[ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.5' (ECDSA) to the list of known hosts. 2021/03/25 21:21:13 fuzzer started 2021/03/25 21:21:13 dialing manager at 10.128.0.169:33115 2021/03/25 21:21:13 syscalls: 123 2021/03/25 21:21:13 code coverage: enabled 2021/03/25 21:21:13 comparison tracing: enabled 2021/03/25 21:21:13 extra coverage: enabled 2021/03/25 21:21:13 setuid sandbox: enabled 2021/03/25 21:21:13 namespace sandbox: enabled 2021/03/25 21:21:13 Android sandbox: /sys/fs/selinux/policy does not exist 2021/03/25 21:21:13 fault injection: enabled 2021/03/25 21:21:13 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/03/25 21:21:13 net packet injection: enabled 2021/03/25 21:21:13 net device setup: enabled 2021/03/25 21:21:13 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/03/25 21:21:13 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/03/25 21:21:13 USB emulation: enabled 2021/03/25 21:21:13 hci packet injection: enabled 2021/03/25 21:21:13 wifi device emulation: enabled 2021/03/25 21:21:13 802.15.4 emulation: enabled 2021/03/25 21:21:13 fetching corpus: 0, signal 0/2000 (executing program) 2021/03/25 21:21:14 fetching corpus: 50, signal 42968/46265 (executing program) 2021/03/25 21:21:14 fetching corpus: 100, signal 58023/62544 (executing program) 2021/03/25 21:21:14 fetching corpus: 150, signal 77773/83120 (executing program) 2021/03/25 21:21:15 fetching corpus: 200, signal 85489/91850 (executing program) 2021/03/25 21:21:15 fetching corpus: 250, signal 90080/97466 (executing program) 2021/03/25 21:21:15 fetching corpus: 300, signal 96217/104461 (executing program) 2021/03/25 21:21:15 fetching corpus: 350, signal 102993/111947 (executing program) 2021/03/25 21:21:15 fetching corpus: 400, signal 106950/116790 (executing program) 2021/03/25 21:21:16 fetching corpus: 450, signal 112307/122740 (executing program) 2021/03/25 21:21:16 fetching corpus: 500, signal 116228/127346 (executing program) 2021/03/25 21:21:16 fetching corpus: 550, signal 120055/131710 (executing program) 2021/03/25 21:21:16 fetching corpus: 600, signal 122667/135005 (executing program) 2021/03/25 21:21:17 fetching corpus: 650, signal 125987/138920 (executing program) 2021/03/25 21:21:17 fetching corpus: 700, signal 127621/141260 (executing program) 2021/03/25 21:21:17 fetching corpus: 750, signal 130396/144551 (executing program) 2021/03/25 21:21:17 fetching corpus: 800, signal 133377/147977 (executing program) syzkaller login: [ 71.151068][ T3237] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.157505][ T3237] ieee802154 phy1 wpan1: encryption failed: -22 2021/03/25 21:21:18 fetching corpus: 850, signal 137727/152501 (executing program) 2021/03/25 21:21:18 fetching corpus: 900, signal 139976/155204 (executing program) 2021/03/25 21:21:18 fetching corpus: 950, signal 142593/158154 (executing program) 2021/03/25 21:21:19 fetching corpus: 1000, signal 144822/160708 (executing program) 2021/03/25 21:21:19 fetching corpus: 1050, signal 147036/163256 (executing program) 2021/03/25 21:21:19 fetching corpus: 1100, signal 149691/166196 (executing program) 2021/03/25 21:21:19 fetching corpus: 1150, signal 151202/168121 (executing program) 2021/03/25 21:21:20 fetching corpus: 1200, signal 153339/170432 (executing program) 2021/03/25 21:21:20 fetching corpus: 1250, signal 154974/172353 (executing program) 2021/03/25 21:21:20 fetching corpus: 1300, signal 156434/174147 (executing program) 2021/03/25 21:21:20 fetching corpus: 1350, signal 157902/175946 (executing program) 2021/03/25 21:21:21 fetching corpus: 1400, signal 159385/177691 (executing program) 2021/03/25 21:21:21 fetching corpus: 1450, signal 160953/179445 (executing program) 2021/03/25 21:21:21 fetching corpus: 1500, signal 161965/180834 (executing program) 2021/03/25 21:21:21 fetching corpus: 1550, signal 163050/182242 (executing program) 2021/03/25 21:21:22 fetching corpus: 1600, signal 164279/183711 (executing program) 2021/03/25 21:21:22 fetching corpus: 1650, signal 165895/185448 (executing program) 2021/03/25 21:21:22 fetching corpus: 1700, signal 167226/186950 (executing program) 2021/03/25 21:21:22 fetching corpus: 1750, signal 168765/188572 (executing program) 2021/03/25 21:21:23 fetching corpus: 1800, signal 170260/190108 (executing program) 2021/03/25 21:21:23 fetching corpus: 1850, signal 171420/191426 (executing program) 2021/03/25 21:21:23 fetching corpus: 1900, signal 172493/192681 (executing program) 2021/03/25 21:21:23 fetching corpus: 1950, signal 173732/193970 (executing program) 2021/03/25 21:21:24 fetching corpus: 2000, signal 174729/195166 (executing program) 2021/03/25 21:21:24 fetching corpus: 2050, signal 175729/196268 (executing program) 2021/03/25 21:21:24 fetching corpus: 2100, signal 176646/197280 (executing program) 2021/03/25 21:21:24 fetching corpus: 2150, signal 177961/198541 (executing program) 2021/03/25 21:21:25 fetching corpus: 2200, signal 179170/199753 (executing program) 2021/03/25 21:21:25 fetching corpus: 2250, signal 180107/200727 (executing program) 2021/03/25 21:21:25 fetching corpus: 2300, signal 180868/201607 (executing program) 2021/03/25 21:21:26 fetching corpus: 2350, signal 182344/202894 (executing program) 2021/03/25 21:21:26 fetching corpus: 2400, signal 182977/203673 (executing program) 2021/03/25 21:21:26 fetching corpus: 2450, signal 184292/204803 (executing program) 2021/03/25 21:21:27 fetching corpus: 2500, signal 185256/205768 (executing program) 2021/03/25 21:21:27 fetching corpus: 2550, signal 186336/206737 (executing program) 2021/03/25 21:21:27 fetching corpus: 2600, signal 187145/207584 (executing program) 2021/03/25 21:21:27 fetching corpus: 2650, signal 187818/208337 (executing program) 2021/03/25 21:21:27 fetching corpus: 2700, signal 188727/209155 (executing program) 2021/03/25 21:21:28 fetching corpus: 2750, signal 189368/209845 (executing program) 2021/03/25 21:21:28 fetching corpus: 2800, signal 190357/210681 (executing program) 2021/03/25 21:21:28 fetching corpus: 2850, signal 191002/211359 (executing program) 2021/03/25 21:21:28 fetching corpus: 2900, signal 191734/212055 (executing program) 2021/03/25 21:21:29 fetching corpus: 2950, signal 192809/212934 (executing program) 2021/03/25 21:21:29 fetching corpus: 3000, signal 193520/213623 (executing program) 2021/03/25 21:21:29 fetching corpus: 3050, signal 194423/214363 (executing program) 2021/03/25 21:21:30 fetching corpus: 3100, signal 195190/215016 (executing program) 2021/03/25 21:21:30 fetching corpus: 3150, signal 195736/215552 (executing program) 2021/03/25 21:21:30 fetching corpus: 3200, signal 196393/216115 (executing program) 2021/03/25 21:21:30 fetching corpus: 3250, signal 196844/216607 (executing program) 2021/03/25 21:21:30 fetching corpus: 3300, signal 197622/217252 (executing program) 2021/03/25 21:21:31 fetching corpus: 3350, signal 198471/217925 (executing program) 2021/03/25 21:21:31 fetching corpus: 3400, signal 199176/218491 (executing program) 2021/03/25 21:21:31 fetching corpus: 3450, signal 199672/218951 (executing program) 2021/03/25 21:21:32 fetching corpus: 3500, signal 200301/219449 (executing program) 2021/03/25 21:21:32 fetching corpus: 3550, signal 200868/219927 (executing program) 2021/03/25 21:21:32 fetching corpus: 3600, signal 201421/220392 (executing program) 2021/03/25 21:21:32 fetching corpus: 3650, signal 202352/220978 (executing program) 2021/03/25 21:21:33 fetching corpus: 3700, signal 203047/221491 (executing program) 2021/03/25 21:21:33 fetching corpus: 3750, signal 203589/221936 (executing program) 2021/03/25 21:21:33 fetching corpus: 3800, signal 204121/222317 (executing program) 2021/03/25 21:21:33 fetching corpus: 3850, signal 204704/222713 (executing program) 2021/03/25 21:21:34 fetching corpus: 3900, signal 205607/223222 (executing program) 2021/03/25 21:21:34 fetching corpus: 3950, signal 206226/223597 (executing program) 2021/03/25 21:21:34 fetching corpus: 4000, signal 206806/224042 (executing program) 2021/03/25 21:21:35 fetching corpus: 4050, signal 207478/224458 (executing program) 2021/03/25 21:21:35 fetching corpus: 4100, signal 207944/224794 (executing program) 2021/03/25 21:21:35 fetching corpus: 4150, signal 208680/225208 (executing program) 2021/03/25 21:21:35 fetching corpus: 4200, signal 209150/225533 (executing program) 2021/03/25 21:21:36 fetching corpus: 4250, signal 209583/225829 (executing program) 2021/03/25 21:21:36 fetching corpus: 4300, signal 210145/226148 (executing program) 2021/03/25 21:21:36 fetching corpus: 4350, signal 210617/226422 (executing program) 2021/03/25 21:21:36 fetching corpus: 4400, signal 211221/226783 (executing program) 2021/03/25 21:21:37 fetching corpus: 4450, signal 211653/227053 (executing program) 2021/03/25 21:21:37 fetching corpus: 4500, signal 212135/227341 (executing program) 2021/03/25 21:21:37 fetching corpus: 4550, signal 212708/227647 (executing program) 2021/03/25 21:21:38 fetching corpus: 4600, signal 213167/227860 (executing program) 2021/03/25 21:21:38 fetching corpus: 4650, signal 213577/228099 (executing program) 2021/03/25 21:21:38 fetching corpus: 4700, signal 214078/228338 (executing program) 2021/03/25 21:21:38 fetching corpus: 4750, signal 214474/228566 (executing program) 2021/03/25 21:21:39 fetching corpus: 4800, signal 214858/228765 (executing program) 2021/03/25 21:21:39 fetching corpus: 4850, signal 215268/228977 (executing program) 2021/03/25 21:21:39 fetching corpus: 4900, signal 215735/229190 (executing program) 2021/03/25 21:21:39 fetching corpus: 4950, signal 216047/229341 (executing program) 2021/03/25 21:21:40 fetching corpus: 5000, signal 216657/229562 (executing program) 2021/03/25 21:21:40 fetching corpus: 5050, signal 216975/229700 (executing program) 2021/03/25 21:21:40 fetching corpus: 5100, signal 217331/229888 (executing program) 2021/03/25 21:21:40 fetching corpus: 5150, signal 217884/230065 (executing program) 2021/03/25 21:21:41 fetching corpus: 5200, signal 218350/230233 (executing program) 2021/03/25 21:21:41 fetching corpus: 5250, signal 218709/230362 (executing program) 2021/03/25 21:21:41 fetching corpus: 5300, signal 219160/230515 (executing program) 2021/03/25 21:21:41 fetching corpus: 5350, signal 219610/230641 (executing program) 2021/03/25 21:21:42 fetching corpus: 5400, signal 220311/230779 (executing program) 2021/03/25 21:21:42 fetching corpus: 5450, signal 221068/230890 (executing program) 2021/03/25 21:21:43 fetching corpus: 5500, signal 221372/230997 (executing program) 2021/03/25 21:21:43 fetching corpus: 5550, signal 221884/231099 (executing program) 2021/03/25 21:21:43 fetching corpus: 5600, signal 222241/231229 (executing program) 2021/03/25 21:21:44 fetching corpus: 5650, signal 222618/231309 (executing program) 2021/03/25 21:21:44 fetching corpus: 5700, signal 223054/231309 (executing program) 2021/03/25 21:21:44 fetching corpus: 5750, signal 223444/231309 (executing program) 2021/03/25 21:21:44 fetching corpus: 5800, signal 223834/231309 (executing program) 2021/03/25 21:21:45 fetching corpus: 5850, signal 224129/231309 (executing program) 2021/03/25 21:21:45 fetching corpus: 5900, signal 224425/231315 (executing program) 2021/03/25 21:21:45 fetching corpus: 5949, signal 224709/231320 (executing program) 2021/03/25 21:21:45 fetching corpus: 5999, signal 225078/231323 (executing program) 2021/03/25 21:21:45 fetching corpus: 6049, signal 225456/231323 (executing program) 2021/03/25 21:21:46 fetching corpus: 6099, signal 225705/231323 (executing program) 2021/03/25 21:21:46 fetching corpus: 6149, signal 226064/231325 (executing program) 2021/03/25 21:21:46 fetching corpus: 6198, signal 226325/231329 (executing program) 2021/03/25 21:21:46 fetching corpus: 6248, signal 226728/231329 (executing program) 2021/03/25 21:21:47 fetching corpus: 6298, signal 227102/231329 (executing program) 2021/03/25 21:21:47 fetching corpus: 6348, signal 227517/231329 (executing program) 2021/03/25 21:21:47 fetching corpus: 6387, signal 227712/231329 (executing program) 2021/03/25 21:21:47 fetching corpus: 6387, signal 227712/231329 (executing program) 2021/03/25 21:21:48 starting 6 fuzzer processes 21:21:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000013008105e00480e4dbc0b5f207c804a01e000000302e20000000a3030e000cc0090002000521ce204b10", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 21:21:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f000000f640)={&(0x7f000000f4c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0xb0841b2e36385d41, 0x61, 0x1e]}}, &(0x7f000000f580)=""/139, 0x2b, 0x8b, 0x1}, 0x20) 21:21:49 executing program 2: perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:21:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x40, 0x0, 0x4, 0x8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000000)) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={r0}) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = getpid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001640)='cgroup.stat\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x4001, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004019) close(r0) 21:21:49 executing program 4: socket$kcm(0x2c, 0x3, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c00050001832c001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 21:21:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e0000001a008104e00f80ecdb4cb9020a000004a1dc556a6c3255200e000200810040fb12000100040fda1b40d8", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 103.362137][ T8410] IPVS: ftp: loaded support on port[0] = 21 [ 103.548090][ T8412] IPVS: ftp: loaded support on port[0] = 