 3103.409341][ T8573] device 1610 left promiscuous mode [ 3103.469342][ T8573] device 1611 left promiscuous mode [ 3103.529387][ T8573] device 1612 left promiscuous mode [ 3103.579662][ T8573] device 1613 left promiscuous mode [ 3103.649338][ T8573] device 1614 left promiscuous mode [ 3103.689318][ T8573] device 1615 left promiscuous mode [ 3103.739418][ T8573] device 1616 left promiscuous mode [ 3103.799670][ T8573] device 1617 left promiscuous mode [ 3103.879148][ T8573] device 1618 left promiscuous mode [ 3103.940006][ T8573] device 1619 left promiscuous mode [ 3103.999440][ T8573] device 1620 left promiscuous mode [ 3104.049736][ T8573] device 1621 left promiscuous mode [ 3104.089384][ T8573] device 1622 left promiscuous mode [ 3104.139354][ T8573] device 1623 left promiscuous mode [ 3104.199394][ T8573] device 1624 left promiscuous mode [ 3104.249551][ T8573] device 1625 left promiscuous mode [ 3104.329266][ T8573] device 1626 left promiscuous mode [ 3104.379394][ T8573] device 1627 left promiscuous mode [ 3104.449542][ T8573] device 1628 left promiscuous mode [ 3104.489549][ T8573] device 1629 left promiscuous mode [ 3104.529478][ T8573] device 1630 left promiscuous mode [ 3104.579350][ T8573] device 1631 left promiscuous mode [ 3104.629606][ T8573] device 1632 left promiscuous mode [ 3104.689354][ T8573] device 1633 left promiscuous mode [ 3104.749427][ T8573] device 1634 left promiscuous mode [ 3104.789386][ T8573] device 1635 left promiscuous mode [ 3104.849423][ T8573] device 1636 left promiscuous mode [ 3104.889580][ T8573] device 1637 left promiscuous mode [ 3104.959475][ T8573] device 1638 left promiscuous mode [ 3105.019316][ T8573] device 1639 left promiscuous mode [ 3105.099158][ T8573] device 1640 left promiscuous mode [ 3105.149613][ T8573] device 1641 left promiscuous mode [ 3105.219322][ T8573] device 1642 left promiscuous mode [ 3105.259699][ T8573] device 1643 left promiscuous mode [ 3105.319427][ T8573] device 1644 left promiscuous mode [ 3105.359437][ T8573] device 1645 left promiscuous mode [ 3105.399575][ T8573] device 1646 left promiscuous mode [ 3105.459566][ T8573] device 1647 left promiscuous mode [ 3105.499506][ T8573] device 1648 left promiscuous mode [ 3105.539502][ T8573] device 1649 left promiscuous mode [ 3105.599182][ T8573] device 1650 left promiscuous mode [ 3105.639566][ T8573] device 1651 left promiscuous mode [ 3105.709435][ T8573] device 1652 left promiscuous mode [ 3105.789287][ T8573] device 1653 left promiscuous mode [ 3105.839815][ T8573] device 1654 left promiscuous mode [ 3105.899422][ T8573] device 1655 left promiscuous mode [ 3105.939521][ T8573] device 1656 left promiscuous mode [ 3105.979492][ T8573] device 1657 left promiscuous mode [ 3106.059235][ T8573] device 1658 left promiscuous mode [ 3106.119607][ T8573] device 1659 left promiscuous mode [ 3106.199352][ T8573] device 1660 left promiscuous mode [ 3106.239392][ T8573] device 1661 left promiscuous mode [ 3106.299397][ T8573] device 1662 left promiscuous mode [ 3106.369560][ T8573] device 1663 left promiscuous mode [ 3106.409364][ T8573] device 1664 left promiscuous mode [ 3106.459592][ T8573] device 1665 left promiscuous mode [ 3106.529374][ T8573] device 1666 left promiscuous mode [ 3106.579554][ T8573] device 1667 left promiscuous mode [ 3106.619555][ T8573] device 1668 left promiscuous mode [ 3106.689437][ T8573] device 1669 left promiscuous mode [ 3106.759557][ T8573] device 1670 left promiscuous mode [ 3106.809174][ T8573] device 1671 left promiscuous mode [ 3106.869931][ T8573] device 1672 left promiscuous mode [ 3106.919570][ T8573] device 1673 left promiscuous mode [ 3106.989359][ T8573] device 1674 left promiscuous mode [ 3107.039525][ T8573] device 1675 left promiscuous mode [ 3107.079530][ T8573] device 1676 left promiscuous mode [ 3107.119461][ T8573] device 1677 left promiscuous mode [ 3107.159646][ T8573] device 1678 left promiscuous mode [ 3107.229434][ T8573] device 1679 left promiscuous mode [ 3107.269344][ T8573] device 1680 left promiscuous mode [ 3107.319663][ T8573] device 1681 left promiscuous mode [ 3107.379603][ T8573] device 1682 left promiscuous mode [ 3107.439557][ T8573] device 1683 left promiscuous mode [ 3107.499201][ T8573] device 1684 left promiscuous mode [ 3107.579165][ T8573] device 1685 left promiscuous mode [ 3107.639394][ T8573] device 1686 left promiscuous mode [ 3107.699157][ T8573] device 1687 left promiscuous mode [ 3107.749641][ T8573] device 1688 left promiscuous mode [ 3107.809321][ T8573] device 1689 left promiscuous mode [ 3107.899315][ T8573] device 1690 left promiscuous mode [ 3107.969704][ T8573] device 1691 left promiscuous mode [ 3108.019523][ T8573] device 1692 left promiscuous mode [ 3108.069094][ T8573] device 1693 left promiscuous mode [ 3108.129331][ T8573] device 1694 left promiscuous mode [ 3108.189340][ T8573] device 1695 left promiscuous mode [ 3108.239509][ T8573] device 1696 left promiscuous mode [ 3108.289365][ T8573] device 1697 left promiscuous mode [ 3108.359546][ T8573] device 1698 left promiscuous mode [ 3108.419323][ T8573] device 1699 left promiscuous mode [ 3108.459483][ T8573] device 1700 left promiscuous mode [ 3108.509114][ T8573] device 1701 left promiscuous mode [ 3108.559495][ T8573] device 1702 left promiscuous mode [ 3108.619622][ T8573] device 1703 left promiscuous mode [ 3108.659553][ T8573] device 1704 left promiscuous mode [ 3108.709548][ T8573] device 1705 left promiscuous mode [ 3108.769633][ T8573] device 1706 left promiscuous mode [ 3108.829654][ T8573] device 1707 left promiscuous mode [ 3108.889458][ T8573] device 1708 left promiscuous mode [ 3108.979234][ T8573] device 1709 left promiscuous mode [ 3109.049472][ T8573] device 1710 left promiscuous mode [ 3109.109372][ T8573] device 1711 left promiscuous mode [ 3109.189562][ T8573] device 1712 left promiscuous mode [ 3109.239552][ T8573] device 1713 left promiscuous mode [ 3109.279624][ T8573] device 1714 left promiscuous mode [ 3109.339581][ T8573] device 1715 left promiscuous mode [ 3109.379649][ T8573] device 1716 left promiscuous mode [ 3109.419402][ T8573] device 1717 left promiscuous mode [ 3109.479431][ T8573] device 1718 left promiscuous mode [ 3109.549639][ T8573] device 1719 left promiscuous mode [ 3109.619401][ T8573] device 1720 left promiscuous mode [ 3109.679539][ T8573] device 1721 left promiscuous mode [ 3109.749153][ T8573] device 1722 left promiscuous mode [ 3109.800447][ T8573] device 1723 left promiscuous mode [ 3109.879184][ T8573] device 1724 left promiscuous mode [ 3109.939358][ T8573] device 1725 left promiscuous mode [ 3109.989652][ T8573] device 1726 left promiscuous mode [ 3110.029604][ T8573] device 1727 left promiscuous mode [ 3110.089371][ T8573] device 1728 left promiscuous mode [ 3110.149531][ T8573] device 1729 left promiscuous mode [ 3110.199526][ T8573] device 1730 left promiscuous mode [ 3110.239523][ T8573] device 1731 left promiscuous mode [ 3110.309393][ T8573] device 1732 left promiscuous mode [ 3110.359561][ T8573] device 1733 left promiscuous mode [ 3110.429349][ T8573] device 1734 left promiscuous mode [ 3110.479485][ T8573] device 1735 left promiscuous mode [ 3110.529523][ T8573] device 1736 left promiscuous mode [ 3110.609327][ T8573] device 1737 left promiscuous mode [ 3110.679392][ T8573] device 1738 left promiscuous mode [ 3110.749505][ T8573] device 1739 left promiscuous mode [ 3110.799596][ T8573] device 1740 left promiscuous mode [ 3110.849471][ T8573] device 1741 left promiscuous mode [ 3110.889474][ T8573] device 1742 left promiscuous mode [ 3110.939737][ T8573] device 1743 left promiscuous mode [ 3110.989582][ T8573] device 1744 left promiscuous mode [ 3111.029566][ T8573] device 1745 left promiscuous mode [ 3111.089593][ T8573] device 1746 left promiscuous mode [ 3111.129564][ T8573] device 1747 left promiscuous mode [ 3111.199490][ T8573] device 1748 left promiscuous mode [ 3111.249604][ T8573] device 1749 left promiscuous mode [ 3111.299167][ T8573] device 1750 left promiscuous mode [ 3111.359131][ T8573] device 1751 left promiscuous mode [ 3111.409608][ T8573] device 1752 left promiscuous mode [ 3111.449599][ T8573] device 1753 left promiscuous mode [ 3111.519739][ T8573] device 1754 left promiscuous mode [ 3111.599222][ T8573] device 1755 left promiscuous mode [ 3111.669584][ T8573] device 1756 left promiscuous mode [ 3111.709577][ T8573] device 1757 left promiscuous mode [ 3111.779475][ T8573] device 1758 left promiscuous mode [ 3111.829695][ T8573] device 1759 left promiscuous mode [ 3111.909168][ T8573] device 1760 left promiscuous mode [ 3111.969486][ T8573] device 1761 left promiscuous mode [ 3112.019586][ T8573] device 1762 left promiscuous mode [ 3112.069442][ T8573] device 1763 left promiscuous mode [ 3112.149207][ T8573] device 1764 left promiscuous mode [ 3112.239178][ T8573] device 1765 left promiscuous mode [ 3112.299429][ T8573] device 1766 left promiscuous mode [ 3112.369279][ T8573] device 1767 left promiscuous mode [ 3112.429586][ T8573] device 1768 left promiscuous mode [ 3112.469625][ T8573] device 1769 left promiscuous mode [ 3112.529429][ T8573] device 1770 left promiscuous mode [ 3112.599730][ T8573] device 1771 left promiscuous mode [ 3112.649177][ T8573] device 1772 left promiscuous mode [ 3112.700108][ T8573] device 1773 left promiscuous mode [ 3112.749241][ T8573] device 1774 left promiscuous mode [ 3112.789599][ T8573] device 1775 left promiscuous mode [ 3112.849245][ T8573] device 1776 left promiscuous mode [ 3112.909354][ T8573] device 1777 left promiscuous mode [ 3112.989144][ T8573] device 1778 left promiscuous mode [ 3113.049414][ T8573] device 1779 left promiscuous mode [ 3113.099636][ T8573] device 1780 left promiscuous mode [ 3113.199172][ T8573] device 1781 left promiscuous mode [ 3113.259572][ T8573] device 1782 left promiscuous mode [ 3113.319712][ T8573] device 1783 left promiscuous mode [ 3113.369596][ T8573] device 1784 left promiscuous mode [ 3113.419694][ T8573] device 1785 left promiscuous mode [ 3113.469424][ T8573] device 1786 left promiscuous mode [ 3113.509508][ T8573] device 1787 left promiscuous mode [ 3113.559664][ T8573] device 1788 left promiscuous mode [ 3113.599599][ T8573] device 1789 left promiscuous mode [ 3113.659473][ T8573] device 1790 left promiscuous mode [ 3113.749342][ T8573] device 1791 left promiscuous mode [ 3113.809338][ T8573] device 1792 left promiscuous mode [ 3113.879409][ T8573] device 1793 left promiscuous mode [ 3113.939473][ T8573] device 1794 left promiscuous mode [ 3114.009389][ T8573] device 1795 left promiscuous mode [ 3114.049640][ T8573] device 1796 left promiscuous mode [ 3114.109279][ T8573] device 1797 left promiscuous mode [ 3114.169442][ T8573] device 1798 left promiscuous mode [ 3114.219444][ T8573] device 1799 left promiscuous mode [ 3114.279282][ T8573] device 1800 left promiscuous mode [ 3114.349400][ T8573] device 1801 left promiscuous mode [ 3114.419559][ T8573] device 1802 left promiscuous mode [ 3114.459566][ T8573] device 1803 left promiscuous mode [ 3114.499756][ T8573] device 1804 left promiscuous mode [ 3114.569458][ T8573] device 1805 left promiscuous mode [ 3114.619623][ T8573] device 1806 left promiscuous mode [ 3114.659758][ T8573] device 1807 left promiscuous mode [ 3114.729521][ T8573] device 1808 left promiscuous mode [ 3114.779331][ T8573] device 1809 left promiscuous mode [ 3114.819455][ T8573] device 1810 left promiscuous mode [ 3114.909370][ T8573] device 1811 left promiscuous mode [ 3114.979353][ T8573] device 1812 left promiscuous mode [ 3115.059136][ T8573] device 1813 left promiscuous mode [ 3115.119367][ T8573] device 1814 left promiscuous mode [ 3115.179381][ T8573] device 1815 left promiscuous mode [ 3115.239597][ T8573] device 1816 left promiscuous mode [ 3115.289672][ T8573] device 1817 left promiscuous mode [ 3115.329698][ T8573] device 1818 left promiscuous mode [ 3115.369684][ T8573] device 1819 left promiscuous mode [ 3115.429222][ T8573] device 1820 left promiscuous mode [ 3115.489999][ T8573] device 1821 left promiscuous mode [ 3115.539627][ T8573] device 1822 left promiscuous mode [ 3115.609626][ T8573] device 1823 left promiscuous mode [ 3115.669297][ T8573] device 1824 left promiscuous mode [ 3115.719663][ T8573] device 1825 left promiscuous mode [ 3115.800019][ T8573] device 1826 left promiscuous mode [ 3115.849507][ T8573] device 1827 left promiscuous mode [ 3115.889600][ T8573] device 1828 left promiscuous mode [ 3115.949459][ T8573] device 1829 left promiscuous mode [ 3116.019554][ T8573] device 1830 left promiscuous mode [ 3116.059703][ T8573] device 1831 left promiscuous mode [ 3116.119701][ T8573] device 1832 left promiscuous mode [ 3116.179424][ T8573] device 1833 left promiscuous mode [ 3116.249572][ T8573] device 1834 left promiscuous mode [ 3116.299217][ T8573] device 1835 left promiscuous mode [ 3116.369353][ T8573] device 1836 left promiscuous mode [ 3116.419137][ T8573] device 1837 left promiscuous mode [ 3116.469622][ T8573] device 1838 left promiscuous mode [ 3116.549486][ T8573] device 1839 left promiscuous mode [ 3116.609409][ T8573] device 1840 left promiscuous mode [ 3116.679434][ T8573] device 1841 left promiscuous mode [ 3116.749369][ T8573] device 1842 left promiscuous mode [ 3116.819637][ T8573] device 1843 left promiscuous mode [ 3116.879237][ T8573] device 1844 left promiscuous mode [ 3116.939893][ T8573] device 1845 left promiscuous mode [ 3117.009255][ T8573] device 1846 left promiscuous mode [ 3117.079439][ T8573] device 1847 left promiscuous mode [ 3117.179198][ T8573] device 1848 left promiscuous mode [ 3117.239155][ T8573] device 1849 left promiscuous mode [ 3117.309393][ T8573] device 1850 left promiscuous mode [ 3117.379600][ T8573] device 1851 left promiscuous mode [ 3117.419395][ T8573] device 1852 left promiscuous mode [ 3117.479388][ T8573] device 1853 left promiscuous mode [ 3117.549652][ T8573] device 1854 left promiscuous mode [ 3117.609441][ T8573] device 1855 left promiscuous mode [ 3117.659652][ T8573] device 1856 left promiscuous mode [ 3117.699856][ T8573] device 1857 left promiscuous mode [ 3117.759608][ T8573] device 1858 left promiscuous mode [ 3117.809528][ T8573] device 1859 left promiscuous mode [ 3117.879277][ T8573] device 1860 left promiscuous mode [ 3117.939356][ T8573] device 1861 left promiscuous mode [ 3117.979624][ T8573] device 1862 left promiscuous mode [ 3118.039503][ T8573] device 1863 left promiscuous mode [ 3118.109254][ T8573] device 1864 left promiscuous mode [ 3118.149637][ T8573] device 1865 left promiscuous mode [ 3118.209546][ T8573] device 1866 left promiscuous mode [ 3118.259671][ T8573] device 1867 left promiscuous mode [ 3118.329449][ T8573] device 1868 left promiscuous mode [ 3118.389325][ T8573] device 1869 left promiscuous mode [ 3118.439633][ T8573] device 1870 left promiscuous mode [ 3118.509708][ T8573] device 1871 left promiscuous mode [ 3118.559565][ T8573] device 1872 left promiscuous mode [ 3118.619398][ T8573] device 1873 left promiscuous mode [ 3118.689416][ T8573] device 1874 left promiscuous mode [ 3118.759454][ T8573] device 1875 left promiscuous mode [ 3118.829437][ T8573] device 1876 left promiscuous mode [ 3118.889605][ T8573] device 1877 left promiscuous mode [ 3118.959289][ T8573] device 1878 left promiscuous mode [ 3119.009596][ T8573] device 1879 left promiscuous mode [ 3119.069254][ T8573] device 1880 left promiscuous mode [ 3119.129744][ T8573] device 1881 left promiscuous mode [ 3119.209153][ T8573] device 1882 left promiscuous mode [ 3119.259612][ T8573] device 1883 left promiscuous mode [ 3119.299610][ T8573] device 1884 left promiscuous mode [ 3119.339588][ T8573] device 1885 left promiscuous mode [ 3119.409435][ T8573] device 1886 left promiscuous mode [ 3119.479214][ T8573] device 1887 left promiscuous mode [ 3119.549373][ T8573] device 1888 left promiscuous mode [ 3119.619325][ T8573] device 1889 left promiscuous mode [ 3119.659383][ T8573] device 1890 left promiscuous mode [ 3119.719494][ T8573] device 1891 left promiscuous mode [ 3119.789227][ T8573] device 1892 left promiscuous mode [ 3119.829549][ T8573] device 1893 left promiscuous mode [ 3119.869621][ T8573] device 1894 left promiscuous mode [ 3119.909619][ T8573] device 1895 left promiscuous mode [ 3119.949657][ T8573] device 1896 left promiscuous mode [ 3120.009380][ T8573] device 1897 left promiscuous mode [ 3120.069632][ T8573] device 1898 left promiscuous mode [ 3120.109702][ T8573] device 1899 left promiscuous mode [ 3120.159616][ T8573] device 1900 left promiscuous mode [ 3120.219371][ T8573] device 1901 left promiscuous mode [ 3120.259713][ T8573] device 1902 left promiscuous mode [ 3120.309647][ T8573] device 1903 left promiscuous mode [ 3120.349633][ T8573] device 1904 left promiscuous mode [ 3120.409395][ T8573] device 1905 left promiscuous mode [ 3120.459423][ T8573] device 1906 left promiscuous mode [ 3120.539391][ T8573] device 1907 left promiscuous mode [ 3120.609622][ T8573] device 1908 left promiscuous mode [ 3120.689176][ T8573] device 1909 left promiscuous mode [ 3120.769287][ T8573] device 1910 left promiscuous mode [ 3120.839743][ T8573] device 1911 left promiscuous mode [ 3120.899225][ T8573] device 1912 left promiscuous mode [ 3120.969585][ T8573] device 1913 left promiscuous mode [ 3121.029348][ T8573] device 1914 left promiscuous mode [ 3121.129207][ T8573] device 1915 left promiscuous mode [ 3121.179678][ T8573] device 1916 left promiscuous mode [ 3121.239612][ T8573] device 1917 left promiscuous mode [ 3121.299384][ T8573] device 1918 left promiscuous mode [ 3121.369645][ T8573] device 1919 left promiscuous mode [ 3121.409674][ T8573] device 1920 left promiscuous mode [ 3121.479653][ T8573] device 1921 left promiscuous mode [ 3121.519600][ T8573] device 1922 left promiscuous mode [ 3121.589284][ T8573] device 1923 left promiscuous mode [ 3121.659369][ T8573] device 1924 left promiscuous mode [ 3121.719646][ T8573] device 1925 left promiscuous mode [ 3121.789318][ T8573] device 1926 left promiscuous mode [ 3121.849640][ T8573] device 1927 left promiscuous mode [ 3121.889661][ T8573] device 1928 left promiscuous mode [ 3121.929603][ T8573] device 1929 left promiscuous mode [ 3121.989758][ T8573] device 1930 left promiscuous mode [ 3122.069184][ T8573] device 1931 left promiscuous mode [ 3122.119732][ T8573] device 1932 left promiscuous mode [ 3122.169207][ T8573] device 1933 left promiscuous mode [ 3122.219556][ T8573] device 1934 left promiscuous mode [ 3122.279372][ T8573] device 1935 left promiscuous mode [ 3122.339374][ T8573] device 1936 left promiscuous mode [ 3122.399382][ T8573] device 1937 left promiscuous mode [ 3122.469546][ T8573] device 1938 left promiscuous mode [ 3122.529644][ T8573] device 1939 left promiscuous mode [ 3122.579644][ T8573] device 1940 left promiscuous mode [ 3122.629410][ T8573] device 1941 left promiscuous mode [ 3122.689593][ T8573] device 1942 left promiscuous mode [ 3122.739475][ T8573] device 1943 left promiscuous mode [ 3122.789596][ T8573] device 1944 left promiscuous mode [ 3122.829576][ T8573] device 1945 left promiscuous mode [ 3122.889388][ T8573] device 1946 left promiscuous mode [ 3122.959433][ T8573] device 1947 left promiscuous mode [ 3123.009530][ T8573] device 1948 left promiscuous mode [ 3123.059356][ T8573] device 1949 left promiscuous mode [ 3123.109530][ T8573] device 1950 left promiscuous mode [ 3123.179539][ T8573] device 1951 left promiscuous mode [ 3123.239404][ T8573] device 1952 left promiscuous mode [ 3123.289557][ T8573] device 1953 left promiscuous mode [ 3123.329679][ T8573] device 1954 left promiscuous mode [ 3123.369399][ T8573] device 1955 left promiscuous mode [ 3123.429422][ T8573] device 1956 left promiscuous mode [ 3123.489428][ T8573] device 1957 left promiscuous mode [ 3123.549414][ T8573] device 1958 left promiscuous mode [ 3123.599414][ T8573] device 1959 left promiscuous mode [ 3123.679173][ T8573] device 1960 left promiscuous mode [ 3123.739403][ T8573] device 1961 left promiscuous mode [ 3123.790555][ T8573] device 1962 left promiscuous mode [ 3123.869203][ T8573] device 1963 left promiscuous mode [ 3123.909495][ T8573] device 1964 left promiscuous mode [ 3123.979565][ T8573] device 1965 left promiscuous mode [ 3124.019698][ T8573] device 1966 left promiscuous mode [ 3124.079388][ T8573] device 1967 left promiscuous mode [ 3124.149521][ T8573] device 1968 left promiscuous mode [ 3124.199557][ T8573] device 1969 left promiscuous mode [ 3124.239584][ T8573] device 1970 left promiscuous mode [ 3124.309349][ T8573] device 1971 left promiscuous mode [ 3124.359355][ T8573] device 1972 left promiscuous mode [ 3124.419391][ T8573] device 1973 left promiscuous mode [ 3124.489592][ T8573] device 1974 left promiscuous mode [ 3124.529656][ T8573] device 1975 left promiscuous mode [ 3124.590218][ T8573] device 1976 left promiscuous mode [ 3124.649697][ T8573] device 1977 left promiscuous mode [ 3124.739361][ T8573] device 1978 left promiscuous mode [ 3124.809474][ T8573] device 1979 left promiscuous mode [ 3124.869393][ T8573] device 1980 left promiscuous mode [ 3124.919583][ T8573] device 1981 left promiscuous mode [ 3124.999167][ T8573] device 1982 left promiscuous mode [ 3125.059398][ T8573] device 1983 left promiscuous mode [ 3125.119424][ T8573] device 1984 left promiscuous mode [ 3125.179445][ T8573] device 1985 left promiscuous mode [ 3125.229592][ T8573] device 1986 left promiscuous mode [ 3125.309195][ T8573] device 1987 left promiscuous mode [ 3125.379563][ T8573] device 1988 left promiscuous mode [ 3125.439644][ T8573] device 1989 left promiscuous mode [ 3125.479640][ T8573] device 1990 left promiscuous mode [ 3125.519650][ T8573] device 1991 left promiscuous mode [ 3125.559585][ T8573] device 1992 left promiscuous mode [ 3125.599694][ T8573] device 1993 left promiscuous mode [ 3125.640546][ T8573] device 1994 left promiscuous mode [ 3125.699245][ T8573] device 1995 left promiscuous mode [ 3125.759654][ T8573] device 1996 left promiscuous mode [ 3125.819386][ T8573] device 1997 left promiscuous mode [ 3125.869594][ T8573] device 1998 left promiscuous mode [ 3125.939209][ T8573] device 1999 left promiscuous mode [ 3125.989577][ T8573] device 2000 left promiscuous mode [ 3126.059443][ T8573] device 2001 left promiscuous mode [ 3126.109673][ T8573] device 2002 left promiscuous mode [ 3126.149532][ T8573] device 2003 left promiscuous mode [ 3126.189535][ T8573] device 2004 left promiscuous mode [ 3126.239301][ T8573] device 2005 left promiscuous mode [ 3126.289610][ T8573] device 2006 left promiscuous mode [ 3126.359474][ T8573] device 2007 left promiscuous mode [ 3126.409677][ T8573] device 2008 left promiscuous mode [ 3126.449596][ T8573] device 2009 left promiscuous mode [ 3126.489590][ T8573] device 2010 left promiscuous mode [ 3126.549554][ T8573] device 2011 left promiscuous mode [ 3126.619345][ T8573] device 2012 left promiscuous mode [ 3126.679446][ T8573] device 2013 left promiscuous mode [ 3126.729742][ T8573] device 2014 left promiscuous mode [ 3126.769636][ T8573] device 2015 left promiscuous mode [ 3126.829329][ T8573] device 2016 left promiscuous mode [ 3126.899406][ T8573] device 2017 left promiscuous mode [ 3126.959348][ T8573] device 2018 left promiscuous mode [ 3127.029536][ T8573] device 2019 left promiscuous mode [ 3127.079523][ T8573] device 2020 left promiscuous mode [ 3127.139544][ T8573] device 2021 left promiscuous mode [ 3127.179624][ T8573] device 2022 left promiscuous mode [ 3127.249368][ T8573] device 2023 left promiscuous mode [ 3127.299416][ T8573] device 2024 left promiscuous mode [ 3127.339505][ T8573] device 2025 left promiscuous mode [ 3127.389555][ T8573] device 2026 left promiscuous mode [ 3127.439177][ T8573] device 2027 left promiscuous mode [ 3127.489599][ T8573] device 2028 left promiscuous mode [ 3127.529536][ T8573] device 2029 left promiscuous mode [ 3127.589518][ T8573] device 2030 left promiscuous mode [ 3127.629572][ T8573] device 2031 left promiscuous mode [ 3127.689177][ T8573] device 2032 left promiscuous mode [ 3127.749233][ T8573] device 2033 left promiscuous mode [ 3127.829561][ T8573] device 2034 left promiscuous mode [ 3127.889329][ T8573] device 2035 left promiscuous mode [ 3127.949321][ T8573] device 2036 left promiscuous mode [ 3127.999587][ T8573] device 2037 left promiscuous mode [ 3128.049486][ T8573] device 2038 left promiscuous mode [ 3128.119357][ T8573] device 2039 left promiscuous mode [ 3128.189576][ T8573] device 2040 left promiscuous mode [ 3128.249661][ T8573] device 2041 left promiscuous mode [ 3128.309345][ T8573] device 2042 left promiscuous mode [ 3128.369483][ T8573] device 2043 left promiscuous mode [ 3128.429362][ T8573] device 2044 left promiscuous mode [ 3128.499419][ T8573] device 2045 left promiscuous mode [ 3128.550064][ T8573] device 2046 left promiscuous mode [ 3128.599142][ T8573] device 2047 left promiscuous mode [ 3128.639382][ T8573] device 2048 left promiscuous mode [ 3128.689543][ T8573] device 2049 left promiscuous mode [ 3128.729677][ T8573] device 2050 left promiscuous mode [ 3128.809306][ T8573] device 2051 left promiscuous mode [ 3128.869374][ T8573] device 2052 left promiscuous mode [ 3128.919469][ T8573] device 2053 left promiscuous mode [ 3128.969557][ T8573] device 2054 left promiscuous mode [ 3129.009457][ T8573] device 2055 left promiscuous mode [ 3129.049350][ T8573] device 2056 left promiscuous mode [ 3129.109315][ T8573] device 2057 left promiscuous mode [ 3129.179542][ T8573] device 2058 left promiscuous mode [ 3129.229423][ T8573] device 2059 left promiscuous mode [ 3129.279661][ T8573] device 2060 left promiscuous mode [ 3129.349364][ T8573] device 2061 left promiscuous mode [ 3129.409362][ T8573] device 2062 left promiscuous mode [ 3129.479566][ T8573] device 2063 left promiscuous mode [ 3129.519559][ T8573] device 2064 left promiscuous mode [ 3129.589424][ T8573] device 2065 left promiscuous mode [ 3129.629501][ T8573] device 2066 left promiscuous mode [ 3129.699348][ T8573] device 2067 left promiscuous mode [ 3129.749645][ T8573] device 2068 left promiscuous mode [ 3129.809586][ T8573] device 2069 left promiscuous mode [ 3129.859518][ T8573] device 2070 left promiscuous mode [ 3129.929443][ T8573] device 2071 left promiscuous mode [ 3130.019298][ T8573] device 2072 left promiscuous mode [ 3130.099548][ T8573] device 2073 left promiscuous mode [ 3130.140605][ T8573] device 2074 left promiscuous mode [ 3130.219147][ T8573] device 2075 left promiscuous mode [ 3130.270502][ T8573] device 2076 left promiscuous mode [ 3130.319277][ T8573] device 2077 left promiscuous mode [ 3130.379522][ T8573] device 2078 left promiscuous mode [ 3130.429506][ T8573] device 2079 left promiscuous mode [ 3130.469637][ T8573] device 2080 left promiscuous mode [ 3130.539408][ T8573] device 2081 left promiscuous mode [ 3130.589594][ T8573] device 2082 left promiscuous mode [ 3130.629546][ T8573] device 2083 left promiscuous mode [ 3130.669513][ T8573] device 2084 left promiscuous mode [ 3130.709555][ T8573] device 2085 left promiscuous mode [ 3130.749724][ T8573] device 2086 left promiscuous mode [ 3130.809358][ T8573] device 2087 left promiscuous mode [ 3130.869591][ T8573] device 2088 left promiscuous mode [ 3130.909587][ T8573] device 2089 left promiscuous mode [ 3130.989595][ T8573] device 2090 left promiscuous mode [ 3131.029664][ T8573] device 2091 left promiscuous mode [ 3131.089596][ T8573] device 2092 left promiscuous mode [ 3131.149410][ T8573] device 2093 left promiscuous mode [ 3131.209415][ T8573] device 2094 left promiscuous mode [ 3131.269514][ T8573] device 2095 left promiscuous mode [ 3131.349136][ T8573] device 2096 left promiscuous mode [ 3131.399551][ T8573] device 2097 left promiscuous mode [ 3131.439507][ T8573] device 2098 left promiscuous mode [ 3131.489666][ T8573] device 2099 left promiscuous mode [ 3131.529631][ T8573] device 2100 left promiscuous mode [ 3131.569606][ T8573] device 2101 left promiscuous mode [ 3131.609744][ T8573] device 2102 left promiscuous mode [ 3131.659260][ T8573] device 2103 left promiscuous mode [ 3131.709603][ T8573] device 2104 left promiscuous mode [ 3131.769180][ T8573] device 2105 left promiscuous mode [ 3131.810158][ T8573] device 2106 left promiscuous mode [ 3131.889108][ T8573] device 2107 left promiscuous mode [ 3131.949369][ T8573] device 2108 left promiscuous mode [ 3132.009302][ T8573] device 2109 left promiscuous mode [ 3132.059464][ T8573] device 2110 left promiscuous mode [ 3132.139164][ T8573] device 2111 left promiscuous mode [ 3132.189507][ T8573] device 2112 left promiscuous mode [ 3132.229590][ T8573] device 2113 left promiscuous mode [ 3132.270497][ T8573] device 2114 left promiscuous mode [ 3132.339208][ T8573] device 2115 left promiscuous mode [ 3132.409460][ T8573] device 2116 left promiscuous mode [ 3132.459489][ T8573] device 2117 left promiscuous mode [ 3132.529435][ T8573] device 2118 left promiscuous mode [ 3132.579590][ T8573] device 2119 left promiscuous mode [ 3132.649530][ T8573] device 2120 left promiscuous mode [ 3132.709341][ T8573] device 2121 left promiscuous mode [ 3132.759629][ T8573] device 2122 left promiscuous mode [ 3132.829310][ T8573] device 2123 left promiscuous mode [ 3132.879694][ T8573] device 2124 left promiscuous mode [ 3132.969306][ T8573] device 2125 left promiscuous mode [ 3133.009389][ T8573] device 2126 left promiscuous mode [ 3133.069299][ T8573] device 2127 left promiscuous mode [ 3133.119748][ T8573] device 2128 left promiscuous mode [ 3133.179532][ T8573] device 2129 left promiscuous mode [ 3133.239224][ T8573] device 2130 left promiscuous mode [ 3133.319105][ T8573] device 2131 left promiscuous mode [ 3133.379374][ T8573] device 2132 left