21 [ 103.767569][ T8414] IPVS: ftp: loaded support on port[0] = 21 [ 103.791490][ T8410] chnl_net:caif_netlink_parms(): no params data found [ 103.935715][ T8410] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.947869][ T8410] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.957272][ T8410] device bridge_slave_0 entered promiscuous mode [ 103.989344][ T8410] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.000410][ T8410] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.009392][ T8410] device bridge_slave_1 entered promiscuous mode [ 104.024624][ T8412] chnl_net:caif_netlink_parms(): no params data found [ 104.121807][ T8416] IPVS: ftp: loaded support on port[0] = 21 [ 104.141843][ T8410] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 104.157706][ T8412] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.164788][ T8412] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.182494][ T8412] device bridge_slave_0 entered promiscuous mode [ 104.192448][ T8410] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 104.223392][ T8412] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.230636][ T8412] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.241931][ T8412] device bridge_slave_1 entered promiscuous mode [ 104.337726][ T8410] team0: Port device team_slave_0 added [ 104.357252][ T8412] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 104.387439][ T8410] team0: Port device team_slave_1 added [ 104.394638][ T8412] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 104.411154][ T8418] IPVS: ftp: loaded support on port[0] = 21 [ 104.472043][ T8412] team0: Port device team_slave_0 added [ 104.519314][ T8412] team0: Port device team_slave_1 added [ 104.534089][ T8410] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 104.541500][ T8410] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 104.569377][ T8410] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 104.601391][ T8410] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 104.609184][ T8410] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 104.636192][ T8410] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 104.658807][ T8414] chnl_net:caif_netlink_parms(): no params data found [ 104.709817][ T8412] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 104.720760][ T8412] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 104.748394][ T8412] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 104.762662][ T8412] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 104.770784][ T8412] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 104.797565][ T8412] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 104.898902][ T8416] chnl_net:caif_netlink_parms(): no params data found [ 104.975221][ T8410] device hsr_slave_0 entered promiscuous mode [ 104.992235][ T8410] device hsr_slave_1 entered promiscuous mode [ 105.018909][ T8552] IPVS: ftp: loaded support on port[0] = 21 [ 105.039977][ T8412] device hsr_slave_0 entered promiscuous mode [ 105.050682][ T8412] device hsr_slave_1 entered promiscuous mode [ 105.059105][ T8412] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 105.067876][ T8412] Cannot create hsr debugfs directory [ 105.097884][ T8414] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.104971][ T8414] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.118499][ T8414] device bridge_slave_0 entered promiscuous mode [ 105.174096][ T8414] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.181524][ T8414] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.191083][ T8414] device bridge_slave_1 entered promiscuous mode [ 105.278955][ T8414] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 105.317472][ T4885] Bluetooth: hci0: command 0x0409 tx timeout [ 105.324688][ T8416] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.341133][ T8416] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.350762][ T8416] device bridge_slave_0 entered promiscuous mode [ 105.361871][ T8414] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 105.384213][ T8416] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.398101][ T8416] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.407542][ T8416] device bridge_slave_1 entered promiscuous mode [ 105.454397][ T8418] chnl_net:caif_netlink_parms(): no params data found [ 105.488444][ T8416] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 105.502400][ T8416] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 105.520216][ T8414] team0: Port device team_slave_0 added [ 105.533106][ T8414] team0: Port device team_slave_1 added [ 105.562031][ T36] Bluetooth: hci1: command 0x0409 tx timeout [ 105.635349][ T8416] team0: Port device team_slave_0 added [ 105.704548][ T8416] team0: Port device team_slave_1 added [ 105.720810][ T8414] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 105.729474][ T8414] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 105.755880][ T8414] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 105.782020][ T8414] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 105.789165][ T3793] Bluetooth: hci2: command 0x0409 tx timeout [ 105.794282][ T8414] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 105.823201][ T8414] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 105.853275][ T8416] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 105.863178][ T8416] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 105.890596][ T8416] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 105.903721][ T8416] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 105.910884][ T8416] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 105.937658][ T8416] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 105.957503][ T8552] chnl_net:caif_netlink_parms(): no params data found [ 105.968742][ T8418] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.976042][ T8418] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.983838][ T8418] device bridge_slave_0 entered promiscuous mode [ 106.019666][ T8418] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.027379][ T8418] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.035074][ T8418] device bridge_slave_1 entered promiscuous mode [ 106.035776][ T3167] Bluetooth: hci3: command 0x0409 tx timeout [ 106.079299][ T8414] device hsr_slave_0 entered promiscuous mode [ 106.090054][ T8414] device hsr_slave_1 entered promiscuous mode [ 106.097717][ T8414] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 106.105283][ T8414] Cannot create hsr debugfs directory [ 106.148164][ T8416] device hsr_slave_0 entered promiscuous mode [ 106.156352][ T8416] device hsr_slave_1 entered promiscuous mode [ 106.163006][ T8416] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 106.172299][ T8416] Cannot create hsr debugfs directory [ 106.181278][ T8412] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 106.226341][ T8412] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 106.244431][ T8412] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 106.257685][ T8418] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 106.290637][ T8412] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 106.304238][ T8418] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 106.345942][ T3793] Bluetooth: hci4: command 0x0409 tx timeout [ 106.377444][ T8552] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.384692][ T8552] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.394777][ T8552] device bridge_slave_0 entered promiscuous mode [ 106.403879][ T8410] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 106.452166][ T8552] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.460841][ T8552] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.469593][ T8552] device bridge_slave_1 entered promiscuous mode [ 106.486578][ T8410] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 106.501791][ T8418] team0: Port device team_slave_0 added [ 106.513863][ T8418] team0: Port device team_slave_1 added [ 106.536703][ T8410] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 106.574489][ T8552] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 106.588667][ T8552] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 106.611508][ T8410] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 106.627229][ T8418] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 106.634200][ T8418] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 106.660745][ T8418] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 106.684769][ T8418] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 106.693675][ T8418] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 106.722135][ T8418] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 106.736633][ T8552] team0: Port device team_slave_0 added [ 106.762557][ T8552] team0: Port device team_slave_1 added [ 106.795163][ T8552] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 106.803431][ T8552] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 106.831478][ T8552] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 106.885906][ T8552] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 106.892890][ T8552] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 106.905624][ T36] Bluetooth: hci5: command 0x0409 tx timeout [ 106.928694][ T8552] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 106.964238][ T8418] device hsr_slave_0 entered promiscuous mode [ 106.971451][ T8418] device hsr_slave_1 entered promiscuous mode [ 106.980086][ T8418] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 106.994021][ T8418] Cannot create hsr debugfs directory [ 107.036567][ T8412] 8021q: adding VLAN 0 to HW filter on device bond0 [ 107.052056][ T8552] device hsr_slave_0 entered promiscuous mode [ 107.060311][ T8552] device hsr_slave_1 entered promiscuous mode [ 107.067661][ T8552] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 107.075280][ T8552] Cannot create hsr debugfs directory [ 107.151680][ T8412] 8021q: adding VLAN 0 to HW filter on device team0 [ 107.187654][ T9511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 107.203459][ T9511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.236384][ T3167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 107.245049][ T3167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.262817][ T3167] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.270218][ T3167] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.281421][ T8416] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 107.316259][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 107.324691][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 107.334371][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.343570][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.350826][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.361401][ T8416] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 107.395975][ T5] Bluetooth: hci0: command 0x041b tx timeout [ 107.416052][ T8416] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 107.435226][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 107.448160][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 107.471012][ T8416] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 107.483568][ T8414] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 107.507364][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 107.516754][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 107.532357][ T8410] 8021q: adding VLAN 0 to HW filter on device bond0 [ 107.547491][ T8414] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 107.566288][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 107.576080][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 107.584940][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 107.603026][ T8414] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 107.625995][ T5] Bluetooth: hci1: command 0x041b tx timeout [ 107.637148][ T3793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 107.649085][ T3793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.674853][ T8410] 8021q: adding VLAN 0 to HW filter on device team0 [ 107.694589][ T8414] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 107.713614][ T8412] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 107.724866][ T8412] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 107.739673][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 107.748833][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.757380][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 107.767102][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.810384][ T9511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 107.835170][ T9511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.847904][ T9511] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.854998][ T9511] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.863712][ T9511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 107.865601][ T9683] Bluetooth: hci2: command 0x041b tx timeout [ 107.873012][ T9511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.887289][ T9511] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.894366][ T9511] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.906495][ T8552] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 107.919909][ T8552] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 107.947053][ T8412] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.977993][ T9511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 107.988756][ T9511] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 107.997528][ T9511] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 