promiscuous mode [ 3133.429596][ T8573] device 2133 left promiscuous mode [ 3133.490096][ T8573] device 2134 left promiscuous mode [ 3133.539152][ T8573] device 2135 left promiscuous mode [ 3133.579411][ T8573] device 2136 left promiscuous mode [ 3133.639397][ T8573] device 2137 left promiscuous mode [ 3133.689593][ T8573] device 2138 left promiscuous mode [ 3133.729591][ T8573] device 2139 left promiscuous mode [ 3133.769554][ T8573] device 2140 left promiscuous mode [ 3133.839348][ T8573] device 2141 left promiscuous mode [ 3133.899410][ T8573] device 2142 left promiscuous mode [ 3133.949560][ T8573] device 2143 left promiscuous mode [ 3133.989529][ T8573] device 2144 left promiscuous mode [ 3134.069586][ T8573] device 2145 left promiscuous mode [ 3134.109621][ T8573] device 2146 left promiscuous mode [ 3134.179382][ T8573] device 2147 left promiscuous mode [ 3134.239346][ T8573] device 2148 left promiscuous mode [ 3134.289749][ T8573] device 2149 left promiscuous mode [ 3134.369089][ T8573] device 2150 left promiscuous mode [ 3134.429388][ T8573] device 2151 left promiscuous mode [ 3134.499588][ T8573] device 2152 left promiscuous mode [ 3134.539524][ T8573] device 2153 left promiscuous mode [ 3134.579519][ T8573] device 2154 left promiscuous mode [ 3134.621425][ T8573] device 2155 left promiscuous mode [ 3134.679372][ T8573] device 2156 left promiscuous mode [ 3134.739537][ T8573] device 2157 left promiscuous mode [ 3134.779466][ T8573] device 2158 left promiscuous mode [ 3134.819470][ T8573] device 2159 left promiscuous mode [ 3134.879155][ T8573] device 2160 left promiscuous mode [ 3134.929605][ T8573] device 2161 left promiscuous mode [ 3134.969637][ T8573] device 2162 left promiscuous mode [ 3135.029607][ T8573] device 2163 left promiscuous mode [ 3135.070504][ T8573] device 2164 left promiscuous mode [ 3135.129433][ T8573] device 2165 left promiscuous mode [ 3135.199337][ T8573] device 2166 left promiscuous mode [ 3135.249585][ T8573] device 2167 left promiscuous mode [ 3135.329104][ T8573] device 2168 left promiscuous mode [ 3135.389333][ T8573] device 2169 left promiscuous mode [ 3135.459749][ T8573] device 2170 left promiscuous mode [ 3135.509143][ T8573] device 2171 left promiscuous mode [ 3135.579574][ T8573] device 2172 left promiscuous mode [ 3135.619662][ T8573] device 2173 left promiscuous mode [ 3135.659391][ T8573] device 2174 left promiscuous mode [ 3135.729617][ T8573] device 2175 left promiscuous mode [ 3135.789477][ T8573] device 2176 left promiscuous mode [ 3135.859314][ T8573] device 2177 left promiscuous mode [ 3135.929394][ T8573] device 2178 left promiscuous mode [ 3135.989240][ T8573] device 2179 left promiscuous mode [ 3136.049556][ T8573] device 2180 left promiscuous mode [ 3136.099564][ T8573] device 2181 left promiscuous mode [ 3136.169266][ T8573] device 2182 left promiscuous mode [ 3136.209468][ T8573] device 2183 left promiscuous mode [ 3136.279756][ T8573] device 2184 left promiscuous mode [ 3136.329495][ T8573] device 2185 left promiscuous mode [ 3136.379404][ T8573] device 2186 left promiscuous mode [ 3136.429545][ T8573] device 2187 left promiscuous mode [ 3136.469584][ T8573] device 2188 left promiscuous mode [ 3136.539356][ T8573] device 2189 left promiscuous mode [ 3136.590255][ T8573] device 2190 left promiscuous mode [ 3136.629610][ T8573] device 2191 left promiscuous mode [ 3136.669597][ T8573] device 2192 left promiscuous mode [ 3136.709697][ T8573] device 2193 left promiscuous mode [ 3136.769171][ T8573] device 2194 left promiscuous mode [ 3136.809653][ T8573] device 2195 left promiscuous mode [ 3136.849568][ T8573] device 2196 left promiscuous mode [ 3136.889564][ T8573] device 2197 left promiscuous mode [ 3136.929572][ T8573] device 2198 left promiscuous mode [ 3136.979385][ T8573] device 2199 left promiscuous mode [ 3137.019366][ T8573] device 2200 left promiscuous mode [ 3137.079335][ T8573] device 2201 left promiscuous mode [ 3137.139289][ T8573] device 2202 left promiscuous mode [ 3137.209455][ T8573] device 2203 left promiscuous mode [ 3137.280193][ T8573] device 2204 left promiscuous mode [ 3137.329095][ T8573] device 2205 left promiscuous mode [ 3137.399560][ T8573] device 2206 left promiscuous mode [ 3137.469234][ T8573] device 2207 left promiscuous mode [ 3137.539514][ T8573] device 2208 left promiscuous mode [ 3137.599282][ T8573] device 2209 left promiscuous mode [ 3137.659105][ T8573] device 2210 left promiscuous mode [ 3137.729575][ T8573] device 2211 left promiscuous mode [ 3137.769614][ T8573] device 2212 left promiscuous mode [ 3137.810350][ T8573] device 2213 left promiscuous mode [ 3137.859387][ T8573] device 2214 left promiscuous mode [ 3137.909506][ T8573] device 2215 left promiscuous mode [ 3137.959184][ T8573] device 2216 left promiscuous mode [ 3138.019364][ T8573] device 2217 left promiscuous mode [ 3138.069548][ T8573] device 2218 left promiscuous mode [ 3138.110523][ T8573] device 2219 left promiscuous mode [ 3138.189527][ T8573] device 2220 left promiscuous mode [ 3138.249612][ T8573] device 2221 left promiscuous mode [ 3138.309416][ T8573] device 2222 left promiscuous mode [ 3138.389148][ T8573] device 2223 left promiscuous mode [ 3138.429384][ T8573] device 2224 left promiscuous mode [ 3138.479534][ T8573] device 2225 left promiscuous mode [ 3138.519625][ T8573] device 2226 left promiscuous mode [ 3138.579413][ T8573] device 2227 left promiscuous mode [ 3138.639403][ T8573] device 2228 left promiscuous mode [ 3138.699363][ T8573] device 2229 left promiscuous mode [ 3138.749545][ T8573] device 2230 left promiscuous mode [ 3138.799606][ T8573] device 2231 left promiscuous mode [ 3138.869352][ T8573] device 2232 left promiscuous mode [ 3138.929445][ T8573] device 2233 left promiscuous mode [ 3138.989478][ T8573] device 2234 left promiscuous mode [ 3139.039653][ T8573] device 2235 left promiscuous mode [ 3139.099580][ T8573] device 2236 left promiscuous mode [ 3139.160871][ T8573] device 2237 left promiscuous mode [ 3139.229203][ T8573] device 2238 left promiscuous mode [ 3139.279533][ T8573] device 2239 left promiscuous mode [ 3139.339544][ T8573] device 2240 left promiscuous mode [ 3139.379660][ T8573] device 2241 left promiscuous mode [ 3139.420025][ T8573] device 2242 left promiscuous mode [ 3139.459482][ T8573] device 2243 left promiscuous mode [ 3139.529404][ T8573] device 2244 left promiscuous mode [ 3139.599305][ T8573] device 2245 left promiscuous mode [ 3139.639559][ T8573] device 2246 left promiscuous mode [ 3139.699327][ T8573] device 2247 left promiscuous mode [ 3139.759546][ T8573] device 2248 left promiscuous mode [ 3139.799461][ T8573] device 2249 left promiscuous mode [ 3139.839621][ T8573] device 2250 left promiscuous mode [ 3139.879578][ T8573] device 2251 left promiscuous mode [ 3139.919639][ T8573] device 2252 left promiscuous mode [ 3139.959672][ T8573] device 2253 left promiscuous mode [ 3139.999624][ T8573] device 2254 left promiscuous mode [ 3140.079116][ T8573] device 2255 left promiscuous mode [ 3140.129599][ T8573] device 2256 left promiscuous mode [ 3140.189292][ T8573] device 2257 left promiscuous mode [ 3140.249364][ T8573] device 2258 left promiscuous mode [ 3140.309413][ T8573] device 2259 left promiscuous mode [ 3140.360064][ T8573] device 2260 left promiscuous mode [ 3140.399542][ T8573] device 2261 left promiscuous mode [ 3140.469211][ T8573] device 2262 left promiscuous mode [ 3140.529322][ T8573] device 2263 left promiscuous mode [ 3140.569309][ T8573] device 2264 left promiscuous mode [ 3140.629341][ T8573] device 2265 left promiscuous mode [ 3140.699316][ T8573] device 2266 left promiscuous mode [ 3140.789493][ T8573] device 2267 left promiscuous mode [ 3140.869354][ T8573] device 2268 left promiscuous mode [ 3140.939301][ T8573] device 2269 left promiscuous mode [ 3141.009556][ T8573] device 2270 left promiscuous mode [ 3141.049647][ T8573] device 2271 left promiscuous mode [ 3141.089527][ T8573] device 2272 left promiscuous mode [ 3141.139340][ T8573] device 2273 left promiscuous mode [ 3141.219409][ T8573] device 2274 left promiscuous mode [ 3141.269513][ T8573] device 2275 left promiscuous mode [ 3141.319506][ T8573] device 2276 left promiscuous mode [ 3141.389331][ T8573] device 2277 left promiscuous mode [ 3141.430454][ T8573] device 2278 left promiscuous mode [ 3141.509346][ T8573] device 2279 left promiscuous mode [ 3141.559562][ T8573] device 2280 left promiscuous mode [ 3141.639354][ T8573] device 2281 left promiscuous mode [ 3141.699758][ T8573] device 2282 left promiscuous mode [ 3141.749685][ T8573] device 2283 left promiscuous mode [ 3141.789269][ T8573] device 2284 left promiscuous mode [ 3141.849318][ T8573] device 2285 left promiscuous mode [ 3141.909294][ T8573] device 2286 left promiscuous mode [ 3141.959480][ T8573] device 2287 left promiscuous mode [ 3141.999606][ T8573] device 2288 left promiscuous mode [ 3142.069451][ T8573] device 2289 left promiscuous mode [ 3142.129292][ T8573] device 2290 left promiscuous mode [ 3142.199569][ T8573] device 2291 left promiscuous mode [ 3142.259581][ T8573] device 2292 left promiscuous mode [ 3142.299763][ T8573] device 2293 left promiscuous mode [ 3142.379248][ T8573] device 2294 left promiscuous mode [ 3142.419417][ T8573] device 2295 left promiscuous mode [ 3142.469628][ T8573] device 2296 left promiscuous mode [ 3142.529385][ T8573] device 2297 left promiscuous mode [ 3142.589512][ T8573] device 2298 left promiscuous mode [ 3142.649407][ T8573] device 2299 left promiscuous mode [ 3142.709408][ T8573] device 2300 left promiscuous mode [ 3142.759632][ T8573] device 2301 left promiscuous mode [ 3142.829349][ T8573] device 2302 left promiscuous mode [ 3142.889410][ T8573] device 2303 left promiscuous mode [ 3142.959295][ T8573] device 2304 left promiscuous mode [ 3143.029345][ T8573] device 2305 left promiscuous mode [ 3143.109291][ T8573] device 2306 left promiscuous mode [ 3143.159666][ T8573] device 2307 left promiscuous mode [ 3143.219253][ T8573] device 2308 left promiscuous mode [ 3143.259578][ T8573] device 2309 left promiscuous mode [ 3143.299594][ T8573] device 2310 left promiscuous mode [ 3143.339430][ T8573] device 2311 left promiscuous mode [ 3143.389675][ T8573] device 2312 left promiscuous mode [ 3143.439118][ T8573] device 2313 left promiscuous mode [ 3143.489411][ T8573] device 2314 left promiscuous mode [ 3143.529686][ T8573] device 2315 left promiscuous mode [ 3143.569427][ T8573] device 2316 left promiscuous mode [ 3143.639563][ T8573] device 2317 left promiscuous mode [ 3143.689622][ T8573] device 2318 left promiscuous mode [ 3143.739519][ T8573] device 2319 left promiscuous mode [ 3143.789590][ T8573] device 2320 left promiscuous mode [ 3143.829478][ T8573] device 2321 left promiscuous mode [ 3143.899539][ T8573] device 2322 left promiscuous mode [ 3143.959388][ T8573] device 2323 left promiscuous mode [ 3144.039261][ T8573] device 2324 left promiscuous mode [ 3144.109343][ T8573] device 2325 left promiscuous mode [ 3144.149505][ T8573] device 2326 left promiscuous mode [ 3144.199623][ T8573] device 2327 left promiscuous mode [ 3144.259515][ T8573] device 2328 left promiscuous mode [ 3144.299650][ T8573] device 2329 left promiscuous mode [ 3144.359563][ T8573] device 2330 left promiscuous mode [ 3144.399359][ T8573] device 2331 left promiscuous mode [ 3144.479359][ T8573] device 2332 left promiscuous mode [ 3144.529620][ T8573] device 2333 left promiscuous mode [ 3144.569550][ T8573] device 2334 left promiscuous mode [ 3144.619146][ T8573] device 2335 left promiscuous mode [ 3144.659364][ T8573] device 2336 left promiscuous mode [ 3144.719313][ T8573] device 2337 left promiscuous mode [ 3144.770073][ T8573] device 2338 left promiscuous mode [ 3144.829415][ T8573] device 2339 left promiscuous mode [ 3144.889395][ T8573] device 2340 left promiscuous mode [ 3144.959252][ T8573] device 2341 left promiscuous mode [ 3145.029355][ T8573] device 2342 left promiscuous mode [ 3145.079532][ T8573] device 2343 left promiscuous mode [ 3145.139376][ T8573] device 2344 left promiscuous mode [ 3145.189491][ T8573] device 2345 left promiscuous mode [ 3145.229614][ T8573] device 2346 left promiscuous mode [ 3145.269599][ T8573] device 2347 left promiscuous mode [ 3145.319357][ T8573] device 2348 left promiscuous mode [ 3145.379334][ T8573] device 2349 left promiscuous mode [ 3145.429520][ T8573] device 2350 left promiscuous mode [ 3145.469593][ T8573] device 2351 left promiscuous mode [ 3145.509676][ T8573] device 2352 left promiscuous mode [ 3145.579427][ T8573] device 2353 left promiscuous mode [ 3145.639487][ T8573] device 2354 left promiscuous mode [ 3145.709337][ T8573] device 2355 left promiscuous mode [ 3145.749583][ T8573] device 2356 left promiscuous mode [ 3145.799656][ T8573] device 2357 left promiscuous mode [ 3145.879233][ T8573] device 2358 left promiscuous mode [ 3145.929538][ T8573] device 2359 left promiscuous mode [ 3145.999446][ T8573] device 2360 left promiscuous mode [ 3146.049514][ T8573] device 2361 left promiscuous mode [ 3146.090498][ T8573] device 2362 left promiscuous mode [ 3146.159390][ T8573] device 2363 left promiscuous mode [ 3146.209661][ T8573] device 2364 left promiscuous mode [ 3146.269591][ T8573] device 2365 left promiscuous mode [ 3146.309569][ T8573] device 2366 left promiscuous mode [ 3146.389122][ T8573] device 2367 left promiscuous mode [ 3146.449369][ T8573] device 2368 left promiscuous mode [ 3146.499565][ T8573] device 2369 left promiscuous mode [ 3146.549428][ T8573] device 2370 left promiscuous mode [ 3146.589638][ T8573] device 2371 left promiscuous mode [ 3146.629333][ T8573] device 2372 left promiscuous mode [ 3146.679582][ T8573] device 2373 left promiscuous mode [ 3146.719674][ T8573] device 2374 left promiscuous mode [ 3146.760926][ T8573] device 2375 left promiscuous mode [ 3146.819315][ T8573] device 2376 left promiscuous mode [ 3146.859501][ T8573] device 2377 left promiscuous mode [ 3146.929260][ T8573] device 2378 left promiscuous mode [ 3146.999550][ T8573] device 2379 left promiscuous mode [ 3147.059318][ T8573] device 2380 left promiscuous mode [ 3147.109539][ T8573] device 2381 left promiscuous mode [ 3147.169500][ T8573] device 2382 left promiscuous mode [ 3147.229561][ T8573] device 2383 left promiscuous mode [ 3147.279442][ T8573] device 2384 left promiscuous mode [ 3147.319356][ T8573] device 2385 left promiscuous mode [ 3147.359285][ T8573] device 2386 left promiscuous mode [ 3147.459190][ T8573] device 2387 left promiscuous mode [ 3147.509547][ T8573] device 2388 left promiscuous mode [ 3147.549605][ T8573] device 2389 left promiscuous mode [ 3147.609412][ T8573] device 2390 left promiscuous mode [ 3147.669409][ T8573] device 2391 left promiscuous mode [ 3147.729182][ T8573] device 2392 left promiscuous mode [ 3147.779575][ T8573] device 2393 left promiscuous mode [ 3147.820434][ T8573] device 2394 left promiscuous mode [ 3147.899252][ T8573] device 2395 left promiscuous mode [ 3147.959445][ T8573] device 2396 left promiscuous mode [ 3148.019328][ T8573] device 2397 left promiscuous mode [ 3148.089323][ T8573] device 2398 left promiscuous mode [ 3148.169351][ T8573] device 2399 left promiscuous mode [ 3148.219477][ T8573] device 2400 left promiscuous mode [ 3148.299180][ T8573] device 2401 left promiscuous mode [ 3148.379487][ T8573] device 2402 left promiscuous mode [ 3148.429677][ T8573] device 2403 left promiscuous mode [ 3148.469410][ T8573] device 2404 left promiscuous mode [ 3148.509556][ T8573] device 2405 left promiscuous mode [ 3148.549509][ T8573] device 2406 left promiscuous mode [ 3148.589528][ T8573] device 2407 left promiscuous mode [ 3148.629510][ T8573] device 2408 left promiscuous mode [ 3148.669643][ T8573] device 2409 left promiscuous mode [ 3148.729622][ T8573] device 2410 left promiscuous mode [ 3148.789480][ T8573] device 2411 left promiscuous mode [ 3148.849320][ T8573] device 2412 left promiscuous mode [ 3148.919531][ T8573] device 2413 left promiscuous mode [ 3148.979502][ T8573] device 2414 left promiscuous mode [ 3149.029919][ T8573] device 2415 left promiscuous mode [ 3149.089335][ T8573] device 2416 left promiscuous mode [ 3149.149346][ T8573] device 2417 left promiscuous mode [ 3149.239513][ T8573] device 2418 left promiscuous mode [ 3149.279526][ T8573] device 2419 left promiscuous mode [ 3149.349369][ T8573] device 2420 left promiscuous mode [ 3149.439232][ T8573] device 2421 left promiscuous mode [ 3149.509481][ T8573] device 2422 left promiscuous mode [ 3149.559857][ T8573] device 2423 left promiscuous mode [ 3149.599378][ T8573] device 2424 left promiscuous mode [ 3149.639487][ T8573] device 2425 left promiscuous mode [ 3149.679507][ T8573] device 2426 left promiscuous mode [ 3149.719582][ T8573] device 2427 left promiscuous mode [ 3149.779582][ T8573] device 2428 left promiscuous mode [ 3149.819611][ T8573] device 2429 left promiscuous mode [ 3149.859357][ T8573] device 2430 left promiscuous mode [ 3149.909529][ T8573] device 2431 left promiscuous mode [ 3149.949493][ T8573] device 2432 left promiscuous mode [ 3149.989559][ T8573] device 2433 left promiscuous mode [ 3150.049699][ T8573] device 2434 left promiscuous mode [ 3150.119363][ T8573] device 2435 left promiscuous mode [ 3150.169587][ T8573] device 2436 left promiscuous mode [ 3150.219850][ T8573] device 2437 left promiscuous mode [ 3150.279369][ T8573] device 2438 left promiscuous mode [ 3150.359586][ T8573] device 2439 left promiscuous mode [ 3150.419351][ T8573] device 2440 left promiscuous mode [ 3150.469629][ T8573] device 2441 left promiscuous mode [ 3150.539405][ T8573] device 2442 left promiscuous mode [ 3150.589525][ T8573] device 2443 left promiscuous mode [ 3150.659412][ T8573] device 2444 left promiscuous mode [ 3150.709490][ T8573] device 2445 left promiscuous mode [ 3150.750489][ T8573] device 2446 left promiscuous mode [ 3150.819310][ T8573] device 2447 left promiscuous mode [ 3150.879537][ T8573] device 2448 left promiscuous mode [ 3150.949330][ T8573] device 2449 left promiscuous mode [ 3151.009587][ T8573] device 2450 left promiscuous mode [ 3151.049636][ T8573] device 2451 left promiscuous mode [ 3151.109454][ T8573] device 2452 left promiscuous mode [ 3151.169481][ T8573] device 2453 left promiscuous mode [ 3151.229324][ T8573] device 2454 left promiscuous mode [ 3151.280620][ T8573] device 2455 left promiscuous mode [ 3151.339436][ T8573] device 2456 left promiscuous mode [ 3151.419164][ T8573] device 2457 left promiscuous mode [ 3151.459503][ T8573] device 2458 left promiscuous mode [ 3151.509562][ T8573] device 2459 left promiscuous mode [ 3151.549583][ T8573] device 2460 left promiscuous mode [ 3151.619414][ T8573] device 2461 left promiscuous mode [ 3151.689572][ T8573] device 2462 left promiscuous mode [ 3151.729727][ T8573] device 2463 left promiscuous mode [ 3151.789360][ T8573] device 2464 left promiscuous mode [ 3151.849390][ T8573] device 2465 left promiscuous mode [ 3151.909370][ T8573] device 2466 left promiscuous mode [ 3151.949330][ T8573] device 2467 left promiscuous mode [ 3151.999538][ T8573] device 2468 left promiscuous mode [ 3152.039570][ T8573] device 2469 left promiscuous mode [ 3152.079576][ T8573] device 2470 left promiscuous mode [ 3152.119499][ T8573] device 2471 left promiscuous mode [ 3152.169344][ T8573] device 2472 left promiscuous mode [ 3152.219552][ T8573] device 2473 left promiscuous mode [ 3152.279617][ T8573] device 2474 left promiscuous mode [ 3152.319593][ T8573] device 2475 left promiscuous mode [ 3152.379195][ T8573] device 2476 left promiscuous mode [ 3152.419546][ T8573] device 2477 left promiscuous mode [ 3152.479434][ T8573] device 2478 left promiscuous mode [ 3152.529621][ T8573] device 2479 left promiscuous mode [ 3152.599920][ T8573] device 2480 left promiscuous mode [ 3152.659310][ T8573] device 2481 left promiscuous mode [ 3152.739291][ T8573] device 2482 left promiscuous mode [ 3152.779610][ T8573] device 2483 left promiscuous mode [ 3152.829160][ T8573] device 2484 left promiscuous mode [ 3152.879422][ T8573] device 2485 left promiscuous mode [ 3152.929628][ T8573] device 2486 left promiscuous mode [ 3152.979373][ T8573] device 2487 left promiscuous mode [ 3153.019361][ T8573] device 2488 left promiscuous mode [ 3153.069527][ T8573] device 2489 left promiscuous mode [ 3153.109656][ T8573] device 2490 left promiscuous mode [ 3153.159250][ T8573] device 2491 left promiscuous mode [ 3153.209867][ T8573] device 2492 left promiscuous mode [ 3153.269344][ T8573] device 2493 left promiscuous mode [ 3153.329587][ T8573] device 2494 left promiscuous mode [ 3153.369780][ T8573] device 2495 left promiscuous mode [ 3153.409346][ T8573] device 2496 left promiscuous mode [ 3153.469338][ T8573] device 2497 left promiscuous mode [ 3153.529342][ T8573] device 2498 left promiscuous mode [ 3153.589372][ T8573] device 2499 left promiscuous mode [ 3153.649333][ T8573] device 2500 left promiscuous mode [ 3153.699560][ T8573] device 2501 left promiscuous mode [ 3153.759554][ T8573] device 2502 left promiscuous mode [ 3153.810058][ T8573] device 2503 left promiscuous mode [ 3153.869349][ T8573] device 2504 left promiscuous mode [ 3153.929464][ T8573] device 2505 left promiscuous mode [ 3153.979473][ T8573] device 2506 left promiscuous mode [ 3154.049523][ T8573] device 2507 left promiscuous mode [ 3154.099477][ T8573] device 2508 left promiscuous mode [ 3154.139724][ T8573] device 2509 left promiscuous mode [ 3154.199193][ T8573] device 2510 left promiscuous mode [ 3154.249622][ T8573] device 2511 left promiscuous mode [ 3154.289579][ T8573] device 2512 left promiscuous mode [ 3154.349367][ T8573] device 2513 left promiscuous mode [ 3154.389681][ T8573] device 2514 left promiscuous mode [ 3154.429627][ T8573] device 2515 left promiscuous mode [ 3154.469646][ T8573] device 2516 left promiscuous mode [ 3154.509615][ T8573] device 2517 left promiscuous mode [ 3154.559166][ T8573] device 2518 left promiscuous mode [ 3154.609630][ T8573] device 2519 left promiscuous mode [ 3154.669189][ T8573] device 2520 left promiscuous mode [ 3154.739398][ T8573] device 2521 left promiscuous mode [ 3154.799324][ T8573] device 2522 left promiscuous mode [ 3154.849597][ T8573] device 2523 left promiscuous mode [ 3154.919380][ T8573] device 2524 left promiscuous mode [ 3154.979370][ T8573] device 2525 left promiscuous mode [ 3155.019371][ T8573] device 2526 left promiscuous mode [ 3155.099315][ T8573] device 2527 left promiscuous mode [ 3155.149585][ T8573] device 2528 left promiscuous mode [ 3155.209609][ T8573] device 2529 left promiscuous mode [ 3155.249604][ T8573] device 2530 left promiscuous mode [ 3155.289602][ T8573] device 2531 left promiscuous mode [ 3155.329681][ T8573] device 2532 left promiscuous mode [ 3155.369507][ T8573] device 2533 left promiscuous mode [ 3155.429240][ T8573] device 2534 left promiscuous mode [ 3155.489509][ T8573] device 2535 left promiscuous mode [ 3155.569347][ T8573] device 2536 left promiscuous mode [ 3155.629358][ T8573] device 2537 left promiscuous mode [ 3155.689330][ T8573] device 2538 left promiscuous mode [ 3155.749374][ T8573] device 2539 left promiscuous mode [ 3155.829362][ T8573] device 2540 left promiscuous mode [ 3155.879598][ T8573] device 2541 left promiscuous mode [ 3155.950136][ T8573] device 2542 left promiscuous mode [ 3156.029282][ T8573] device 2543 left promiscuous mode [ 3156.069508][ T8573] device 2544 left promiscuous mode [ 3156.139368][ T8573] device 2545 left promiscuous mode [ 3156.189514][ T8573] device 2546 left promiscuous mode [ 3156.249355][ T8573] device 2547 left promiscuous mode [ 3156.319111][ T8573] device 2548 left promiscuous mode [ 3156.369385][ T8573] device 2549 left promiscuous mode [ 3156.409346][ T8573] device 2550 left promiscuous mode [ 3156.469385][ T8573] device 2551 left promiscuous mode [ 3156.539307][ T8573] device 2552 left promiscuous mode [ 3156.599543][ T8573] device 2553 left promiscuous mode [ 3156.669380][ T8573] device 2554 left promiscuous mode [ 3156.739590][ T8573] device 2555 left promiscuous mode [ 3156.799699][ T8573] device 2556 left promiscuous mode [ 3156.849399][ T8573] device 2557 left promiscuous mode [ 3156.899598][ T8573] device 2558 left promiscuous mode [ 3156.959162][ T8573] device 2559 left promiscuous mode [ 3157.029573][ T8573] device 2560 left promiscuous mode [ 3157.069548][ T8573] device 2561 left promiscuous mode [ 3157.109555][ T8573] device 2562 left promiscuous mode [ 3157.149517][ T8573] device 2563 left promiscuous mode [ 3157.189621][ T8573] device 2564 left promiscuous mode [ 3157.249393][ T8573] device 2565 left promiscuous mode [ 3157.299459][ T8573] device 2566 left promiscuous mode [ 3157.369406][ T8573] device 2567 left promiscuous mode [ 3157.439355][ T8573] device 2568 left promiscuous mode [ 3157.499350][ T8573] device 2569 left promiscuous mode [ 3157.539344][ T8573] device 2570 left promiscuous mode [ 3157.599359][ T8573] device 2571 left promiscuous mode [ 3157.669517][ T8573] device 2572 left promiscuous mode [ 3157.729319][ T8573] device 2573 left promiscuous mode [ 3157.769572][ T8573] device 2574 left promiscuous mode [ 3157.811187][ T8573] device 2575 left promiscuous mode [ 3157.869413][ T8573] device 2576 left promiscuous mode [ 3157.909546][ T8573] device 2577 left promiscuous mode [ 3157.949572][ T8573] device 2578 left promiscuous mode [ 3158.009397][ T8573] device 2579 left promiscuous mode [ 3158.069650][ T8573] device 2580 left promiscuous mode [ 3158.119637][ T8573] device 2581 left promiscuous mode [ 3158.189482][ T8573] device 2582 left promiscuous mode [ 3158.259570][ T8573] device 2583 left promiscuous mode [ 3158.319560][ T8573] device 2584 left promiscuous mode [ 3158.369253][ T8573] device 2585 left promiscuous mode [ 3158.429344][ T8573] device 2586 left promiscuous mode [ 3158.499507][ T8573] device 2587 left promiscuous mode [ 3158.539580][ T8573] device 2588 left promiscuous mode [ 3158.579663][ T8573] device 2589 left promiscuous mode [ 3158.629574][ T8573] device 2590 left promiscuous mode [ 3158.689521][ T8573] device 2591 left promiscuous mode [ 3158.749549][ T8573] device 2592 left promiscuous mode [ 3158.789561][ T8573] device 2593 left promiscuous mode [ 3158.829559][ T8573] device 2594 left promiscuous mode [ 3158.879329][ T8573] device 2595 left promiscuous mode [ 3158.929483][ T8573] device 2596 left promiscuous mode [ 3158.969548][ T8573] device 2597 left promiscuous mode [ 3159.009632][ T8573] device 2598 left promiscuous mode [ 3159.059329][ T8573] device 2599 left promiscuous mode [ 3159.119331][ T8573] device 2600 left promiscuous mode [ 3159.169566][ T8573] device 2601 left promiscuous mode [ 3159.229525][ T8573] device 2602 left promiscuous mode [ 3159.289343][ T8573] device 2603 left promiscuous mode [ 3159.349456][ T8573] device 2604 left promiscuous mode [ 3159.400231][ T8573] device 2605 left promiscuous mode [ 3159.439596][ T8573] device 2606 left promiscuous mode [ 3159.509444][ T8573] device 2607 left promiscuous mode [ 3159.549286][ T8573] device 2608 left promiscuous mode [ 3159.609365][ T8573] device 2609 left promiscuous mode [ 3159.689329][ T8573] device 2610 left promiscuous mode [ 3159.739533][ T8573] device 2611 left promiscuous mode [ 3159.809487][ T8573] device 2612 left promiscuous mode [ 3159.859426][ T8573] device 2613 left promiscuous mode [ 3159.899617][ T8573] device 2614 left promiscuous mode [ 3159.939616][ T8573] device 2615 left promiscuous mode [ 3159.999160][ T8573] device 2616 left promiscuous mode [ 3160.049616][ T8573] device 2617 left promiscuous mode [ 3160.089521][ T8573] device 2618 left promiscuous mode [ 3160.129509][ T8573] device 2619 left promiscuous mode [ 3160.169508][ T8573] device 2620 left promiscuous mode [ 3160.219362][ T8573] device 2621 left promiscuous mode [ 3160.289338][ T8573] device 2622 left promiscuous mode [ 3160.369315][ T8573] device 2623 left promiscuous mode [ 3160.439489][ T8573] device 2624 left promiscuous mode [ 3160.489431][ T8573] device 2625 left promiscuous mode [ 3160.539564][ T8573] device 2626 left promiscuous mode [ 3160.579565][ T8573] device 2627 left promiscuous mode [ 3160.629624][ T8573] device 2628 left promiscuous mode [ 3160.699359][ T8573] device 2629 left promiscuous mode [ 3160.779383][ T8573] device 2630 left promiscuous mode [ 3160.829503][ T8573] device 2631 left promiscuous mode [ 3160.889520][ T8573] device 2632 left promiscuous mode [ 3160.939402][ T8573] device 2633 left promiscuous mode [ 3161.009537][ T8573] device 2634 left promiscuous mode [ 3161.069332][ T8573] device 2635 left promiscuous mode [ 3161.129363][ T8573] device 2636 left promiscuous mode [ 3161.189374][ T8573] device 2637 left promiscuous mode [ 3161.239641][ T8573] device 2638 left promiscuous mode [ 3161.279545][ T8573] device 2639 left promiscuous mode [ 3161.319524][ T8573] device 2640 left promiscuous mode [ 3161.379245][ T8573] device 2641 left promiscuous mode [ 3161.429304][ T8573] device 2642 left promiscuous mode [ 3161.489338][ T8573] device 2643 left promiscuous mode [ 3161.569297][ T8573] device 2644 left promiscuous mode [ 3161.619444][ T8573] device 2645 left promiscuous mode [ 3161.679625][ T8573] device 2646 left promiscuous mode [ 3161.739299][ T8573] device 2647 left promiscuous mode [ 3161.779659][ T8573] device 2648 left promiscuous mode [ 3161.859329][ T8573] device 2649 left promiscuous mode [ 3161.899540][ T8573] device 2650 left promiscuous mode [ 3161.959576][ T8573] device 2651 left promiscuous mode [ 3162.009459][ T8573] device 2652 left promiscuous mode [ 3162.059589][ T8573] device 2653 left promiscuous mode [ 3162.109611][ T8573] device 2654 left promiscuous mode [ 3162.159533][ T8573] device 2655 left promiscuous mode [ 3162.209196][ T8573] device 2656 left promiscuous mode [ 3162.269334][ T8573] device 2657 left promiscuous mode [ 3162.319536][ T8573] device 2658 left promiscuous mode [ 3162.359616][ T8573] device 2659 left promiscuous mode [ 3162.439163][ T8573] device 2660 left promiscuous mode [ 3162.509499][ T8573] device 2661 left promiscuous mode [ 3162.559378][ T8573] device 2662 left promiscuous mode [ 3162.609602][ T8573] device 2663 left promiscuous mode [ 3162.659405][ T8573] device 2664 left promiscuous mode [ 3162.709563][ T8573] device 2665 left promiscuous mode [ 3162.769494][ T8573] device 2666 left promiscuous mode [ 3162.829429][ T8573] device 2667 left promiscuous mode [ 3162.869621][ T8573] device 2668 left promiscuous mode [ 3162.909677][ T8573] device 2669 left promiscuous mode [ 3162.969187][ T8573] device 2670 left promiscuous mode [ 3163.009710][ T8573] device 2671 left promiscuous mode [ 3163.049571][ T8573] device 2672 left promiscuous mode [ 3163.089607][ T8573] device 2673 left promiscuous mode [ 3163.129565][ T8573] device 2674 left promiscuous mode [ 3163.169606][ T8573] device 2675 left promiscuous mode [ 3163.209589][ T8573] device 2676 left promiscuous mode [ 3163.269321][ T8573] device 2677 left promiscuous mode [ 3163.329501][ T8573] device 2678 left promiscuous mode [ 3163.389523][ T8573] device 2679 left promiscuous mode [ 3163.429596][ T8573] device 2680 left promiscuous mode [ 3163.479343][ T8573] device 2681 left promiscuous mode [ 3163.529487][ T8573] device 2682 left promiscuous mode [ 3163.599311][ T8573] device 2683 left promiscuous mode [ 3163.659319][ T8573] device 2684 left promiscuous mode [ 3163.719319][ T8573] device 2685 left promiscuous mode [ 3163.779333][ T8573] device 2686 left promiscuous mode [ 3163.819293][ T8573] device 2687 left promiscuous mode [ 3163.869482][ T8573] device 2688 left promiscuous mode [ 3163.939307][ T8573] device 2689 left promiscuous mode [ 3163.999501][ T8573] device 2690 left promiscuous mode [ 3164.039393][ T8573] device 2691 left promiscuous mode [ 3164.089587][ T8573] device 2692 left promiscuous mode [ 3164.139455][ T8573] device 2693 left promiscuous mode [ 3164.199548][ T8573] device 2694 left promiscuous mode [ 3164.249621][ T8573] device 2695 left promiscuous mode [ 3164.319350][ T8573] device 2696 left promiscuous mode [ 3164.369472][ T8573] device 2697 left promiscuous mode [ 3164.439433][ T8573] device 2698 left promiscuous mode [ 3164.490649][ T8573] device 2699 left promiscuous mode [ 3164.559333][ T8573] device 2700 left promiscuous mode [ 3164.629298][ T8573] device 2701 left promiscuous mode [ 3164.719291][ T8573] device 2702 left promiscuous mode [ 3164.759681][ T8573] device 2703 left promiscuous mode [ 3164.829532][ T8573] device 2704 left promiscuous mode [ 3164.879534][ T8573] device 2705 left promiscuous mode [ 3164.919649][ T8573] device 2706 left promiscuous mode [ 3164.989458][ T8573] device 2707 left promiscuous mode [ 3165.039646][ T8573] device 2708 left promiscuous mode [ 3165.089539][ T8573] device 2709 left promiscuous mode [ 3165.159528][ T8573] device 2710 left promiscuous mode [ 3165.219478][ T8573] device 2711 left promiscuous mode [ 3165.269623][ T8573] device 2712 left promiscuous mode [ 3165.329373][ T8573] device 2713 left promiscuous mode [ 3165.399608][ T8573] device 2714 left promiscuous mode [ 3165.449519][ T8573] device 2715 left promiscuous mode [ 3165.489438][ T8573] device 2716 left promiscuous mode [ 3165.559339][ T8573] device 2717 left promiscuous mode [ 3165.599673][ T8573] device 2718 left promiscuous mode [ 3165.669408][ T8573] device 2719 left promiscuous mode [ 3165.719565][ T8573] device 2720 left promiscuous mode [ 3165.789386][ T8573] device 2721 left promiscuous mode [ 3165.869177][ T8573] device 2722 left promiscuous mode [ 3165.929340][ T8573] device 2723 left promiscuous mode [ 3165.979506][ T8573] device 2724 left promiscuous mode [ 3166.039554][ T8573] device 2725 left promiscuous mode [ 3166.099536][ T8573] device 2726 left promiscuous mode [ 3166.149679][ T8573] device 2727 left promiscuous mode [ 3166.189590][ T8573] device 2728 left promiscuous mode [ 3166.229479][ T8573] device 2729 left promiscuous mode [ 3166.269624][ T8573] device 2730 left promiscuous mode [ 3166.329317][ T8573] device 2731 left promiscuous mode [ 3166.359095][ T1070] INFO: task syz-executor.4:30210 blocked for more than 143 seconds. [ 3166.367190][ T1070] Not tainted 5.4.0-rc3+ #0 [ 3166.372349][ T1070] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3166.381830][ T8573] kobject: '2731' (0000000033190a4b): kobject_cleanup, parent 00000000555e19ca [ 3166.385410][ T1070] syz-executor.4 D28032 30210 9667 0x00004004 [ 3166.391185][ T8573] kobject: '2731' (0000000033190a4b): calling ktype release [ 3166.391237][ T8573] kobject: '2731': free name [ 3166.391286][ T8573] device 2732 left promiscuous mode [ 3166.399712][ T1070] Call Trace: [ 3166.418441][ T1070] __schedule+0x94f/0x1e70 [ 3166.422946][ T1070] ? __sched_text_start+0x8/0x8 [ 3166.427910][ T1070] ? lock_downgrade+0x920/0x920 [ 3166.432851][ T1070] ? rwlock_bug.part.0+0x90/0x90 [ 3166.437792][ T1070] schedule+0xd9/0x260 [ 3166.442072][ T1070] schedule_preempt_disabled+0x13/0x20 [ 3166.447535][ T1070] __mutex_lock+0x7b0/0x13c0 [ 3166.452199][ T1070] ? ovs_dp_cmd_new+0x5d9/0xe30 [ 3166.457048][ T1070] ? mutex_trylock+0x2d0/0x2d0 [ 3166.461854][ T1070] ? lock_downgrade+0x920/0x920 [ 3166.466706][ T1070] ? rcu_read_lock_any_held+0xcd/0xf0 [ 3166.472239][ T1070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3166.478516][ T1070] mutex_lock_nested+0x16/0x20 [ 3166.483349][ T1070] ? mutex_lock_nested+0x16/0x20 [ 3166.488302][ T1070] ovs_dp_cmd_new+0x5d9/0xe30 [ 3166.493067][ T1070] ? ovs_vport_cmd_new+0xf50/0xf50 [ 3166.498178][ T1070] ? __nla_parse+0x43/0x60 [ 3166.502660][ T1070] ? audit_add_tree_rule+0x1c0/0xbe0 [ 3166.507949][ T1070] ? genl_family_rcv_msg_attrs_parse+0x1c6/0x300 [ 3166.514365][ T1070] genl_rcv_msg+0x67d/0xea0 [ 3166.519092][ T1070] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 3166.525425][ T1070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3166.531751][ T1070] ? find_held_lock+0x35/0x130 [ 3166.536512][ T1070] netlink_rcv_skb+0x177/0x450 [ 3166.541321][ T1070] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 3166.547667][ T1070] ? netlink_ack+0xb50/0xb50 [ 3166.552339][ T1070] ? __kasan_check_write+0x14/0x20 [ 3166.557448][ T1070] ? netlink_deliver_tap+0x254/0xbf0 [ 3166.562776][ T1070] genl_rcv+0x29/0x40 [ 3166.566783][ T1070] netlink_unicast+0x531/0x710 [ 3166.571623][ T1070] ? netlink_attachskb+0x7c0/0x7c0 [ 3166.576727][ T1070] ? _copy_from_iter_full+0x25d/0x8c0 [ 3166.582230][ T1070] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3166.587951][ T1070] ? __check_object_size+0x3d/0x437 [ 3166.593234][ T1070] netlink_sendmsg+0x8a5/0xd60 [ 3166.598130][ T1070] ? netlink_unicast+0x710/0x710 [ 3166.603131][ T1070] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 3166.608685][ T1070] ? apparmor_socket_sendmsg+0x2a/0x30 [ 3166.614242][ T1070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3166.620533][ T1070] ? security_socket_sendmsg+0x8d/0xc0 [ 3166.626007][ T1070] ? netlink_unicast+0x710/0x710 [ 3166.631013][ T1070] sock_sendmsg+0xd7/0x130 [ 3166.635438][ T1070] ___sys_sendmsg+0x803/0x920 [ 3166.640169][ T1070] ? copy_msghdr_from_user+0x440/0x440 [ 3166.645641][ T1070] ? __kasan_check_read+0x11/0x20 [ 3166.650742][ T1070] ? __fget+0x384/0x560 [ 3166.654904][ T1070] ? ksys_dup3+0x3e0/0x3e0 [ 3166.659389][ T1070] ? __fget_light+0x1a9/0x230 [ 3166.664072][ T1070] ? __fdget+0x1b/0x20 [ 3166.668123][ T1070] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3166.674443][ T1070] __sys_sendmsg+0x105/0x1d0 [ 3166.679060][ T1070] ? __sys_sendmsg_sock+0xd0/0xd0 [ 3166.684075][ T1070] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 3166.689692][ T1070] ? do_syscall_64+0x26/0x760 [ 3166.694374][ T1070] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3166.700490][ T1070] ? do_syscall_64+0x26/0x760 [ 3166.705187][ T1070] __x64_sys_sendmsg+0x78/0xb0 [ 3166.710018][ T1070] do_syscall_64+0xfa/0x760 [ 3166.714529][ T1070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3166.720463][ T1070] RIP: 0033:0x459f49 [ 3166.724377][ T1070] Code: Bad RIP value. [ 3166.728421][ T1070] RSP: 002b:00007f0a80436c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3166.736905][ T1070] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f49 [ 3166.744931][ T1070] RDX: 0000000000000500 RSI: 0000000020000280 RDI: 0000000000000004 [ 3166.752969][ T1070] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 3166.761037][ T1070] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a804376d4 [ 3166.769062][ T1070] R13: 00000000004c82c5 R14: 00000000004de560 R15: 00000000ffffffff [ 3166.777211][ T1070] INFO: task syz-executor.0:30239 blocked for more than 143 seconds. [ 3166.785544][ T1070] Not tainted 5.4.0-rc3+ #0 [ 3166.790637][ T1070] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3166.799430][ T1070] syz-executor.0 D25656 30239 8742 0x00004004 [ 3166.805764][ T1070] Call Trace: [ 3166.809108][ T1070] __schedule+0x94f/0x1e70 [ 3166.813545][ T1070] ? __sched_text_start+0x8/0x8 [ 3166.818391][ T1070] ? lock_downgrade+0x920/0x920 [ 3166.823277][ T1070] ? rwlock_bug.part.0+0x90/0x90 [ 3166.828221][ T1070] schedule+0xd9/0x260 [ 3166.832362][ T1070] schedule_preempt_disabled+0x13/0x20 [ 3166.837840][ T1070] __mutex_lock+0x7b0/0x13c0 [ 3166.842481][ T1070] ? ovs_dp_cmd_new+0x5d9/0xe30 [ 3166.847337][ T1070] ? mutex_trylock+0x2d0/0x2d0 [ 3166.852175][ T1070] ? lock_downgrade+0x920/0x920 [ 3166.857022][ T1070] ? rcu_read_lock_any_held+0xcd/0xf0 [ 3166.862437][ T1070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3166.868683][ T1070] mutex_lock_nested+0x16/0x20 [ 3166.873517][ T1070] ? mutex_lock_nested+0x16/0x20 [ 