108.004974][ T9511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 108.014195][ T9511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 108.024688][ T8552] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 108.046989][ T8552] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 108.086440][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 108.097563][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 108.106990][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 108.117942][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 108.127328][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 108.135130][ T36] Bluetooth: hci3: command 0x041b tx timeout [ 108.184850][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 108.204747][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 108.214000][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 108.227680][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.238574][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 108.249569][ T36] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 108.278955][ T8418] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 108.292726][ T8410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 108.312212][ T8418] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 108.336749][ T8418] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 108.355368][ T8412] device veth0_vlan entered promiscuous mode [ 108.374053][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 108.382788][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.392565][ T8418] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 108.412015][ T8412] device veth1_vlan entered promiscuous mode [ 108.425574][ T36] Bluetooth: hci4: command 0x041b tx timeout [ 108.438605][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.446931][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.454778][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 108.463690][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 108.498285][ T8416] 8021q: adding VLAN 0 to HW filter on device bond0 [ 108.525721][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 108.533249][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 108.554443][ T8416] 8021q: adding VLAN 0 to HW filter on device team0 [ 108.573646][ T8414] 8021q: adding VLAN 0 to HW filter on device bond0 [ 108.584008][ T8410] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 108.593085][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 108.606516][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.657839][ T8412] device veth0_macvtap entered promiscuous mode [ 108.665917][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 108.674410][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 108.685161][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 108.693221][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.701727][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 108.711814][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 108.721010][ T9712] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.728156][ T9712] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.737719][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 108.746475][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 108.756868][ T8414] 8021q: adding VLAN 0 to HW filter on device team0 [ 108.777157][ T8412] device veth1_macvtap entered promiscuous mode [ 108.786643][ T8552] 8021q: adding VLAN 0 to HW filter on device bond0 [ 108.845779][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 108.853687][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 108.864688][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 108.874118][ T9712] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.881241][ T9712] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.890159][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 108.899235][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 108.908798][ T9712] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.915952][ T9712] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.924355][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 108.933585][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 108.942461][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 108.951888][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 108.960621][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 108.969518][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 108.978707][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 108.985714][ T9683] Bluetooth: hci5: command 0x041b tx timeout [ 108.987741][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 109.001312][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.010768][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.019872][ T9712] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.027029][ T9712] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.034641][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 109.045880][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 109.053824][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 109.082896][ T8552] 8021q: adding VLAN 0 to HW filter on device team0 [ 109.132091][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.141635][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.150674][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 109.160486][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.169312][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 109.178119][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.188220][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 109.197601][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 109.207450][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 109.216888][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 109.225075][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.234125][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.243675][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.252774][ T9683] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.259929][ T9683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.270162][ T8416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 109.283141][ T8412] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 109.309495][ T8418] 8021q: adding VLAN 0 to HW filter on device bond0 [ 109.317255][ T8410] device veth0_vlan entered promiscuous mode [ 109.327330][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 109.337058][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 109.346777][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.354889][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 109.363630][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 109.372982][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 109.382951][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.392384][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.401667][ T9683] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.408794][ T9683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.417706][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 109.426761][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 109.440393][ T8412] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 109.471560][ T8410] device veth1_vlan entered promiscuous mode [ 109.477968][ T3793] Bluetooth: hci0: command 0x040f tx timeout [ 109.494596][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 109.503758][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 109.513020][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 109.528060][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.537178][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.544793][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 109.554150][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 109.564391][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.584810][ T8412] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.602207][ T8412] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.613429][ T8412] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.630707][ T8412] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.649619][ T8418] 8021q: adding VLAN 0 to HW filter on device team0 [ 109.665734][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 109.674513][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 109.684472][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 109.693486][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 109.703842][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 109.712370][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 109.721436][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.731701][ T9092] Bluetooth: hci1: command 0x040f tx timeout [ 109.763585][ T8416] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 109.780869][ T9700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.791082][ T9700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.800545][ T9700] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.807691][ T9700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.816589][ T9700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.825243][ T9700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.833712][ T9700] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.840826][ T9700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.850573][ T9700] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 109.858554][ T9700] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 109.868684][ T9700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 109.878012][ T9700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.886932][ T9700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 109.895740][ T9700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.903955][ T9700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 109.913932][ T9700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 109.937628][ T8414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 109.946405][ T36] Bluetooth: hci2: command 0x040f tx timeout [ 109.988458][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 109.999926][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 110.012335][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 110.022904][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 110.032967][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 110.042684][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 110.053819][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 110.065833][ T8552] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 110.101655][ T8418] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 110.144413][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 110.173215][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 110.181434][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 110.192279][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 110.203435][ T9683] Bluetooth: hci3: command 0x040f tx timeout [ 110.243190][ T8410] device veth0_macvtap entered promiscuous mode [ 110.271180][ T8410] device veth1_macvtap entered promiscuous mode [ 110.281337][ T3793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 110.291297][ T3793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 110.300604][ T3793] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 110.309078][ T3793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 110.318361][ T3793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 110.327998][ T3793] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 110.378955][ T8414] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 110.406352][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 110.413848][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 110.506473][ T9683] Bluetooth: hci4: command 0x040f tx timeout [ 110.532177][ T8552] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 110.544733][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 110.566277][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 110.573900][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 110.583146][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 110.595590][ T264] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 110.599844][ T8418] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 110.626331][ T8410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 110.648774][ T264] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 110.659016][ T8410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 110.671933][ T8410] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 110.693235][ T8416] device veth0_vlan entered promiscuous mode [ 110.727137][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 110.754081][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 110.765009][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 110.778459][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 110.788365][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 110.798539][ T8410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 110.809555][ T8410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 110.821997][ T8410] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 110.852757][ T8416] device veth1_vlan entered promiscuous mode [ 110.872796][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.881241][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 110.901706][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 110.916438][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 110.924979][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 110.941379][ T8410] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.950850][ T8410] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.960062][ T8410] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.969512][ T8410] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 111.013209][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 111.024719][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 111.039612][ T9092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 111.066404][ T36] Bluetooth: hci5: command 0x040f tx timeout [ 111.076836][ T247] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 111.091464][ T247] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 111.091481][ T8414] device veth0_vlan entered promiscuous mode [ 111.112736][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 111.121629][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 111.131037][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 111.142993][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 111.153041][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 111.163220][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 111.171712][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 111.193934][ T8416] device veth0_macvtap entered promiscuous mode [ 111.231378][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 111.243181][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 111.254452][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 111.264410][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 111.275327][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 111.288138][ T8416] device veth1_macvtap entered promiscuous mode 21:21:58 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x5, &(0x7f00000000c0), 0x10) [ 111.338767][ T8414] device veth1_vlan entered promiscuous mode [ 111.358628][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 111.376113][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 111.384632][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 111.400164][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 111.424489][ T8416] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 111.442536][ T8416] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 111.457707][ T8416] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 111.475616][ T8416] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 21:21:58 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x5, &(0x7f00000000c0), 0x10) [ 111.491927][ T8416] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 111.531000][ T8552] device veth0_vlan entered promiscuous mode [ 111.545987][ T36] Bluetooth: hci0: command 0x0419 tx timeout [ 111.549181][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 111.569833][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 111.593516][ T8416] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 111.618722][ T8416] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 21:21:58 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x5, &(0x7f00000000c0), 0x10) [ 111.640304][ T8416] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 111.656086][ T8416] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 111.669199][ T8416] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 111.706737][ T8552] device veth1_vlan entered promiscuous mode [ 111.722507][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 111.739547][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 21:21:58 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x5, &(0x7f00000000c0), 0x10) [ 111.754734][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 111.769145][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 111.785538][ T36] Bluetooth: hci1: command 0x0419 tx timeout [ 111.792247][ T9511] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 111.811267][ T9511] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 111.830605][ T8418] device veth0_vlan entered promiscuous mode [ 111.863141][ T8416] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 111.873710][ T215] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 111.895175][ T215] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 111.906536][ T8416] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 111.927368][ T8416] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 111.944296][ T8416] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 111.984822][ T3793] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 112.009293][ T8418] device veth1_vlan entered promiscuous mode 21:21:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x3, 0x1f}]}, @fwd={0x8}, @struct={0x0, 0x0, 0x0, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000001540)=""/4096, 0x52, 0x1000, 0x1}, 0x20) [ 112.029637][ T9724] Bluetooth: hci2: command 0x0419 tx timeout [ 112.056658][ T3793] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 112.067506][ T3793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 112.078058][ T3793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 112.089676][ T264] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 112.121655][ T264] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 112.136996][ T8414] device veth0_macvtap entered promiscuous mode 21:21:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x3, 0x1f}]}, @fwd={0x8}, @struct={0x0, 0x0, 0x0, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000001540)=""/4096, 0x52, 0x1000, 0x1}, 0x20) [ 112.196296][ T9724] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 112.206465][ T9724] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 112.228210][ T9724] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 112.248549][ T9724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 112.270290][ T9724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 112.289225][ T8552] device veth0_macvtap entered promiscuous mode [ 112.300640][ T9794] Bluetooth: hci3: command 0x0419 tx timeout [ 112.328057][ T8414] device veth1_macvtap entered promiscuous mode [ 112.405649][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 112.413731][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 112.426108][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 112.435542][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 112.447933][ T8552] device veth1_macvtap entered promiscuous mode 21:21:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000013008105e00480e4dbc0b5f207c804a01e000000302e20000000a3030e000cc0090002000521ce204b10", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 21:21:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x3, 0x1f}]}, @fwd={0x8}, @struct={0x0, 0x0, 0x0, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000001540)=""/4096, 0x52, 0x1000, 0x1}, 0x20) [ 112.465924][ T9803] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 112.491973][ T8418] device veth0_macvtap entered promiscuous mode [ 112.565653][ T8418] device veth1_macvtap entered promiscuous mode [ 112.588179][ T8414] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 112.595129][ T123] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 112.604324][ T9724] Bluetooth: hci4: command 0x0419 tx timeout [ 112.627422][ T8414] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 112.656488][ T8414] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 112.674501][ T8414] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 112.690486][ T123] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 112.703312][ T8414] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 112.728093][ T8414] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 112.740792][ T8414] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 112.754412][ T8552] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 112.777424][ T8552] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 112.794445][ T8552] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 112.814579][ T8552] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 112.836160][ T8552] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 112.854312][ T8552] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 112.875378][ T8552] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 112.887081][ T8552] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 112.899598][ T8552] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 112.917884][ T9817] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 112.953315][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 112.966372][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 112.985484][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 113.015652][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 113.024412][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 113.034143][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 113.051514][ T8418] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 113.065995][ T8418] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.085395][ T8418] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 113.115581][ T8418] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.126097][ T8418] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 113.137033][ T8418] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.145083][ T9683] Bluetooth: hci5: command 0x0419 tx timeout [ 113.152004][ T8418] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 113.169081][ T8418] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.180378][ T8418] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 113.191605][ T8418] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.204154][ T8418] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 113.214559][ T8414] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.229563][ T8414] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.239458][ T8414] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.250184][ T8414] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.260334][ T8414] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.270833][ T8414] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.284058][ T8414] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 113.306498][ T8552] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.319980][ T8552] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.332376][ T8552] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.343284][ T8552] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.354171][ T8552] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.364961][ T8552] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.375037][ T8552] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.386771][ T8552] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.399520][ T8552] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 113.407809][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 113.421270][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 113.430911][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 113.440752][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 113.449845][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 113.458906][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 113.470054][ T8418] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.481141][ T8418] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.491718][ T8418] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.503358][ T8418] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.514264][ T8418] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.526058][ T8418] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.536424][ T8418] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.547923][ T8418] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.557887][ T8418] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 113.568388][ T8418] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 113.579657][ T8418] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 113.593112][ T8414] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.601997][ T8414] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.610874][ T8414] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.621750][ T8414] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.639619][ T8552] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.649755][ T8552] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.659351][ T8552] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.668294][ T8552] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.679576][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 113.688642][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 113.701687][ T247] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 113.706888][ T8418] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.714532][ T247] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 113.722820][ T8418] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.737594][ T8418] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.746982][ T8418] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.783481][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 113.985977][ C0] hrtimer: interrupt took 33745 ns [ 114.049840][ T264] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 114.060026][ T215] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 114.078485][ T215] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 114.096305][ T264] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 114.111802][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 