3166.878540][ T1070] ovs_dp_cmd_new+0x5d9/0xe30 [ 3166.883258][ T1070] ? ovs_vport_cmd_new+0xf50/0xf50 [ 3166.888368][ T1070] ? retint_kernel+0x2b/0x2b [ 3166.893038][ T1070] genl_rcv_msg+0x67d/0xea0 [ 3166.897544][ T1070] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 3166.903910][ T1070] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 3166.909555][ T1070] netlink_rcv_skb+0x177/0x450 [ 3166.915197][ T1070] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 3166.921757][ T1070] ? netlink_ack+0xb50/0xb50 [ 3166.926349][ T1070] ? __kasan_check_write+0x14/0x20 [ 3166.931531][ T1070] ? netlink_deliver_tap+0x254/0xbf0 [ 3166.937193][ T1070] genl_rcv+0x29/0x40 [ 3166.941231][ T1070] netlink_unicast+0x531/0x710 [ 3166.947476][ T1070] ? netlink_attachskb+0x7c0/0x7c0 [ 3166.952654][ T1070] ? _copy_from_iter_full+0x25d/0x8c0 [ 3166.958025][ T1070] ? __check_object_size+0x41/0x437 [ 3166.963276][ T1070] netlink_sendmsg+0x8a5/0xd60 [ 3166.968049][ T1070] ? netlink_unicast+0x710/0x710 [ 3166.973066][ T1070] ? netlink_sendmsg+0x2c/0xd60 [ 3166.977914][ T1070] ? netlink_unicast+0x710/0x710 [ 3166.982891][ T1070] sock_sendmsg+0xd7/0x130 [ 3166.987318][ T1070] ___sys_sendmsg+0x803/0x920 [ 3166.992070][ T1070] ? copy_msghdr_from_user+0x440/0x440 [ 3166.997528][ T1070] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 3167.003337][ T1070] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 3167.008810][ T1070] ? lockdep_hardirqs_on+0x421/0x5e0 [ 3167.014176][ T1070] ? retint_kernel+0x2b/0x2b [ 3167.018760][ T1070] ? trace_hardirqs_on_caller+0x6a/0x240 [ 3167.024561][ T1070] ? __fget+0x384/0x560 [ 3167.028752][ T1070] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 3167.034290][ T1070] ? __this_cpu_preempt_check+0x3a/0x210 [ 3167.039951][ T1070] ? retint_kernel+0x2b/0x2b [ 3167.044554][ T1070] ? ___sys_sendmsg+0xb/0x920 [ 3167.049303][ T1070] __sys_sendmsg+0x105/0x1d0 [ 3167.053905][ T1070] ? __sys_sendmsg_sock+0xd0/0xd0 [ 3167.058994][ T1070] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 3167.064468][ T1070] __x64_sys_sendmsg+0x78/0xb0 [ 3167.069385][ T1070] do_syscall_64+0xfa/0x760 [ 3167.073901][ T1070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3167.080182][ T1070] RIP: 0033:0x459f49 [ 3167.084089][ T1070] Code: Bad RIP value. [ 3167.088133][ T1070] RSP: 002b:00007fb9a5676c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3167.096603][ T1070] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f49 [ 3167.104641][ T1070] RDX: 2203000000000000 RSI: 0000000020000280 RDI: 0000000000000004 [ 3167.112700][ T1070] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 3167.120693][ T1070] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb9a56776d4 [ 3167.128661][ T1070] R13: 00000000004c82c5 R14: 00000000004de560 R15: 00000000ffffffff [ 3167.136810][ T1070] [ 3167.136810][ T1070] Showing all locks held in the system: [ 3167.140094][ T8573] kobject: 'batman_adv' (0000000002b9fe32): kobject_uevent_env [ 3167.144592][ T1070] 1 lock held by khungtaskd/1070: [ 3167.157170][ T1070] #0: ffffffff88fab1c0 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 3167.159188][ T8573] kobject: 'batman_adv' (0000000002b9fe32): kobject_uevent_env: filter function caused the event to drop! [ 3167.166620][ T1070] 1 lock held by rsyslogd/8614: [ 3167.182762][ T1070] #0: ffff8880a10148a0 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 3167.184759][ T8573] kobject: 'batman_adv' (0000000002b9fe32): kobject_cleanup, parent 00000000555e19ca [ 3167.191433][ T1070] 2 locks held by getty/8704: [ 3167.191443][ T1070] #0: ffff8880a4a02090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3167.207796][ T8573] kobject: 'batman_adv' (0000000002b9fe32): calling ktype release [ 3167.214566][ T1070] #1: ffffc90005f432e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 3167.214686][ T1070] 2 locks held by getty/8705: [ 3167.229581][ T8573] kobject: (0000000002b9fe32): dynamic_kobj_release [ 3167.232104][ T1070] #0: ffff888098c92090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3167.236751][ T8573] kobject: 'batman_adv': free name [ 3167.243373][ T1070] #1: ffffc90005f252e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 3167.243409][ T1070] 2 locks held by getty/8706: [ 3167.243414][ T1070] #0: ffff8880a1d84090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3167.243440][ T1070] #1: ffffc90005f3b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 3167.243469][ T1070] 2 locks held by getty/8707: [ 3167.243473][ T1070] #0: ffff8880a95ef090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3167.243502][ T1070] #1: ffffc90005f472e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 3167.260786][ T8573] kobject: 'rx-0' (000000007a050c99): kobject_cleanup, parent 00000000113f1ca7 [ 3167.267396][ T1070] 2 locks held by getty/8708: [ 3167.277863][ T8573] kobject: 'rx-0' (000000007a050c99): auto cleanup 'remove' event [ 3167.281003][ T1070] #0: ffff88809a49e090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3167.281041][ T1070] #1: ffffc90005f3f2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 3167.297718][ T8573] kobject: 'rx-0' (000000007a050c99): kobject_uevent_env [ 3167.304294][ T1070] 2 locks held by getty/8709: [ 3167.304299][ T1070] #0: ffff8880a4195090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3167.320356][ T8573] kobject: 'rx-0' (000000007a050c99): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3167.323100][ T1070] #1: ffffc90005f4b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 3167.327817][ T8573] kobject: 'rx-0' (000000007a050c99): auto cleanup kobject_del [ 3167.335508][ T1070] 2 locks held by getty/8710: [ 3167.351120][ T8573] kobject: 'rx-0' (000000007a050c99): calling ktype release [ 3167.354138][ T1070] #0: ffff8880958bc090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 3167.364933][ T8573] kobject: 'rx-0': free name [ 3167.365826][ T1070] #1: ffffc90005f192e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 3167.377830][ T8573] kobject: 'tx-0' (00000000197a1801): kobject_cleanup, parent 00000000113f1ca7 [ 3167.385723][ T1070] 8 locks held by kworker/u4:3/8573: [ 3167.402565][ T8573] kobject: 'tx-0' (00000000197a1801): auto cleanup 'remove' event [ 3167.402942][ T1070] 2 locks held by syz-executor.4/30210: [ 3167.407594][ T8573] kobject: 'tx-0' (00000000197a1801): kobject_uevent_env [ 3167.414810][ T1070] #0: ffffffff899f6408 (cb_lock){++++}, at: genl_rcv+0x1a/0x40 [ 3167.430462][ T8573] kobject: 'tx-0' (00000000197a1801): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3167.438391][ T1070] #1: ffffffff89bf5020 (ovs_mutex){+.+.}, at: ovs_dp_cmd_new+0x5d9/0xe30 [ 3167.454181][ T8573] kobject: 'tx-0' (00000000197a1801): auto cleanup kobject_del [ 3167.460554][ T1070] 2 locks held by syz-executor.0/30239: [ 3167.467286][ T8573] kobject: 'tx-0' (00000000197a1801): calling ktype release [ 3167.473195][ T1070] #0: ffffffff899f6408 (cb_lock){++++}, at: genl_rcv+0x1a/0x40 [ 3167.481177][ T8573] kobject: 'tx-0': free name [ 3167.499402][ T1070] #1: ffffffff89bf5020 (ovs_mutex){+.+.}, at: ovs_dp_cmd_new+0x5d9/0xe30 [ 3167.500599][ T8573] kobject: 'queues' (00000000113f1ca7): kobject_cleanup, parent 00000000555e19ca [ 3167.507772][ T1070] [ 3167.513377][ T8573] kobject: 'queues' (00000000113f1ca7): calling ktype release [ 3167.513388][ T8573] kobject: 'queues' (00000000113f1ca7): kset_release [ 3167.513406][ T8573] kobject: 'queues': free name [ 3167.514038][ T8573] kobject: '2732' (0000000023cf13f4): kobject_uevent_env [ 3167.527252][ T1070] ============================================= [ 3167.527252][ T1070] [ 3167.528630][ T8573] kobject: '2732' (0000000023cf13f4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3167.533161][ T1070] NMI backtrace for cpu 1 [ 3167.602784][ T1070] CPU: 1 PID: 1070 Comm: khungtaskd Not tainted 5.4.0-rc3+ #0 [ 3167.610226][ T1070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3167.620286][ T1070] Call Trace: [ 3167.623578][ T1070] dump_stack+0x172/0x1f0 [ 3167.627891][ T1070] nmi_cpu_backtrace.cold+0x70/0xb2 [ 3167.633074][ T1070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3167.639304][ T1070] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 3167.644938][ T1070] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 3167.650920][ T1070] arch_trigger_cpumask_backtrace+0x14/0x20 [ 3167.656806][ T1070] watchdog+0x9d0/0xef0 [ 3167.660967][ T1070] kthread+0x361/0x430 [ 3167.665033][ T1070] ? reset_hung_task_detector+0x30/0x30 [ 3167.670572][ T1070] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 3167.676284][ T1070] ret_from_fork+0x24/0x30 [ 3167.680815][ T1070] Sending NMI from CPU 1 to CPUs 0: [ 3167.686095][ C0] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0xe/0x10 [ 3167.689834][ T1070] Kernel panic - not syncing: hung_task: blocked tasks [ 3167.701198][ T1070] CPU: 1 PID: 1070 Comm: khungtaskd Not tainted 5.4.0-rc3+ #0 [ 3167.708660][ T1070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3167.718697][ T1070] Call Trace: [ 3167.721987][ T1070] dump_stack+0x172/0x1f0 [ 3167.726330][ T1070] panic+0x2e3/0x75c [ 3167.730218][ T1070] ? add_taint.cold+0x16/0x16 [ 3167.734888][ T1070] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 3167.740513][ T1070] ? ___preempt_schedule+0x16/0x20 [ 3167.745618][ T1070] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 3167.751754][ T1070] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 3167.757886][ T1070] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 3167.764027][ T1070] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 3167.770170][ T1070] watchdog+0x9e1/0xef0 [ 3167.774326][ T1070] kthread+0x361/0x430 [ 3167.778372][ T1070] ? reset_hung_task_detector+0x30/0x30 [ 3167.783897][ T1070] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 3167.789632][ T1070] ret_from_fork+0x24/0x30 [ 3167.795630][ T1070] Kernel Offset: disabled [ 3167.799966][ T1070] Rebooting in 86400 seconds..