114.181068][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 114.261467][ T264] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 114.336655][ T264] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 114.383395][ T54] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 114.394111][ T9767] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 114.410024][ T54] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 114.464317][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 114.548618][ T123] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 114.578198][ T123] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 114.605890][ T9712] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 114.660470][ T54] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 114.700115][ T54] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 114.712912][ T9890] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'. [ 114.727688][ T4885] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 21:22:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x40, 0x0, 0x4, 0x8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000000)) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={r0}) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = getpid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001640)='cgroup.stat\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x4001, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004019) close(r0) 21:22:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x3, 0x1f}]}, @fwd={0x8}, @struct={0x0, 0x0, 0x0, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000001540)=""/4096, 0x52, 0x1000, 0x1}, 0x20) 21:22:01 executing program 4: socket$kcm(0x2c, 0x3, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c00050001832c001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 21:22:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000013008105e00480e4dbc0b5f207c804a01e000000302e20000000a3030e000cc0090002000521ce204b10", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 21:22:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x40, 0x0, 0x4, 0x8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000000)) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={r0}) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = getpid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001640)='cgroup.stat\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x4001, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004019) close(r0) 21:22:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e0000001a008104e00f80ecdb4cb9020a000004a1dc556a6c3255200e000200810040fb12000100040fda1b40d8", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 21:22:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x40, 0x0, 0x4, 0x8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000000)) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={r0}) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = getpid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001640)='cgroup.stat\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x4001, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004019) close(r0) [ 115.058650][ T9907] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'. [ 115.077096][ T9908] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 21:22:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x40, 0x0, 0x4, 0x8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000000)) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={r0}) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = getpid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001640)='cgroup.stat\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x4001, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004019) close(r0) 21:22:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e0000001a008104e00f80ecdb4cb9020a000004a1dc556a6c3255200e000200810040fb12000100040fda1b40d8", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 21:22:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x40, 0x0, 0x4, 0x8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000000)) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={r0}) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = getpid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001640)='cgroup.stat\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x4001, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004019) close(r0) 21:22:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x40, 0x0, 0x4, 0x8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000000)) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={r0}) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = getpid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001640)='cgroup.stat\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x4001, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004019) close(r0) 21:22:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000013008105e00480e4dbc0b5f207c804a01e000000302e20000000a3030e000cc0090002000521ce204b10", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 21:22:02 executing program 4: socket$kcm(0x2c, 0x3, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c00050001832c001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) [ 115.505366][ T9921] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'. 21:22:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x40, 0x0, 0x4, 0x8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000000)) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={r0}) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = getpid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001640)='cgroup.stat\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x4001, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004019) close(r0) 21:22:02 executing program 4: socket$kcm(0x2c, 0x3, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="39000000140081ae10003c00050001832c001f9f660fcf065b05acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) 21:22:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e0000001a008104e00f80ecdb4cb9020a000004a1dc556a6c3255200e000200810040fb12000100040fda1b40d8", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 21:22:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x40, 0x0, 0x4, 0x8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000000)) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={r0}) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = getpid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001640)='cgroup.stat\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x4001, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004019) close(r0) 21:22:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x40, 0x0, 0x4, 0x8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000000)) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={r0}) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = getpid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001640)='cgroup.stat\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x4001, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004019) close(r0) [ 115.811824][ T9936] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'. 21:22:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8000, 0x5, 0x8c}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r0, 0x0}, 0x20) 21:22:02 executing program 4: mkdir(&(0x7f000000d900)='./file0\x00', 0x0) 21:22:02 executing program 2: perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) socket$kcm(0xa, 0x3, 0x11) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x84) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000007780)={&(0x7f0000000000)=@caif, 0x80, 0x0}, 0x0) 21:22:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf921e884bf496dca5d2b316da4f0de8163f6242fa7323f1740637c48468766af540439fce41f144631ac262dcae08c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x139}, 0x48) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d67514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70ebec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c8a14195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd11747ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd4fad615ff6e2991589bbdd1ae0d1bce65c620c4a2527a82afe16e019a5e0b5ec1b1b8aafba090000c3630488edcc4a8cbd3246e962b773a75b28a51cd09cbcb3577fea6f1e9fe8cd2b532c084cbd051b4aeaf0e7813354f14a453b093948d49bca31a7170419bb1d32f256ff3010e69b2f0482c63ab78a74dec8b19ca76e7fdf29766d96e4c2f57ba917f0abd5253e87fbe5b86a4b9151c316df3925d86899ab3e2036f4866e277d82829165922f8aeb4ea2b9db2dbb6a6b157d4019545e00028d09608ef2e186fd216ce84d913813e1be50f5b6b98d5dab8d5fe3dc100d8b6cf41c29b550f45d68a627db8335fd97bd633694ebb6173d9474c50c0360daa387ba5da3e092463a4c08f2c686ca2ab5f8c62353b8f2c81700000000297c8161e5c939855271fe95df690f658da38153646e660e9ba212986cd3628a500d14d378d4af508f428ecb0e85322f9fd317b29ec23b193b1ded2824dc90eeea4c56a676609d2f9e6b925cc413cde5414869387f23a309fe29c7e63101fec34b22aae77bd5df5f6181f5b4639119fc5446893479e7907e2eedfd728963537e45e01cd99203cc1f28fb06e5f5a6c96ef934e8"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0x19, 0x0, &(0x7f0000000100)="280e003f4305607e5bc5795e6558000800ffffffba0e7200ff", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) 21:22:03 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0xa8}, [@ldst={0x5, 0x2}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 21:22:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8000, 0x5, 0x8c}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r0, 0x0}, 0x20) 21:22:03 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0xa, 0x1, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='wlan1\x00%\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={r4, r3}) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9(\xee\x8aG\xdd2') r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x3) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="884dbe763afa49b13bdfe464ed850eaa3550822badac4a1440cb946d3d454e33720f74aa2f8ae64ae41ab208bb685f4afa2d3fdcdcd2c2ce0bee9aa81e1707e7990acbaa499aeccfebb31562eb6473dbbb915ab112fc849837ded004f3cf6585b6f69421b7704e740d25c742ca7a93d83237f42967b52c8554346793e90a01865a6c4e43e406f582aae46b1532b2c5015edd3588c74ba9e18e04b2e6713f8ef9e95cef49f2bca7fe5a8c8352d9f8ace94131f537b8d8a510c47f9a8940d0d8120630cd19"], 0xa) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000bb40)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="18fb240000ecdb290017000000850000000001fc2405220000000000000000000000000000000000707fa3d3b820d7bb6ddd27f43740df9b54e463c9357f42b008d6109b3530512134749463027b61b966a67d8fce8718c3273fd6e8f66a0fb765060f9a93d35c4a3306f0d8b79d3c9e8866853bd1588e2980b7c0f4a09fa6859efa0d7a97f774c659a3de9b99d7487c2a5427d02fd8"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) 21:22:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8000, 0x5, 0x8c}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r0, 0x0}, 0x20) 21:22:03 executing program 3: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)="e6fea42204cb612c4a94b331bad06a5572", 0x0, 0x0, 0x1}, 0x38) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x00'}) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454de, 0xffffffffffffffff) 21:22:03 executing program 2: perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) socket$kcm(0xa, 0x3, 0x11) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x84) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000007780)={&(0x7f0000000000)=@caif, 0x80, 0x0}, 0x0) 21:22:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8000, 0x5, 0x8c}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r0, 0x0}, 0x20) [ 116.551348][ T9963] device wlan1 entered promiscuous mode [ 116.726674][ T9958] device wlan1 left promiscuous mode 21:22:03 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x78, 0x0, 0x0) 21:22:03 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x78, 0x0, 0x0) 21:22:04 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x78, 0x0, 0x0) 21:22:04 executing program 2: perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) socket$kcm(0xa, 0x3, 0x11) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x84) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000007780)={&(0x7f0000000000)=@caif, 0x80, 0x0}, 0x0) 21:22:04 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf921e884bf496dca5d2b316da4f0de8163f6242fa7323f1740637c48468766af540439fce41f144631ac262dcae08c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x139}, 0x48) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0x19, 0x0, &(0x7f0000000100)="280e003f4305607e5bc5795e6558000800ffffffba0e7200ff", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) 21:22:04 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0xa, 0x1, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='wlan1\x00%\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={r4, r3}) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9(\xee\x8aG\xdd2') r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x3) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="884dbe763afa49b13bdfe464ed850eaa3550822badac4a1440cb946d3d454e33720f74aa2f8ae64ae41ab208bb685f4afa2d3fdcdcd2c2ce0bee9aa81e1707e7990acbaa499aeccfebb31562eb6473dbbb915ab112fc849837ded004f3cf6585b6f69421b7704e740d25c742ca7a93d83237f42967b52c8554346793e90a01865a6c4e43e406f582aae46b1532b2c5015edd3588c74ba9e18e04b2e6713f8ef9e95cef49f2bca7fe5a8c8352d9f8ace94131f537b8d8a510c47f9a8940d0d8120630cd19"], 0xa) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000bb40)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="18fb240000ecdb290017000000850000000001fc2405220000000000000000000000000000000000707fa3d3b820d7bb6ddd27f43740df9b54e463c9357f42b008d6109b3530512134749463027b61b966a67d8fce8718c3273fd6e8f66a0fb765060f9a93d35c4a3306f0d8b79d3c9e8866853bd1588e2980b7c0f4a09fa6859efa0d7a97f774c659a3de9b99d7487c2a5427d02fd8"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) 21:22:04 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x78, 0x0, 0x0) 21:22:04 executing program 2: perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) socket$kcm(0xa, 0x3, 0x11) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) socket$kcm(0x2, 0x3, 0x84) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000007780)={&(0x7f0000000000)=@caif, 0x80, 0x0}, 0x0) 21:22:04 executing program 3: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)="e6fea42204cb612c4a94b331bad06a5572", 0x0, 0x0, 0x1}, 0x38) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x00'}) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454de, 0xffffffffffffffff) 21:22:04 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0xa8}, [@ldst={0x5, 0x2}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 21:22:04 executing program 0: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)="e6fea42204cb612c4a94b331bad06a5572", 0x0, 0x0, 0x1}, 0x38) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x00'}) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454de, 0xffffffffffffffff) 21:22:04 executing program 3: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)="e6fea42204cb612c4a94b331bad06a5572", 0x0, 0x0, 0x1}, 0x38) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x00'}) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454de, 0xffffffffffffffff) 21:22:04 executing program 2: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0xa, 0x1, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='wlan1\x00%\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={r4, r3}) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9(\xee\x8aG\xdd2') r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x3) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="884dbe763afa49b13bdfe464ed850eaa3550822badac4a1440cb946d3d454e33720f74aa2f8ae64ae41ab208bb685f4afa2d3fdcdcd2c2ce0bee9aa81e1707e7990acbaa499aeccfebb31562eb6473dbbb915ab112fc849837ded004f3cf6585b6f69421b7704e740d25c742ca7a93d83237f42967b52c8554346793e90a01865a6c4e43e406f582aae46b1532b2c5015edd3588c74ba9e18e04b2e6713f8ef9e95cef49f2bca7fe5a8c8352d9f8ace94131f537b8d8a510c47f9a8940d0d8120630cd19"], 0xa) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000bb40)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="18fb240000ecdb290017000000850000000001fc2405220000000000000000000000000000000000707fa3d3b820d7bb6ddd27f43740df9b54e463c9357f42b008d6109b3530512134749463027b61b966a67d8fce8718c3273fd6e8f66a0fb765060f9a93d35c4a3306f0d8b79d3c9e8866853bd1588e2980b7c0f4a09fa6859efa0d7a97f774c659a3de9b99d7487c2a5427d02fd8"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) [ 117.880858][T10005] device wlan1 entered promiscuous mode 21:22:04 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0xa, 0x1, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='wlan1\x00%\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={r4, r3}) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9(\xee\x8aG\xdd2') r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x3) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="884dbe763afa49b13bdfe464ed850eaa3550822badac4a1440cb946d3d454e33720f74aa2f8ae64ae41ab208bb685f4afa2d3fdcdcd2c2ce0bee9aa81e1707e7990acbaa499aeccfebb31562eb6473dbbb915ab112fc849837ded004f3cf6585b6f69421b7704e740d25c742ca7a93d83237f42967b52c8554346793e90a01865a6c4e43e406f582aae46b1532b2c5015edd3588c74ba9e18e04b2e6713f8ef9e95cef49f2bca7fe5a8c8352d9f8ace94131f537b8d8a510c47f9a8940d0d8120630cd19"], 0xa) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000bb40)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="18fb240000ecdb290017000000850000000001fc2405220000000000000000000000000000000000707fa3d3b820d7bb6ddd27f43740df9b54e463c9357f42b008d6109b3530512134749463027b61b966a67d8fce8718c3273fd6e8f66a0fb765060f9a93d35c4a3306f0d8b79d3c9e8866853bd1588e2980b7c0f4a09fa6859efa0d7a97f774c659a3de9b99d7487c2a5427d02fd8"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) 21:22:05 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0xa8}, [@ldst={0x5, 0x2}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 21:22:05 executing program 0: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)="e6fea42204cb612c4a94b331bad06a5572", 0x0, 0x0, 0x1}, 0x38) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x00'}) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454de, 0xffffffffffffffff) 21:22:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf921e884bf496dca5d2b316da4f0de8163f6242fa7323f1740637c48468766af540439fce41f144631ac262dcae08c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x139}, 0x48) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0x19, 0x0, &(0x7f0000000100)="280e003f4305607e5bc5795e6558000800ffffffba0e7200ff", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) 21:22:05 executing program 3: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)="e6fea42204cb612c4a94b331bad06a5572", 0x0, 0x0, 0x1}, 0x38) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x00'}) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454de, 0xffffffffffffffff) [ 118.272671][T10034] device wlan1 left promiscuous mode 21:22:05 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0xa8}, [@ldst={0x5, 0x2}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 21:22:05 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0xa, 0x1, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='wlan1\x00%\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={r4, r3}) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9(\xee\x8aG\xdd2') r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x3) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="884dbe763afa49b13bdfe464ed850eaa3550822badac4a1440cb946d3d454e33720f74aa2f8ae64ae41ab208bb685f4afa2d3fdcdcd2c2ce0bee9aa81e1707e7990acbaa499aeccfebb31562eb6473dbbb915ab112fc849837ded004f3cf6585b6f69421b7704e740d25c742ca7a93d83237f42967b52c8554346793e90a01865a6c4e43e406f582aae46b1532b2c5015edd3588c74ba9e18e04b2e6713f8ef9e95cef49f2bca7fe5a8c8352d9f8ace94131f537b8d8a510c47f9a8940d0d8120630cd19"], 0xa) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000bb40)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="18fb240000ecdb290017000000850000000001fc2405220000000000000000000000000000000000707fa3d3b820d7bb6ddd27f43740df9b54e463c9357f42b008d6109b3530512134749463027b61b966a67d8fce8718c3273fd6e8f66a0fb765060f9a93d35c4a3306f0d8b79d3c9e8866853bd1588e2980b7c0f4a09fa6859efa0d7a97f774c659a3de9b99d7487c2a5427d02fd8"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) [ 118.923169][T10039] device wlan1 entered promiscuous mode 21:22:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc2868f0399d909a63796c113a80c19aab9d607000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf921e884bf496dca5d2b316da4f0de8163f6242fa7323f1740637c48468766af540439fce41f144631ac262dcae08c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x139}, 0x48) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0x19, 0x0, &(0x7f0000000100)="280e003f4305607e5bc5795e6558000800ffffffba0e7200ff", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) 21:22:06 executing program 4: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0xa, 0x1, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='wlan1\x00%\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={r4, r3}) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9(\xee\x8aG\xdd2') r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x3) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="884dbe763afa49b13bdfe464ed850eaa3550822badac4a1440cb946d3d454e33720f74aa2f8ae64ae41ab208bb685f4afa2d3fdcdcd2c2ce0bee9aa81e1707e7990acbaa499aeccfebb31562eb6473dbbb915ab112fc849837ded004f3cf6585b6f69421b7704e740d25c742ca7a93d83237f42967b52c8554346793e90a01865a6c4e43e406f582aae46b1532b2c5015edd3588c74ba9e18e04b2e6713f8ef9e95cef49f2bca7fe5a8c8352d9f8ace94131f537b8d8a510c47f9a8940d0d8120630cd19"], 0xa) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000bb40)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="18fb240000ecdb290017000000850000000001fc2405220000000000000000000000000000000000707fa3d3b820d7bb6ddd27f43740df9b54e463c9357f42b008d6109b3530512134749463027b61b966a67d8fce8718c3273fd6e8f66a0fb765060f9a93d35c4a3306f0d8b79d3c9e8866853bd1588e2980b7c0f4a09fa6859efa0d7a97f774c659a3de9b99d7487c2a5427d02fd8"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) [ 119.403306][T10038] device wlan1 entered promiscuous mode 21:22:06 executing program 2: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0xa, 0x1, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='wlan1\x00%\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={r4, r3}) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9(\xee\x8aG\xdd2') r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x3) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="884dbe763afa49b13bdfe464ed850eaa3550822badac4a1440cb946d3d454e33720f74aa2f8ae64ae41ab208bb685f4afa2d3fdcdcd2c2ce0bee9aa81e1707e7990acbaa499aeccfebb31562eb6473dbbb915ab112fc849837ded004f3cf6585b6f69421b7704e740d25c742ca7a93d83237f42967b52c8554346793e90a01865a6c4e43e406f582aae46b1532b2c5015edd3588c74ba9e18e04b2e6713f8ef9e95cef49f2bca7fe5a8c8352d9f8ace94131f537b8d8a510c47f9a8940d0d8120630cd19"], 0xa) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000bb40)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="18fb240000ecdb290017000000850000000001fc2405220000000000000000000000000000000000707fa3d3b820d7bb6ddd27f43740df9b54e463c9357f42b008d6109b3530512134749463027b61b966a67d8fce8718c3273fd6e8f66a0fb765060f9a93d35c4a3306f0d8b79d3c9e8866853bd1588e2980b7c0f4a09fa6859efa0d7a97f774c659a3de9b99d7487c2a5427d02fd8"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) [ 120.385537][T10057] device wlan1 entered promiscuous mode [ 120.397384][T10062] device wlan1 left promiscuous mode 21:22:07 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0xa, 0x1, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='wlan1\x00%\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={r4, r3}) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9(\xee\x8aG\xdd2') r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x3) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="884dbe763afa49b13bdfe464ed850eaa3550822badac4a1440cb946d3d454e33720f74aa2f8ae64ae41ab208bb685f4afa2d3fdcdcd2c2ce0bee9aa81e1707e7990acbaa499aeccfebb31562eb6473dbbb915ab112fc849837ded004f3cf6585b6f69421b7704e740d25c742ca7a93d83237f42967b52c8554346793e90a01865a6c4e43e406f582aae46b1532b2c5015edd3588c74ba9e18e04b2e6713f8ef9e95cef49f2bca7fe5a8c8352d9f8ace94131f537b8d8a510c47f9a8940d0d8120630cd19"], 0xa) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000bb40)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="18fb240000ecdb290017000000850000000001fc2405220000000000000000000000000000000000707fa3d3b820d7bb6ddd27f43740df9b54e463c9357f42b008d6109b3530512134749463027b61b966a67d8fce8718c3273fd6e8f66a0fb765060f9a93d35c4a3306f0d8b79d3c9e8866853bd1588e2980b7c0f4a09fa6859efa0d7a97f774c659a3de9b99d7487c2a5427d02fd8"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) 21:22:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="648f6675cd706c8a15b5971361d9", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 21:22:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="648f6675cd706c8a15b5971361d9", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 21:22:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="648f6675cd706c8a15b5971361d9", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 21:22:07 executing program 0: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)="e6fea42204cb612c4a94b331bad06a5572", 0x0, 0x0, 0x1}, 0x38) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x00'}) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454de, 0xffffffffffffffff) 21:22:07 executing program 2: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0xa, 0x1, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='wlan1\x00%\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={r4, r3}) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9(\xee\x8aG\xdd2') r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x3) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="884dbe763afa49b13bdfe464ed850eaa3550822badac4a1440cb946d3d454e33720f74aa2f8ae64ae41ab208bb685f4afa2d3fdcdcd2c2ce0bee9aa81e1707e7990acbaa499aeccfebb31562eb6473dbbb915ab112fc849837ded004f3cf6585b6f69421b7704e740d25c742ca7a93d83237f42967b52c8554346793e90a01865a6c4e43e406f582aae46b1532b2c5015edd3588c74ba9e18e04b2e6713f8ef9e95cef49f2bca7fe5a8c8352d9f8ace94131f537b8d8a510c47f9a8940d0d8120630cd19"], 0xa) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000bb40)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="18fb240000ecdb290017000000850000000001fc2405220000000000000000000000000000000000707fa3d3b820d7bb6ddd27f43740df9b54e463c9357f42b008d6109b3530512134749463027b61b966a67d8fce8718c3273fd6e8f66a0fb765060f9a93d35c4a3306f0d8b79d3c9e8866853bd1588e2980b7c0f4a09fa6859efa0d7a97f774c659a3de9b99d7487c2a5427d02fd8"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) [ 120.825533][T10064] device wlan1 entered promiscuous mode [ 120.856871][T10082] device wlan1 left promiscuous mode 21:22:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffff000, &(0x7f0000000080)=[{&(0x7f0000000040)="1c0000002200055bd25a80648c63940d6724fc60100010400a000a00", 0x1c}], 0x1}, 0x0) 21:22:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="648f6675cd706c8a15b5971361d9", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 21:22:08 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) [ 121.328356][T10085] device wlan1 entered promiscuous mode [ 121.357497][T10099] device wlan1 left promiscuous mode 21:22:08 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = socket$kcm(0xa, 0x1, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='wlan1\x00%\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={r4, r3}) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9(\xee\x8aG\xdd2') r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x3) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="884dbe763afa49b13bdfe464ed850eaa3550822badac4a1440cb946d3d454e33720f74aa2f8ae64ae41ab208bb685f4afa2d3fdcdcd2c2ce0bee9aa81e1707e7990acbaa499aeccfebb31562eb6473dbbb915ab112fc849837ded004f3cf6585b6f69421b7704e740d25c742ca7a93d83237f42967b52c8554346793e90a01865a6c4e43e406f582aae46b1532b2c5015edd3588c74ba9e18e04b2e6713f8ef9e95cef49f2bca7fe5a8c8352d9f8ace94131f537b8d8a510c47f9a8940d0d8120630cd19"], 0xa) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000bb40)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="18fb240000ecdb290017000000850000000001fc2405220000000000000000000000000000000000707fa3d3b820d7bb6ddd27f43740df9b54e463c9357f42b008d6109b3530512134749463027b61b966a67d8fce8718c3273fd6e8f66a0fb765060f9a93d35c4a3306f0d8b79d3c9e8866853bd1588e2980b7c0f4a09fa6859efa0d7a97f774c659a3de9b99d7487c2a5427d02fd8"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r6}, 0x78) 21:22:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ipvlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 21:22:08 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) 21:22:08 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) 21:22:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffff000, &(0x7f0000000080)=[{&(0x7f0000000040)="1c0000002200055bd25a80648c63940d6724fc60100010400a000a00", 0x1c}], 0x1}, 0x0) [ 121.907473][T10108] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 121.933777][T10115] device wlan1 left promiscuous mode 21:22:08 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fff}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) 21:22:08 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f00000000c0), 0x4) sendmsg(r1, &(0x7f0000000180)={0x0, 0xfffffd12, 0x0}, 0x0) close(r1) close(r0) [ 122.422405][T10120] device wlan1 entered promiscuous mode [ 122.445299][T10132] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 21:22:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffff000, &(0x7f0000000080)=[{&(0x7f0000000040)="1c0000002200055bd25a80648c63940d6724fc60100010400a000a00", 0x1c}], 0x1}, 0x0) 21:22:09 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f00000000c0), 0x4) sendmsg(r1, &(0x7f0000000180)={0x0, 0xfffffd12, 0x0}, 0x0) close(r1) close(r0) 21:22:09 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f00000000c0), 0x4) sendmsg(r1, &(0x7f0000000180)={0x0, 0xfffffd12, 0x0}, 0x0) close(r1) close(r0) 21:22:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ipvlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 21:22:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e04000056008109e00f80ecdb4cb9f207c804a00d00600002002efb0a6002000a0ada1b40d805000308c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 21:22:09 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000280)="b9a4168c1b1db2731c52717b9e6c78ba04630b722167b9204389da624e95dc70739a31a27c1111300200f6", 0x2b}], 0x1}, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) 21:22:09 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f00000000c0), 0x4) sendmsg(r1, &(0x7f0000000180)={0x0, 0xfffffd12, 0x0}, 0x0) close(r1) close(r0) 21:22:09 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f00000000c0), 0x4) sendmsg(r1, &(0x7f0000000180)={0x0, 0xfffffd12, 0x0}, 0x0) close(r1) close(r0) [ 122.660903][T10148] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 21:22:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ipvlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 21:22:09 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000280)="b9a4168c1b1db2731c52717b9e6c78ba04630b722167b9204389da624e95dc70739a31a27c1111300200f6", 0x2b}], 0x1}, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) 21:22:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffff000, &(0x7f0000000080)=[{&(0x7f0000000040)="1c0000002200055bd25a80648c63940d6724fc60100010400a000a00", 0x1c}], 0x1}, 0x0) 21:22:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e04000056008109e00f80ecdb4cb9f207c804a00d00600002002efb0a6002000a0ada1b40d805000308c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 21:22:09 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f00000000c0), 0x4) sendmsg(r1, &(0x7f0000000180)={0x0, 0xfffffd12, 0x0}, 0x0) close(r1) close(r0) 21:22:09 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f00000000c0), 0x4) sendmsg(r1, &(0x7f0000000180)={0x0, 0xfffffd12, 0x0}, 0x0) close(r1) close(r0) 21:22:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ipvlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 21:22:09 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000280)="b9a4168c1b1db2731c52717b9e6c78ba04630b722167b9204389da624e95dc70739a31a27c1111300200f6", 0x2b}], 0x1}, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) [ 122.932201][T10164] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 21:22:10 executing program 4: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) 21:22:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e04000056008109e00f80ecdb4cb9f207c804a00d00600002002efb0a6002000a0ada1b40d805000308c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 21:22:10 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x0, 0x3f00}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="39000000140081ae0000dc676f97daf01e2357f9ffffffffffffff0521018701546fabca1b4e8a06a6580e88370200c54c1960b89c40ebb373", 0x39}], 0x1}, 0x0) 21:22:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='%+.(-:\xc1') openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) 21:22:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0xc, 0x8, 0x1, 0x9, 0x0, 0x0, 0xe090, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0xffffffffffffffff, 0x8000}, 0x0, 0x9, 0x8, 0x6, 0x5a, 0x0, 0xfff}, r2, 0x10, 0xffffffffffffffff, 0x8) r3 = perf_event_open(&(0x7f0000001a00)={0x2, 0x70, 0x8, 0x9e, 0x4, 0x9e, 0x0, 0x6, 0x40, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f00000019c0), 0x7}, 0x80, 0x3, 0x1, 0x5, 0x2, 0x7, 0x6}, r2, 0xd, 0xffffffffffffffff, 0x3) getpid() r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cc2, 0x22005, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000240), 0x7}, 0x10600, 0x2, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000300)='.\'%,\x00') perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x4, 0x5, 0x3f, 0x8, 0x0, 0x6, 0x30000, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000140), 0xb}, 0x420, 0x5d80, 0xa, 0x9, 0x7, 0x4, 0x6}, r2, 0xffffffffffffffff, r1, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x42, 0x30000000, &(0x7f00000000c0)="b9ff0300600d698cff9e14f008004de7f9c764362ae28eff070003e0000000a08b7907080594e5d04e0d86187933b474b67b2b4b777b5c15d51e3e7b1263afc0bac3", 0x0, 0x200, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001780)={0xffffffffffffffff, 0x0, 0x57, 0x82, &(0x7f00000014c0)="ce5c4733127f72d505c48e0f1b51547809be1459a2cb88230d2cbc3940f64f5cb0106b837bfd22caceb4695b5be68400358a275019af2f4f4a45c31a4156d81d719b483bdef7801cabc274c9f8cbb5fd7a1dd3f2c5d2fa", &(0x7f0000001540)=""/130, 0xb9b, 0x0, 0xcd, 0x49, &(0x7f0000001600)="8321dd90e81057bab4c068e1e722dd6d9e45c43122f1f0f1f6f715e3d2d0fab8666c3de1b501a004ffe34134bbff92daaca722a50f68786ee8ac6f15fd4c41ba6b8a99ba5a7486ba68b6be09ecd0411aa31dd7b54d2760812900fafaeaae276add6468cb56ff56bb98c278d90c1da496a515718908165328ea8b41b9c35c672cb784ae722b4058e8f1987df57c415f6fd566e85c21be138d77266ec5d999c271242c6207f01987361c296f6287fba624eeba88c9debc3d61a3f2957c2367e9fdb9d3557915955aea57ec2ee8c9", &(0x7f0000001700)="71c253a0f4ef38cd8893f4c02620cc805de515dc3c1979ff878aeff9439faf951e4136faef35ca73f0e81bb31fe88b79a9245ee18bf31098826f4d5a14b1ba4746b7a2a3044be70019", 0x1, 0x8001}, 0x48) 21:22:10 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000280)="b9a4168c1b1db2731c52717b9e6c78ba04630b722167b9204389da624e95dc70739a31a27c1111300200f6", 0x2b}], 0x1}, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xa8) 21:22:10 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x10, &(0x7f0000000000)=r0, 0x8) 21:22:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e04000056008109e00f80ecdb4cb9f207c804a00d00600002002efb0a6002000a0ada1b40d805000308c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 21:22:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) close(r0) [ 123.512860][T10194] sctp: [Deprecated]: syz-executor.4 (pid 10194) Use of struct sctp_assoc_value in delayed_ack socket option. [ 123.512860][T10194] Use struct sctp_sack_info instead 21:22:10 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f7, &(0x7f0000000080)) 21:22:10 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x10, &(0x7f0000000000)=r0, 0x8) 21:22:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) close(r0) 21:22:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0xc, 0x8, 0x1, 0x9, 0x0, 0x0, 0xe090, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0xffffffffffffffff, 0x8000}, 0x0, 0x9, 0x8, 0x6, 0x5a, 0x0, 0xfff}, r2, 0x10, 0xffffffffffffffff, 0x8) r3 = perf_event_open(&(0x7f0000001a00)={0x2, 0x70, 0x8, 0x9e, 0x4, 0x9e, 0x0, 0x6, 0x40, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f00000019c0), 0x7}, 0x80, 0x3, 0x1, 0x5, 0x2, 0x7, 0x6}, r2, 0xd, 0xffffffffffffffff, 0x3) getpid() r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cc2, 0x22005, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000240), 0x7}, 0x10600, 0x2, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000300)='.\'%,\x00') perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x4, 0x5, 0x3f, 0x8, 0x0, 0x6, 0x30000, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000140), 0xb}, 0x420, 0x5d80, 0xa, 0x9, 0x7, 0x4, 0x6}, r2, 0xffffffffffffffff, r1, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x42, 0x30000000, &(0x7f00000000c0)="b9ff0300600d698cff9e14f008004de7f9c764362ae28eff070003e0000000a08b7907080594e5d04e0d86187933b474b67b2b4b777b5c15d51e3e7b1263afc0bac3", 0x0, 0x200, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001780)={0xffffffffffffffff, 0x0, 0x57, 0x82, &(0x7f00000014c0)="ce5c4733127f72d505c48e0f1b51547809be1459a2cb88230d2cbc3940f64f5cb0106b837bfd22caceb4695b5be68400358a275019af2f4f4a45c31a4156d81d719b483bdef7801cabc274c9f8cbb5fd7a1dd3f2c5d2fa", &(0x7f0000001540)=""/130, 0xb9b, 0x0, 0xcd, 0x49, &(0x7f0000001600)="8321dd90e81057bab4c068e1e722dd6d9e45c43122f1f0f1f6f715e3d2d0fab8666c3de1b501a004ffe34134bbff92daaca722a50f68786ee8ac6f15fd4c41ba6b8a99ba5a7486ba68b6be09ecd0411aa31dd7b54d2760812900fafaeaae276add6468cb56ff56bb98c278d90c1da496a515718908165328ea8b41b9c35c672cb784ae722b4058e8f1987df57c415f6fd566e85c21be138d77266ec5d999c271242c6207f01987361c296f6287fba624eeba88c9debc3d61a3f2957c2367e9fdb9d3557915955aea57ec2ee8c9", &(0x7f0000001700)="71c253a0f4ef38cd8893f4c02620cc805de515dc3c1979ff878aeff9439faf951e4136faef35ca73f0e81bb31fe88b79a9245ee18bf31098826f4d5a14b1ba4746b7a2a3044be70019", 0x1, 0x8001}, 0x48) 21:22:10 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f7, &(0x7f0000000080)) [ 123.901861][T10204] sctp: [Deprecated]: syz-executor.4 (pid 10204) Use of struct sctp_assoc_value in delayed_ack socket option. [ 123.901861][T10204] Use struct sctp_sack_info instead 21:22:11 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x0, 0x3f00}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="39000000140081ae0000dc676f97daf01e2357f9ffffffffffffff0521018701546fabca1b4e8a06a6580e88370200c54c1960b89c40ebb373", 0x39}], 0x1}, 0x0) 21:22:11 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f7, &(0x7f0000000080)) 21:22:11 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x10, &(0x7f0000000000)=r0, 0x8) 21:22:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='%+.(-:\xc1') openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) 21:22:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) close(r0) [ 124.432569][T10220] sctp: [Deprecated]: syz-executor.4 (pid 10220) Use of struct sctp_assoc_value in delayed_ack socket option. [ 124.432569][T10220] Use struct sctp_sack_info instead 21:22:11 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f7, &(0x7f0000000080)) 21:22:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) close(r0) 21:22:11 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x10, &(0x7f0000000000)=r0, 0x8) [ 124.941565][T10236] sctp: [Deprecated]: syz-executor.4 (pid 10236) Use of struct sctp_assoc_value in delayed_ack socket option. [ 124.941565][T10236] Use struct sctp_sack_info instead 21:22:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='%+.(-:\xc1') openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) 21:22:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0xc, 0x8, 0x1, 0x9, 0x0, 0x0, 0xe090, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0xffffffffffffffff, 0x8000}, 0x0, 0x9, 0x8, 0x6, 0x5a, 0x0, 0xfff}, r2, 0x10, 0xffffffffffffffff, 0x8) r3 = perf_event_open(&(0x7f0000001a00)={0x2, 0x70, 0x8, 0x9e, 0x4, 0x9e, 0x0, 0x6, 0x40, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f00000019c0), 0x7}, 0x80, 0x3, 0x1, 0x5, 0x2, 0x7, 0x6}, r2, 0xd, 0xffffffffffffffff, 0x3) getpid() r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cc2, 0x22005, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000240), 0x7}, 0x10600, 0x2, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000300)='.\'%,\x00') perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x4, 0x5, 0x3f, 0x8, 0x0, 0x6, 0x30000, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000140), 0xb}, 0x420, 0x5d80, 0xa, 0x9, 0x7, 0x4, 0x6}, r2, 0xffffffffffffffff, r1, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x42, 0x30000000, &(0x7f00000000c0)="b9ff0300600d698cff9e14f008004de7f9c764362ae28eff070003e0000000a08b7907080594e5d04e0d86187933b474b67b2b4b777b5c15d51e3e7b1263afc0bac3", 0x0, 0x200, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001780)={0xffffffffffffffff, 0x0, 0x57, 0x82, &(0x7f00000014c0)="ce5c4733127f72d505c48e0f1b51547809be1459a2cb88230d2cbc3940f64f5cb0106b837bfd22caceb4695b5be68400358a275019af2f4f4a45c31a4156d81d719b483bdef7801cabc274c9f8cbb5fd7a1dd3f2c5d2fa", &(0x7f0000001540)=""/130, 0xb9b, 0x0, 0xcd, 0x49, &(0x7f0000001600)="8321dd90e81057bab4c068e1e722dd6d9e45c43122f1f0f1f6f715e3d2d0fab8666c3de1b501a004ffe34134bbff92daaca722a50f68786ee8ac6f15fd4c41ba6b8a99ba5a7486ba68b6be09ecd0411aa31dd7b54d2760812900fafaeaae276add6468cb56ff56bb98c278d90c1da496a515718908165328ea8b41b9c35c672cb784ae722b4058e8f1987df57c415f6fd566e85c21be138d77266ec5d999c271242c6207f01987361c296f6287fba624eeba88c9debc3d61a3f2957c2367e9fdb9d3557915955aea57ec2ee8c9", &(0x7f0000001700)="71c253a0f4ef38cd8893f4c02620cc805de515dc3c1979ff878aeff9439faf951e4136faef35ca73f0e81bb31fe88b79a9245ee18bf31098826f4d5a14b1ba4746b7a2a3044be70019", 0x1, 0x8001}, 0x48) [ 125.164783][ C0] ------------[ cut here ]------------ [ 125.170749][ C0] raw_local_irq_restore() called with IRQs enabled [ 125.177407][ C0] WARNING: CPU: 0 PID: 8412 at kernel/locking/irqflag-debug.c:10 warn_bogus_irq_restore+0x1d/0x20 [ 125.188113][ C0] Modules linked in: [ 125.192032][ C0] CPU: 0 PID: 8412 Comm: syz-executor.1 Not tainted 5.12.0-rc2-syzkaller #0 [ 125.200798][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 21:22:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='%+.(-:\xc1') openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) [ 125.210949][ C0] RIP: 0010:warn_bogus_irq_restore+0x1d/0x20 [ 125.217030][ C0] Code: be ff cc cc cc cc cc cc cc cc cc cc cc 80 3d 22 07 ad 04 00 74 01 c3 48 c7 c7 20 92 6b 89 c6 05 11 07 ad 04 01 e8 4c d1 be ff <0f> 0b c3 48 39 77 10 0f 84 97 00 00 00 66 f7 47 22 f0 ff 74 4b 48 [ 125.236742][ C0] RSP: 0018:ffffc90000007cb8 EFLAGS: 00010282 [ 125.242852][ C0] RAX: 0000000000000000 RBX: ffff888024e81808 RCX: 0000000000000000 [ 125.250926][ C0] RDX: ffff8880274d8000 RSI: ffffffff815c3f65 RDI: fffff52000000f89 [ 125.258989][ C0] RBP: 0000000000000200 R08: 0000000000000000 R09: 0000000000000000 [ 125.267054][ C0] R10: ffffffff815bccfe R11: 0000000000000000 R12: 0000000000000003 [ 125.275121][ C0] R13: ffffed10049d0301 R14: 0000000000000001 R15: ffff8880b9c35f40 [ 125.283127][ C0] FS: 0000000002f3f400(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 125.292188][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 125.298864][ C0] CR2: 0000000002f48848 CR3: 0000000047cd7000 CR4: 00000000001506f0 [ 125.306928][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 125.314991][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 125.322993][ C0] Call Trace: [ 125.326340][ C0] [ 125.329220][ C0] kvm_wait+0xc9/0xe0 [ 125.333231][ C0] __pv_queued_spin_lock_slowpath+0x8b8/0xb40 [ 125.339407][ C0] ? pv_hash+0x100/0x100 [ 125.343692][ C0] ? lock_release+0x720/0x720 [ 125.348482][ C0] do_raw_spin_lock+0x200/0x2b0 [ 125.353377][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 125.358432][ C0] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 125.364767][ C0] tcp_tsq_handler+0x1d/0x200 [ 125.369480][ C0] tcp_tasklet_func+0x2cc/0x560 [ 125.374444][ C0] ? tcp_tsq_handler+0x200/0x200 [ 125.379437][ C0] tasklet_action_common.constprop.0+0x1d7/0x2d0 [ 125.385856][ C0] __do_softirq+0x29b/0x9f6 [ 125.390403][ C0] irq_exit_rcu+0x134/0x200 [ 125.395008][ C0] common_interrupt+0xa4/0xd0 [ 125.399722][ C0] [ 125.402673][ C0] asm_common_interrupt+0x1e/0x40 [ 125.407784][ C0] RIP: 0010:check_kcov_mode+0x2c/0x40 [ 125.413190][ C0] Code: 05 f9 16 8e 7e 89 c2 81 e2 00 01 00 00 a9 00 01 ff 00 74 10 31 c0 85 d2 74 15 8b 96 2c 15 00 00 85 d2 74 0b 8b 86 08 15 00 00 <39> f8 0f 94 c0 c3 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 31 c0 [ 125.432894][ C0] RSP: 0018:ffffc900016ef860 EFLAGS: 00000246 [ 125.439056][ C0] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 0000000000000000 [ 125.447109][ C0] RDX: 0000000000000000 RSI: ffff8880274d8000 RDI: 0000000000000003 [ 125.455172][ C0] RBP: ffff88802dbfab80 R08: 0000000000000000 R09: 0000000000000007 [ 125.463175][ C0] R10: ffffffff83913a17 R11: 0000000000000010 R12: 0000000000000100 [ 125.471239][ C0] R13: 0000000000000116 R14: dffffc0000000000 R15: 0000000000000000 [ 125.479309][ C0] ? tomoyo_domain_quota_is_ok+0x307/0x550 [ 125.485227][ C0] __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 125.491335][ C0] tomoyo_domain_quota_is_ok+0x307/0x550 [ 125.497069][ C0] tomoyo_supervisor+0x2f2/0xf00 [ 125.502038][ C0] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 125.507946][ C0] ? tomoyo_profile+0x50/0x50 [ 125.512655][ C0] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 125.518562][ C0] ? kasan_quarantine_put+0xf5/0x210 [ 125.523937][ C0] ? lockdep_hardirqs_on+0x79/0x100 [ 125.529173][ C0] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 125.534991][ C0] ? tomoyo_path_matches_pattern+0x110/0x280 [ 125.541008][ C0] ? tomoyo_check_path_acl+0xab/0x210 [ 125.546480][ C0] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 125.552752][ C0] ? tomoyo_same_mount_acl+0x450/0x450 [ 125.558280][ C0] tomoyo_path_permission+0x270/0x3a0 [ 125.563688][ C0] tomoyo_path_perm+0x2f0/0x400 [ 125.568629][ C0] ? tomoyo_check_open_permission+0x380/0x380 [ 125.574787][ C0] ? may_linkat+0x2d0/0x2d0 [ 125.579358][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 125.585671][ C0] ? getname_flags.part.0+0x1dd/0x4f0 [ 125.591088][ C0] security_inode_getattr+0xcf/0x140 [ 125.596451][ C0] vfs_statx+0x164/0x390 [ 125.600734][ C0] ? dput+0x1de/0xbc0 [ 125.604787][ C0] ? do_readlinkat+0x2f0/0x2f0 [ 125.609598][ C0] __do_sys_newlstat+0x91/0x110 [ 125.614527][ C0] ? __do_sys_lstat+0x110/0x110 [ 125.619411][ C0] ? __context_tracking_exit+0xb8/0xe0 [ 125.624940][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 125.629840][ C0] ? syscall_enter_from_user_mode+0x27/0x70 [ 125.635805][ C0] ? lockdep_hardirqs_on+0x79/0x100 [ 125.642004][ C0] do_syscall_64+0x2d/0x70 [ 125.646495][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 125.652418][ C0] RIP: 0033:0x4654f6 [ 125.656376][ C0] Code: ff ff ff 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 06 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 125.676051][ C0] RSP: 002b:00007ffcf07530f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000006 [ 125.684536][ C0] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004654f6 [ 125.692537][ C0] RDX: 00007ffcf0753130 RSI: 00007ffcf0753130 RDI: 00007ffcf07531c0 [ 125.700584][ C0] RBP: 00007ffcf07531c0 R08: 0000000000000001 R09: 00007ffcf0752f90 [ 125.708631][ C0] R10: 0000000002f4088b R11: 0000000000000246 R12: 00000000004bebb2 [ 125.716673][ C0] R13: 00007ffcf0754290 R14: 0000000002f40810 R15: 00007ffcf07542d0 [ 125.724739][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 125.731342][ C0] CPU: 0 PID: 8412 Comm: syz-executor.1 Not tainted 5.12.0-rc2-syzkaller #0 [ 125.740048][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.750133][ C0] Call Trace: [ 125.753437][ C0] [ 125.756314][ C0] dump_stack+0x141/0x1d7 [ 125.760686][ C0] panic+0x306/0x73d [ 125.764617][ C0] ? __warn_printk+0xf3/0xf3 [ 125.769302][ C0] ? __warn.cold+0x1a/0x44 [ 125.773763][ C0] ? warn_bogus_irq_restore+0x1d/0x20 [ 125.779176][ C0] __warn.cold+0x35/0x44 [ 125.783459][ C0] ? wake_up_klogd.part.0+0x8e/0xd0 [ 125.788702][ C0] ? warn_bogus_irq_restore+0x1d/0x20 [ 125.794109][ C0] report_bug+0x1bd/0x210 [ 125.798486][ C0] handle_bug+0x3c/0x60 [ 125.802689][ C0] exc_invalid_op+0x14/0x40 [ 125.807234][ C0] asm_exc_invalid_op+0x12/0x20 [ 125.812121][ C0] RIP: 0010:warn_bogus_irq_restore+0x1d/0x20 [ 125.818141][ C0] Code: be ff cc cc cc cc cc cc cc cc cc cc cc 80 3d 22 07 ad 04 00 74 01 c3 48 c7 c7 20 92 6b 89 c6 05 11 07 ad 04 01 e8 4c d1 be ff <0f> 0b c3 48 39 77 10 0f 84 97 00 00 00 66 f7 47 22 f0 ff 74 4b 48 [ 125.837776][ C0] RSP: 0018:ffffc90000007cb8 EFLAGS: 00010282 [ 125.843878][ C0] RAX: 0000000000000000 RBX: ffff888024e81808 RCX: 0000000000000000 [ 125.851881][ C0] RDX: ffff8880274d8000 RSI: ffffffff815c3f65 RDI: fffff52000000f89 [ 125.859889][ C0] RBP: 0000000000000200 R08: 0000000000000000 R09: 0000000000000000 [ 125.867894][ C0] R10: ffffffff815bccfe R11: 0000000000000000 R12: 0000000000000003 [ 125.875899][ C0] R13: ffffed10049d0301 R14: 0000000000000001 R15: ffff8880b9c35f40 [ 125.883908][ C0] ? wake_up_klogd.part.0+0x8e/0xd0 [ 125.889148][ C0] ? vprintk_func+0x95/0x1e0 [ 125.893783][ C0] ? warn_bogus_irq_restore+0x1d/0x20 [ 125.899247][ C0] kvm_wait+0xc9/0xe0 [ 125.903251][ C0] __pv_queued_spin_lock_slowpath+0x8b8/0xb40 [ 125.909331][ C0] ? pv_hash+0x100/0x100 [ 125.913605][ C0] ? lock_release+0x720/0x720 [ 125.918291][ C0] do_raw_spin_lock+0x200/0x2b0 [ 125.923148][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 125.928091][ C0] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 125.934371][ C0] tcp_tsq_handler+0x1d/0x200 [ 125.939067][ C0] tcp_tasklet_func+0x2cc/0x560 [ 125.943922][ C0] ? tcp_tsq_handler+0x200/0x200 [ 125.948875][ C0] tasklet_action_common.constprop.0+0x1d7/0x2d0 [ 125.955239][ C0] __do_softirq+0x29b/0x9f6 [ 125.959756][ C0] irq_exit_rcu+0x134/0x200 [ 125.964257][ C0] common_interrupt+0xa4/0xd0 [ 125.969067][ C0] [ 125.972016][ C0] asm_common_interrupt+0x1e/0x40 [ 125.977067][ C0] RIP: 0010:check_kcov_mode+0x2c/0x40 [ 125.982473][ C0] Code: 05 f9 16 8e 7e 89 c2 81 e2 00 01 00 00 a9 00 01 ff 00 74 10 31 c0 85 d2 74 15 8b 96 2c 15 00 00 85 d2 74 0b 8b 86 08 15 00 00 <39> f8 0f 94 c0 c3 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 31 c0 [ 126.002082][ C0] RSP: 0018:ffffc900016ef860 EFLAGS: 00000246 [ 126.008152][ C0] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 0000000000000000 [ 126.016122][ C0] RDX: 0000000000000000 RSI: ffff8880274d8000 RDI: 0000000000000003 [ 126.024090][ C0] RBP: ffff88802dbfab80 R08: 0000000000000000 R09: 0000000000000007 [ 126.032059][ C0] R10: ffffffff83913a17 R11: 0000000000000010 R12: 0000000000000100 [ 126.040029][ C0] R13: 0000000000000116 R14: dffffc0000000000 R15: 0000000000000000 [ 126.048005][ C0] ? tomoyo_domain_quota_is_ok+0x307/0x550 [ 126.053852][ C0] __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 126.059925][ C0] tomoyo_domain_quota_is_ok+0x307/0x550 [ 126.065570][ C0] tomoyo_supervisor+0x2f2/0xf00 [ 126.070505][ C0] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 126.076315][ C0] ? tomoyo_profile+0x50/0x50 [ 126.080989][ C0] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 126.086798][ C0] ? kasan_quarantine_put+0xf5/0x210 [ 126.092095][ C0] ? lockdep_hardirqs_on+0x79/0x100 [ 126.097304][ C0] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 126.103045][ C0] ? tomoyo_path_matches_pattern+0x110/0x280 [ 126.109036][ C0] ? tomoyo_check_path_acl+0xab/0x210 [ 126.114412][ C0] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 126.120657][ C0] ? tomoyo_same_mount_acl+0x450/0x450 [ 126.126123][ C0] tomoyo_path_permission+0x270/0x3a0 [ 126.131502][ C0] tomoyo_path_perm+0x2f0/0x400 [ 126.136381][ C0] ? tomoyo_check_open_permission+0x380/0x380 [ 126.142471][ C0] ? may_linkat+0x2d0/0x2d0 [ 126.147006][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 126.153265][ C0] ? getname_flags.part.0+0x1dd/0x4f0 [ 126.158646][ C0] security_inode_getattr+0xcf/0x140 [ 126.163937][ C0] vfs_statx+0x164/0x390 [ 126.168180][ C0] ? dput+0x1de/0xbc0 [ 126.172178][ C0] ? do_readlinkat+0x2f0/0x2f0 [ 126.176953][ C0] __do_sys_newlstat+0x91/0x110 [ 126.181809][ C0] ? __do_sys_lstat+0x110/0x110 [ 126.186664][ C0] ? __context_tracking_exit+0xb8/0xe0 [ 126.192123][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 126.196996][ C0] ? syscall_enter_from_user_mode+0x27/0x70 [ 126.203016][ C0] ? lockdep_hardirqs_on+0x79/0x100 [ 126.208249][ C0] do_syscall_64+0x2d/0x70 [ 126.212696][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 126.218628][ C0] RIP: 0033:0x4654f6 [ 126.222549][ C0] Code: ff ff ff 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 41 89 f8 48 89 f7 48 89 d6 41 83 f8 01 77 29 b8 06 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 c3 90 48 c7 c2 bc ff ff ff f7 d8 64 89 02 [ 126.242160][ C0] RSP: 002b:00007ffcf07530f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000006 [ 126.250581][ C0] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004654f6 [ 126.258662][ C0] RDX: 00007ffcf0753130 RSI: 00007ffcf0753130 RDI: 00007ffcf07531c0 [ 126.266630][ C0] RBP: 00007ffcf07531c0 R08: 0000000000000001 R09: 00007ffcf0752f90 [ 126.274598][ C0] R10: 0000000002f4088b R11: 0000000000000246 R12: 00000000004bebb2 [ 126.282566][ C0] R13: 00007ffcf0754290 R14: 0000000002f40810 R15: 00007ffcf07542d0 [ 126.291432][ C0] Kernel Offset: disabled [ 126.295909][ C0] Rebooting in 86400 seconds..